Added chart versions:
nats/nats: - 1.2.10 speedscale/speedscale-operator: - 2.3.149main-source
parent
464c28e908
commit
5be4a5bd61
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -0,0 +1,26 @@
|
|||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*.orig
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
.vscode/
|
||||
|
||||
# template tests
|
||||
/test
|
|
@ -0,0 +1,23 @@
|
|||
annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: NATS Server
|
||||
catalog.cattle.io/featured: "5"
|
||||
catalog.cattle.io/kube-version: '>=1.16-0'
|
||||
catalog.cattle.io/release-name: nats
|
||||
apiVersion: v2
|
||||
appVersion: 2.10.25
|
||||
description: A Helm chart for the NATS.io High Speed Cloud Native Distributed Communications
|
||||
Technology.
|
||||
home: http://github.com/nats-io/k8s
|
||||
icon: file://assets/icons/nats.png
|
||||
keywords:
|
||||
- nats
|
||||
- messaging
|
||||
- cncf
|
||||
kubeVersion: '>=1.16-0'
|
||||
maintainers:
|
||||
- email: info@nats.io
|
||||
name: The NATS Authors
|
||||
url: https://github.com/nats-io
|
||||
name: nats
|
||||
version: 1.2.10
|
|
@ -0,0 +1,329 @@
|
|||
# NATS Server
|
||||
|
||||
---
|
||||
|
||||
[NATS](https://nats.io) is a simple, secure and performant communications system for digital systems, services and devices.
|
||||
NATS is part of the Cloud Native Computing Foundation ([CNCF](https://cncf.io)).
|
||||
NATS has over [30 client language implementations](https://nats.io/download/), and its server can run on-premise, in the cloud, at the edge, and even on a Raspberry Pi.
|
||||
NATS can secure and simplify design and operation of modern distributed systems.
|
||||
|
||||
```shell
|
||||
helm repo add nats https://nats-io.github.io/k8s/helm/charts/
|
||||
helm upgrade --install nats nats/nats
|
||||
```
|
||||
|
||||
## Upgrade Nodes
|
||||
|
||||
- **Upgrading from 0.x**: The `values.yaml` schema changed significantly from 0.x to 1.x. Read [UPGRADING.md](UPGRADING.md) for instructions on upgrading a 0.x release to 1.x.
|
||||
|
||||
## Values
|
||||
|
||||
There are a handful of explicitly defined options which are documented with comments in the [values.yaml](values.yaml) file.
|
||||
|
||||
Everything in the NATS Config or Kubernetes Resources can be overridden by `merge` and `patch`, which is supported for the following values:
|
||||
|
||||
| key | type | enabled by default |
|
||||
|----------------------------------|-----------------------------------------------------------------------------------------------------------------------------|-----------------------------------------|
|
||||
| `config` | [NATS Config](https://docs.nats.io/running-a-nats-service/configuration) | yes |
|
||||
| `config.cluster` | [NATS Cluster](https://docs.nats.io/running-a-nats-service/configuration/clustering/cluster_config) | no |
|
||||
| `config.cluster.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||
| `config.jetstream` | [NATS JetStream](https://docs.nats.io/running-a-nats-service/configuration#jetstream) | no |
|
||||
| `config.jetstream.fileStore.pvc` | [k8s PVC](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#persistentvolumeclaim-v1-core) | yes, when `config.jetstream` is enabled |
|
||||
| `config.nats.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||
| `config.leafnodes` | [NATS LeafNodes](https://docs.nats.io/running-a-nats-service/configuration/leafnodes/leafnode_conf) | no |
|
||||
| `config.leafnodes.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||
| `config.websocket` | [NATS WebSocket](https://docs.nats.io/running-a-nats-service/configuration/websocket/websocket_conf) | no |
|
||||
| `config.websocket.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||
| `config.websocket.ingress` | [k8s Ingress](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#ingress-v1-networking-k8s-io) | no |
|
||||
| `config.mqtt` | [NATS MQTT](https://docs.nats.io/running-a-nats-service/configuration/mqtt/mqtt_config) | no |
|
||||
| `config.mqtt.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||
| `config.gateway` | [NATS Gateway](https://docs.nats.io/running-a-nats-service/configuration/gateways/gateway#gateway-configuration-block) | no |
|
||||
| `config.gateway.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||
| `config.resolver` | [NATS Resolver](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/auth_intro/jwt/resolver) | no |
|
||||
| `config.resolver.pvc` | [k8s PVC](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#persistentvolumeclaim-v1-core) | yes, when `config.resolver` is enabled |
|
||||
| `container` | nats [k8s Container](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core) | yes |
|
||||
| `reloader` | config reloader [k8s Container](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core) | yes |
|
||||
| `promExporter` | prometheus exporter [k8s Container](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core) | no |
|
||||
| `promExporter.podMonitor` | [prometheus PodMonitor](https://prometheus-operator.dev/docs/operator/api/#monitoring.coreos.com/v1.PodMonitor) | no |
|
||||
| `service` | [k8s Service](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#service-v1-core) | yes |
|
||||
| `statefulSet` | [k8s StatefulSet](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#statefulset-v1-apps) | yes |
|
||||
| `podTemplate` | [k8s PodTemplate](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#pod-v1-core) | yes |
|
||||
| `headlessService` | [k8s Service](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#service-v1-core) | yes |
|
||||
| `configMap` | [k8s ConfigMap](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#configmap-v1-core) | yes |
|
||||
| `natsBox.contexts.default` | [NATS Context](https://docs.nats.io/using-nats/nats-tools/nats_cli#nats-contexts) | yes |
|
||||
| `natsBox.contexts.[name]` | [NATS Context](https://docs.nats.io/using-nats/nats-tools/nats_cli#nats-contexts) | no |
|
||||
| `natsBox.container` | nats-box [k8s Container](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core) | yes |
|
||||
| `natsBox.deployment` | [k8s Deployment](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#deployment-v1-apps) | yes |
|
||||
| `natsBox.podTemplate` | [k8s PodTemplate](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#pod-v1-core) | yes |
|
||||
| `natsBox.contextsSecret` | [k8s Secret](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#secret-v1-core) | yes |
|
||||
| `natsBox.contentsSecret` | [k8s Secret](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#secret-v1-core) | yes |
|
||||
|
||||
### Merge
|
||||
|
||||
Merging is performed using the Helm `merge` function. Example - add NATS accounts and container resources:
|
||||
|
||||
```yaml
|
||||
config:
|
||||
merge:
|
||||
accounts:
|
||||
A:
|
||||
users:
|
||||
- {user: a, password: a}
|
||||
B:
|
||||
users:
|
||||
- {user: b, password: b}
|
||||
natsBox:
|
||||
contexts:
|
||||
a:
|
||||
merge: {user: a, password: a}
|
||||
b:
|
||||
merge: {user: b, password: b}
|
||||
defaultContextName: a
|
||||
```
|
||||
|
||||
## Patch
|
||||
|
||||
Patching is performed using [JSON Patch](https://jsonpatch.com/). Example - add additional route to end of route list:
|
||||
|
||||
```yaml
|
||||
config:
|
||||
cluster:
|
||||
enabled: true
|
||||
patch:
|
||||
- op: add
|
||||
path: /routes/-
|
||||
value: nats://demo.nats.io:6222
|
||||
```
|
||||
|
||||
## Common Configurations
|
||||
|
||||
### JetStream Cluster on 3 separate hosts
|
||||
|
||||
```yaml
|
||||
config:
|
||||
cluster:
|
||||
enabled: true
|
||||
replicas: 3
|
||||
jetstream:
|
||||
enabled: true
|
||||
fileStore:
|
||||
pvc:
|
||||
size: 10Gi
|
||||
|
||||
podTemplate:
|
||||
topologySpreadConstraints:
|
||||
kubernetes.io/hostname:
|
||||
maxSkew: 1
|
||||
whenUnsatisfiable: DoNotSchedule
|
||||
```
|
||||
|
||||
### NATS Container Resources
|
||||
|
||||
```yaml
|
||||
container:
|
||||
env:
|
||||
# different from k8s units, suffix must be B, KiB, MiB, GiB, or TiB
|
||||
# should be ~90% of memory limit
|
||||
GOMEMLIMIT: 7GiB
|
||||
merge:
|
||||
# recommended limit is at least 2 CPU cores and 8Gi Memory for production JetStream clusters
|
||||
resources:
|
||||
requests:
|
||||
cpu: "2"
|
||||
memory: 8Gi
|
||||
limits:
|
||||
cpu: "2"
|
||||
memory: 8Gi
|
||||
```
|
||||
|
||||
### Specify Image Version
|
||||
|
||||
```yaml
|
||||
container:
|
||||
image:
|
||||
tag: x.y.z-alpine
|
||||
```
|
||||
|
||||
### Operator Mode with NATS Resolver
|
||||
|
||||
Run `nsc generate config --nats-resolver` and replace the `OPERATOR_JWT`, `SYS_ACCOUNT_ID`, and `SYS_ACCOUNT_JWT` with your values.
|
||||
Make sure that you do not include the trailing `,` in the `SYS_ACCOUNT_JWT`.
|
||||
|
||||
```
|
||||
config:
|
||||
resolver:
|
||||
enabled: true
|
||||
merge:
|
||||
type: full
|
||||
interval: 2m
|
||||
timeout: 1.9s
|
||||
merge:
|
||||
operator: OPERATOR_JWT
|
||||
system_account: SYS_ACCOUNT_ID
|
||||
resolver_preload:
|
||||
SYS_ACCOUNT_ID: SYS_ACCOUNT_JWT
|
||||
```
|
||||
|
||||
|
||||
## Accessing NATS
|
||||
|
||||
The chart contains 2 services by default, `service` and `headlessService`.
|
||||
|
||||
### `service`
|
||||
|
||||
The `service` is intended to be accessed by NATS Clients. It is a `ClusterIP` service by default, however it can easily be changed to a different service type.
|
||||
|
||||
The `nats`, `websocket`, `leafnodes`, and `mqtt` ports will be exposed through this service by default if they are enabled.
|
||||
|
||||
Example: change this service type to a `LoadBalancer`:
|
||||
|
||||
```yaml
|
||||
service:
|
||||
merge:
|
||||
spec:
|
||||
type: LoadBalancer
|
||||
```
|
||||
|
||||
### `headlessService`
|
||||
|
||||
The `headlessService` is used for NATS Servers in the Stateful Set to discover one another. It is primarily intended to be used for Cluster Route connections.
|
||||
|
||||
### TLS Considerations
|
||||
|
||||
The TLS Certificate used for Client Connections should have a SAN covering DNS Name that clients access the `service` at.
|
||||
|
||||
The TLS Certificate used for Cluster Route Connections should have a SAN covering the DNS Name that routes access each other on the `headlessService` at. This is `*.<headless-service-name>` by default.
|
||||
|
||||
## Advanced Features
|
||||
|
||||
### Templating Values
|
||||
|
||||
Anything in `values.yaml` can be templated:
|
||||
|
||||
- maps matching the following syntax will be templated and parsed as YAML:
|
||||
```yaml
|
||||
$tplYaml: |
|
||||
yaml template
|
||||
```
|
||||
- maps matching the follow syntax will be templated, parsed as YAML, and spread into the parent map/slice
|
||||
```yaml
|
||||
$tplYamlSpread: |
|
||||
yaml template
|
||||
```
|
||||
|
||||
Example - change service name:
|
||||
|
||||
```yaml
|
||||
service:
|
||||
name:
|
||||
$tplYaml: >-
|
||||
{{ include "nats.fullname" . }}-svc
|
||||
```
|
||||
|
||||
### NATS Config Units and Variables
|
||||
|
||||
NATS configuration extends JSON, and can represent Units and Variables. They must be wrapped in `<< >>` in order to template correctly. Example:
|
||||
|
||||
```yaml
|
||||
config:
|
||||
merge:
|
||||
authorization:
|
||||
# variable
|
||||
token: << $TOKEN >>
|
||||
# units
|
||||
max_payload: << 2MB >>
|
||||
```
|
||||
|
||||
templates to the `nats.conf`:
|
||||
|
||||
```
|
||||
{
|
||||
"authorization": {
|
||||
"token": $TOKEN
|
||||
},
|
||||
"max_payload": 2MB,
|
||||
"port": 4222,
|
||||
...
|
||||
}
|
||||
```
|
||||
|
||||
### NATS Config Includes
|
||||
|
||||
Any NATS Config key ending in `$include` will be replaced with an include directive. Included files should be in paths relative to `/etc/nats-config`. Multiple `$include` keys are supported by using a prefix, and will be sorted alphabetically. Example:
|
||||
|
||||
```yaml
|
||||
config:
|
||||
merge:
|
||||
00$include: auth.conf
|
||||
01$include: params.conf
|
||||
configMap:
|
||||
merge:
|
||||
data:
|
||||
auth.conf: |
|
||||
accounts: {
|
||||
A: {
|
||||
users: [
|
||||
{user: a, password: a}
|
||||
]
|
||||
},
|
||||
B: {
|
||||
users: [
|
||||
{user: b, password: b}
|
||||
]
|
||||
},
|
||||
}
|
||||
params.conf: |
|
||||
max_payload: 2MB
|
||||
```
|
||||
|
||||
templates to the `nats.conf`:
|
||||
|
||||
```
|
||||
include auth.conf;
|
||||
"port": 4222,
|
||||
...
|
||||
include params.conf;
|
||||
```
|
||||
|
||||
### Extra Resources
|
||||
|
||||
Enables adding additional arbitrary resources. Example - expose WebSocket via VirtualService in Istio:
|
||||
|
||||
```yaml
|
||||
config:
|
||||
websocket:
|
||||
enabled: true
|
||||
extraResources:
|
||||
- apiVersion: networking.istio.io/v1beta1
|
||||
kind: VirtualService
|
||||
metadata:
|
||||
namespace:
|
||||
$tplYamlSpread: >
|
||||
{{ include "nats.metadataNamespace" $ }}
|
||||
name:
|
||||
$tplYaml: >
|
||||
{{ include "nats.fullname" $ | quote }}
|
||||
labels:
|
||||
$tplYaml: |
|
||||
{{ include "nats.labels" $ }}
|
||||
spec:
|
||||
hosts:
|
||||
- demo.nats.io
|
||||
gateways:
|
||||
- my-gateway
|
||||
http:
|
||||
- name: default
|
||||
match:
|
||||
- name: root
|
||||
uri:
|
||||
exact: /
|
||||
route:
|
||||
- destination:
|
||||
host:
|
||||
$tplYaml: >
|
||||
{{ .Values.service.name | quote }}
|
||||
port:
|
||||
number:
|
||||
$tplYaml: >
|
||||
{{ .Values.config.websocket.port }}
|
||||
```
|
|
@ -0,0 +1,155 @@
|
|||
# Upgrading from 0.x to 1.x
|
||||
|
||||
Instructions for upgrading an existing `nats` 0.x release to 1.x.
|
||||
|
||||
## Rename Immutable Fields
|
||||
|
||||
There are a number of immutable fields in the NATS Stateful Set and NATS Box deployment. All 1.x `values.yaml` files targeting an existing 0.x release will require some or all of these settings:
|
||||
|
||||
```yaml
|
||||
config:
|
||||
# required if using JetStream file storage
|
||||
jetstream:
|
||||
# uncomment the next line if using JetStream file storage
|
||||
# enabled: true
|
||||
fileStore:
|
||||
pvc:
|
||||
name:
|
||||
$tplYaml: >-
|
||||
{{ include "nats.fullname" . }}-js-pvc
|
||||
# set other PVC options here to make it match 0.x, refer to values.yaml for schema
|
||||
|
||||
# required if using a full or cache resolver
|
||||
resolver:
|
||||
# uncomment the next line if using a full or cache resolver
|
||||
# enabled: true
|
||||
pvc:
|
||||
name: nats-jwt-pvc
|
||||
# set other PVC options here to make it match 0.x, refer to values.yaml for schema
|
||||
|
||||
# required
|
||||
statefulSet:
|
||||
patch:
|
||||
- op: remove
|
||||
path: /spec/selector/matchLabels/app.kubernetes.io~1component
|
||||
- $tplYamlSpread: |-
|
||||
{{- if and
|
||||
.Values.config.jetstream.enabled
|
||||
.Values.config.jetstream.fileStore.enabled
|
||||
.Values.config.jetstream.fileStore.pvc.enabled
|
||||
.Values.config.resolver.enabled
|
||||
.Values.config.resolver.pvc.enabled
|
||||
}}
|
||||
- op: move
|
||||
from: /spec/volumeClaimTemplates/0
|
||||
path: /spec/volumeClaimTemplates/1
|
||||
{{- else}}
|
||||
[]
|
||||
{{- end }}
|
||||
|
||||
# required
|
||||
headlessService:
|
||||
name:
|
||||
$tplYaml: >-
|
||||
{{ include "nats.fullname" . }}
|
||||
|
||||
# required unless 0.x values explicitly set nats.serviceAccount.create=false
|
||||
serviceAccount:
|
||||
enabled: true
|
||||
|
||||
# required to use new ClusterIP service for Clients accessing NATS
|
||||
# if using TLS, this may require adding another SAN
|
||||
service:
|
||||
# uncomment the next line to disable the new ClusterIP service
|
||||
# enabled: false
|
||||
name:
|
||||
$tplYaml: >-
|
||||
{{ include "nats.fullname" . }}-svc
|
||||
|
||||
# required if using NatsBox
|
||||
natsBox:
|
||||
deployment:
|
||||
patch:
|
||||
- op: replace
|
||||
path: /spec/selector/matchLabels
|
||||
value:
|
||||
app: nats-box
|
||||
- op: add
|
||||
path: /spec/template/metadata/labels/app
|
||||
value: nats-box
|
||||
```
|
||||
|
||||
## Update NATS Config to new values.yaml schema
|
||||
|
||||
Most values that control the NATS Config have changed and moved under the `config` key. Refer to the 1.x Chart's [values.yaml](values.yaml) for the complete schema.
|
||||
|
||||
After migrating to the new values schema, ensure that changes you expect in the NATS Config files match by templating the old and new config files.
|
||||
|
||||
Template your old 0.x Config Map, this example uses a file called `values-old.yaml`:
|
||||
|
||||
```sh
|
||||
helm template \
|
||||
--version "0.x" \
|
||||
-f values-old.yaml \
|
||||
-s templates/configmap.yaml \
|
||||
nats \
|
||||
nats/nats
|
||||
```
|
||||
|
||||
Template your new 1.x Config Map, this example uses a file called `values.yaml`:
|
||||
|
||||
```sh
|
||||
helm template \
|
||||
--version "^1-beta" \
|
||||
-f values.yaml \
|
||||
-s templates/config-map.yaml \
|
||||
nats \
|
||||
nats/nats
|
||||
```
|
||||
|
||||
## Update Kubernetes Resources to new values.yaml schema
|
||||
|
||||
Most values that control Kubernetes Resources have been changed. Refer to the 1.x Chart's [values.yaml](values.yaml) for the complete schema.
|
||||
|
||||
After migrating to the new values schema, ensure that changes you expect in resources match by templating the old and new resources.
|
||||
|
||||
| Resource | 0.x Template File | 1.x Template File |
|
||||
|-------------------------|---------------------------------|-------------------------------------------|
|
||||
| Config Map | `templates/configmap.yaml` | `templates/config-map.yaml` |
|
||||
| Stateful Set | `templates/statefulset.yaml` | `templates/stateful-set.yaml` |
|
||||
| Headless Service | `templates/service.yaml` | `templates/headless-service.yaml` |
|
||||
| ClusterIP Service | N/A | `templates/service.yaml` |
|
||||
| Network Policy | `templates/networkpolicy.yaml` | N/A |
|
||||
| Pod Disruption Budget | `templates/pdb.yaml` | `templates/pod-disruption-budget.yaml` |
|
||||
| Service Account | `templates/rbac.yaml` | `templates/service-account.yaml` |
|
||||
| Resource | `templates/` | `templates/` |
|
||||
| Resource | `templates/` | `templates/` |
|
||||
| Prometheus Monitor | `templates/serviceMonitor.yaml` | `templates/pod-monitor.yaml` |
|
||||
| NatsBox Deployment | `templates/nats-box.yaml` | `templates/nats-box/deployment.yaml` |
|
||||
| NatsBox Service Account | N/A | `templates/nats-box/service-account.yaml` |
|
||||
| NatsBox Contents Secret | N/A | `templates/nats-box/contents-secret.yaml` |
|
||||
| NatsBox Contexts Secret | N/A | `templates/nats-box/contexts-secret.yaml` |
|
||||
|
||||
For example, to check that the Stateful Set matches:
|
||||
|
||||
Template your old 0.x Stateful Set, this example uses a file called `values-old.yaml`:
|
||||
|
||||
```sh
|
||||
helm template \
|
||||
--version "0.x" \
|
||||
-f values-old.yaml \
|
||||
-s templates/statefulset.yaml \
|
||||
nats \
|
||||
nats/nats
|
||||
```
|
||||
|
||||
Template your new 1.x Stateful Set, this example uses a file called `values.yaml`:
|
||||
|
||||
```sh
|
||||
helm template \
|
||||
--version "^1-beta" \
|
||||
-f values.yaml \
|
||||
-s templates/stateful-set.yaml \
|
||||
nats \
|
||||
nats/nats
|
||||
```
|
|
@ -0,0 +1,3 @@
|
|||
# NATS Server
|
||||
|
||||
[NATS](https://nats.io) is a simple, secure and performant communications system for digital systems, services and devices. NATS is part of the Cloud Native Computing Foundation ([CNCF](https://cncf.io)). NATS has over [30 client language implementations](https://nats.io/download/), and its server can run on-premise, in the cloud, at the edge, and even on a Raspberry Pi. NATS can secure and simplify design and operation of modern distributed systems.
|
|
@ -0,0 +1,10 @@
|
|||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.configMap.name }}
|
||||
labels:
|
||||
{{- include "nats.labels" $ | nindent 4 }}
|
||||
data:
|
||||
nats.conf: |
|
||||
{{- include "nats.formatConfig" .config | nindent 4 }}
|
|
@ -0,0 +1,32 @@
|
|||
{{- with .Values.config.cluster }}
|
||||
name: {{ $.Values.statefulSet.name }}
|
||||
port: {{ .port }}
|
||||
no_advertise: true
|
||||
routes:
|
||||
{{- $proto := ternary "tls" "nats" .tls.enabled }}
|
||||
{{- $auth := "" }}
|
||||
{{- if and .routeURLs.user .routeURLs.password }}
|
||||
{{- $auth = printf "%s:%s@" (urlquery .routeURLs.user) (urlquery .routeURLs.password) -}}
|
||||
{{- end }}
|
||||
{{- $domain := $.Values.headlessService.name }}
|
||||
{{- if .routeURLs.useFQDN }}
|
||||
{{- $domain = printf "%s.%s.svc.%s" $domain (include "nats.namespace" $) .routeURLs.k8sClusterDomain }}
|
||||
{{- end }}
|
||||
{{- $port := (int .port) }}
|
||||
{{- range $i, $_ := until (int .replicas) }}
|
||||
- {{ printf "%s://%s%s-%d.%s:%d" $proto $auth $.Values.statefulSet.name $i $domain $port }}
|
||||
{{- end }}
|
||||
|
||||
{{- if and .routeURLs.user .routeURLs.password }}
|
||||
authorization:
|
||||
user: {{ .routeURLs.user | quote }}
|
||||
password: {{ .routeURLs.password | quote }}
|
||||
{{- end }}
|
||||
|
||||
{{- with .tls }}
|
||||
{{- if .enabled }}
|
||||
tls:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,114 @@
|
|||
{{- with .Values.config }}
|
||||
|
||||
server_name: << $SERVER_NAME >>
|
||||
lame_duck_grace_period: 10s
|
||||
lame_duck_duration: 30s
|
||||
pid_file: /var/run/nats/nats.pid
|
||||
|
||||
########################################
|
||||
# NATS
|
||||
########################################
|
||||
{{- with .nats }}
|
||||
port: {{ .port }}
|
||||
|
||||
{{- with .tls }}
|
||||
{{- if .enabled }}
|
||||
tls:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
########################################
|
||||
# leafnodes
|
||||
########################################
|
||||
{{- with .leafnodes }}
|
||||
{{- if .enabled }}
|
||||
leafnodes:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/leafnodes.yaml" "ctx" $) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
########################################
|
||||
# websocket
|
||||
########################################
|
||||
{{- with .websocket }}
|
||||
{{- if .enabled }}
|
||||
websocket:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/websocket.yaml" "ctx" $) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
########################################
|
||||
# MQTT
|
||||
########################################
|
||||
{{- with .mqtt }}
|
||||
{{- if .enabled }}
|
||||
mqtt:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/mqtt.yaml" "ctx" $) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
########################################
|
||||
# cluster
|
||||
########################################
|
||||
{{- with .cluster }}
|
||||
{{- if .enabled }}
|
||||
cluster:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/cluster.yaml" "ctx" $) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
########################################
|
||||
# gateway
|
||||
########################################
|
||||
{{- with .gateway }}
|
||||
{{- if .enabled }}
|
||||
gateway:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/gateway.yaml" "ctx" $) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
########################################
|
||||
# monitor
|
||||
########################################
|
||||
{{- with .monitor }}
|
||||
{{- if .enabled }}
|
||||
{{- if .tls.enabled }}
|
||||
https_port: {{ .port }}
|
||||
{{- else }}
|
||||
http_port: {{ .port }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
########################################
|
||||
# profiling
|
||||
########################################
|
||||
{{- with .profiling }}
|
||||
{{- if .enabled }}
|
||||
prof_port: {{ .port }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
########################################
|
||||
# jetstream
|
||||
########################################
|
||||
{{- with $.Values.config.jetstream -}}
|
||||
{{- if .enabled }}
|
||||
jetstream:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/jetstream.yaml" "ctx" $) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
########################################
|
||||
# resolver
|
||||
########################################
|
||||
{{- with $.Values.config.resolver -}}
|
||||
{{- if .enabled }}
|
||||
resolver:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/resolver.yaml" "ctx" $) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{- end }}
|
|
@ -0,0 +1,11 @@
|
|||
{{- with .Values.config.gateway }}
|
||||
name: {{ $.Values.statefulSet.name }}
|
||||
port: {{ .port }}
|
||||
|
||||
{{- with .tls }}
|
||||
{{- if .enabled }}
|
||||
tls:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,23 @@
|
|||
{{- with .Values.config.jetstream }}
|
||||
{{- with .memoryStore }}
|
||||
{{- if .enabled }}
|
||||
{{- with .maxSize }}
|
||||
max_memory_store: << {{ . }} >>
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
max_memory_store: 0
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- with .fileStore }}
|
||||
{{- if .enabled }}
|
||||
store_dir: {{ .dir }}
|
||||
{{- if .maxSize }}
|
||||
max_file_store: << {{ .maxSize }} >>
|
||||
{{- else if .pvc.enabled }}
|
||||
max_file_store: << {{ .pvc.size }} >>
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
max_file_store: 0
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,11 @@
|
|||
{{- with .Values.config.leafnodes }}
|
||||
port: {{ .port }}
|
||||
no_advertise: true
|
||||
|
||||
{{- with .tls }}
|
||||
{{- if .enabled }}
|
||||
tls:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,10 @@
|
|||
{{- with .Values.config.mqtt }}
|
||||
port: {{ .port }}
|
||||
|
||||
{{- with .tls }}
|
||||
{{- if .enabled }}
|
||||
tls:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,10 @@
|
|||
{{- with .protocol }}
|
||||
port: {{ .port }}
|
||||
|
||||
{{- with .tls }}
|
||||
{{- if .enabled }}
|
||||
tls:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,3 @@
|
|||
{{- with .Values.config.resolver }}
|
||||
dir: {{ .dir }}
|
||||
{{- end }}
|
|
@ -0,0 +1,16 @@
|
|||
# tls
|
||||
{{- with .tls }}
|
||||
{{- if .secretName }}
|
||||
{{- $dir := trimSuffix "/" .dir }}
|
||||
cert_file: {{ printf "%s/%s" $dir (.cert | default "tls.crt") | quote }}
|
||||
key_file: {{ printf "%s/%s" $dir (.key | default "tls.key") | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
# tlsCA
|
||||
{{- with $.Values.tlsCA }}
|
||||
{{- if and .enabled (or .configMapName .secretName) }}
|
||||
{{- $dir := trimSuffix "/" .dir }}
|
||||
ca_file: {{ printf "%s/%s" $dir (.key | default "ca.crt") | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,12 @@
|
|||
{{- with .Values.config.websocket }}
|
||||
port: {{ .port }}
|
||||
|
||||
{{- if .tls.enabled }}
|
||||
{{- with .tls }}
|
||||
tls:
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
no_tls: true
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,24 @@
|
|||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.headlessService.name }}
|
||||
labels:
|
||||
{{- include "nats.labels" $ | nindent 4 }}
|
||||
spec:
|
||||
selector:
|
||||
{{- include "nats.selectorLabels" $ | nindent 4 }}
|
||||
clusterIP: None
|
||||
publishNotReadyAddresses: true
|
||||
ports:
|
||||
{{- range $protocol := list "nats" "leafnodes" "websocket" "mqtt" "cluster" "gateway" "monitor" "profiling" }}
|
||||
{{- $configProtocol := get $.Values.config $protocol }}
|
||||
{{- if or (eq $protocol "nats") $configProtocol.enabled }}
|
||||
{{- $tlsEnabled := false }}
|
||||
{{- if hasKey $configProtocol "tls" }}
|
||||
{{- $tlsEnabled = $configProtocol.tls.enabled }}
|
||||
{{- end }}
|
||||
{{- $appProtocol := or (eq $protocol "websocket") (eq $protocol "monitor") | ternary ($tlsEnabled | ternary "https" "http") ($tlsEnabled | ternary "tls" "tcp") }}
|
||||
- {{ dict "name" $protocol "port" $configProtocol.port "targetPort" $protocol "appProtocol" $appProtocol | toYaml | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,34 @@
|
|||
{{- with .Values.config.websocket.ingress }}
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .name }}
|
||||
labels:
|
||||
{{- include "nats.labels" $ | nindent 4 }}
|
||||
spec:
|
||||
{{- with .className }}
|
||||
ingressClassName: {{ . | quote }}
|
||||
{{- end }}
|
||||
rules:
|
||||
{{- $path := .path }}
|
||||
{{- $pathType := .pathType }}
|
||||
{{- range .hosts }}
|
||||
- host: {{ . | quote }}
|
||||
http:
|
||||
paths:
|
||||
- path: {{ $path | quote }}
|
||||
pathType: {{ $pathType | quote }}
|
||||
backend:
|
||||
service:
|
||||
name: {{ $.Values.service.name }}
|
||||
port:
|
||||
name: websocket
|
||||
{{- end }}
|
||||
{{- if .tlsSecretName }}
|
||||
tls:
|
||||
- secretName: {{ .tlsSecretName | quote }}
|
||||
hosts:
|
||||
{{- toYaml .hosts | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,17 @@
|
|||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.natsBox.contentsSecret.name }}
|
||||
labels:
|
||||
{{- include "natsBox.labels" $ | nindent 4 }}
|
||||
type: Opaque
|
||||
stringData:
|
||||
{{- range $ctxKey, $ctxVal := .Values.natsBox.contexts }}
|
||||
{{- range $secretKey, $secretVal := dict "creds" "creds" "nkey" "nk" }}
|
||||
{{- $secret := get $ctxVal $secretKey }}
|
||||
{{- if and $secret $secret.contents }}
|
||||
"{{ $ctxKey }}.{{ $secretVal }}": {{ $secret.contents | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,51 @@
|
|||
{{- $contextName := .contextName }}
|
||||
|
||||
# url
|
||||
{{- if .Values.service.enabled }}
|
||||
url: nats://{{ .Values.service.name }}
|
||||
{{- else }}
|
||||
url: nats://{{ .Values.headlessService.name }}
|
||||
{{- end }}
|
||||
|
||||
{{- with .context }}
|
||||
|
||||
# creds
|
||||
{{- with .creds}}
|
||||
{{- if .contents }}
|
||||
creds: /etc/nats-contents/{{ $contextName }}.creds
|
||||
{{- else if .secretName }}
|
||||
{{- $dir := trimSuffix "/" .dir }}
|
||||
creds: {{ printf "%s/%s" $dir (.key | default "nats.creds") | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
# nkey
|
||||
{{- with .nkey}}
|
||||
{{- if .contents }}
|
||||
nkey: /etc/nats-contents/{{ $contextName }}.nk
|
||||
{{- else if .secretName }}
|
||||
{{- $dir := trimSuffix "/" .dir }}
|
||||
nkey: {{ printf "%s/%s" $dir (.key | default "nats.nk") | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
# tls
|
||||
{{- with .tls }}
|
||||
{{- if .secretName }}
|
||||
{{- $dir := trimSuffix "/" .dir }}
|
||||
cert: {{ printf "%s/%s" $dir (.cert | default "tls.crt") | quote }}
|
||||
key: {{ printf "%s/%s" $dir (.key | default "tls.key") | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
# tlsCA
|
||||
{{- if $.Values.config.nats.tls.enabled }}
|
||||
{{- with $.Values.tlsCA }}
|
||||
{{- if and .enabled (or .configMapName .secretName) }}
|
||||
{{- $dir := trimSuffix "/" .dir }}
|
||||
ca: {{ printf "%s/%s" $dir (.key | default "ca.crt") | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{- end }}
|
|
@ -0,0 +1,13 @@
|
|||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.natsBox.contextsSecret.name }}
|
||||
labels:
|
||||
{{- include "natsBox.labels" $ | nindent 4 }}
|
||||
type: Opaque
|
||||
stringData:
|
||||
{{- range $ctxKey, $ctxVal := .Values.natsBox.contexts }}
|
||||
"{{ $ctxKey }}.json": |
|
||||
{{- include "toPrettyRawJson" (include "nats.loadMergePatch" (dict "file" "nats-box/contexts-secret/context.yaml" "merge" (.merge | default dict) "patch" (.patch | default list) "ctx" (merge (dict "contextName" $ctxKey "context" $ctxVal) $)) | fromYaml) | nindent 4 }}
|
||||
{{- end }}
|
|
@ -0,0 +1,46 @@
|
|||
name: nats-box
|
||||
{{ include "nats.image" (merge (pick $.Values "global") .Values.natsBox.container.image) }}
|
||||
|
||||
{{- with .Values.natsBox.container.env }}
|
||||
env:
|
||||
{{- include "nats.env" . }}
|
||||
{{- end }}
|
||||
|
||||
command:
|
||||
- sh
|
||||
- -ec
|
||||
- |
|
||||
work_dir="$(pwd)"
|
||||
mkdir -p "$XDG_CONFIG_HOME/nats"
|
||||
cd "$XDG_CONFIG_HOME/nats"
|
||||
if ! [ -s context ]; then
|
||||
ln -s /etc/nats-contexts context
|
||||
fi
|
||||
{{- if .Values.natsBox.defaultContextName }}
|
||||
if ! [ -f context.txt ]; then
|
||||
echo -n {{ .Values.natsBox.defaultContextName | quote }} > context.txt
|
||||
fi
|
||||
{{- end }}
|
||||
cd "$work_dir"
|
||||
exec /entrypoint.sh "$@"
|
||||
- --
|
||||
args:
|
||||
- sh
|
||||
- -ec
|
||||
- trap true INT TERM; sleep infinity & wait
|
||||
volumeMounts:
|
||||
# contexts secret
|
||||
- name: contexts
|
||||
mountPath: /etc/nats-contexts
|
||||
# contents secret
|
||||
{{- if .hasContentsSecret }}
|
||||
- name: contents
|
||||
mountPath: /etc/nats-contents
|
||||
{{- end }}
|
||||
# tlsCA
|
||||
{{- include "nats.tlsCAVolumeMount" $ }}
|
||||
# secrets
|
||||
{{- range (include "natsBox.secretNames" $ | fromJson).secretNames }}
|
||||
- name: {{ .name | quote }}
|
||||
mountPath: {{ .dir | quote }}
|
||||
{{- end }}
|
|
@ -0,0 +1,16 @@
|
|||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.natsBox.deployment.name }}
|
||||
labels:
|
||||
{{- include "natsBox.labels" $ | nindent 4 }}
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
{{- include "natsBox.selectorLabels" $ | nindent 6 }}
|
||||
replicas: 1
|
||||
template:
|
||||
{{- with .Values.natsBox.podTemplate }}
|
||||
{{ include "nats.loadMergePatch" (merge (dict "file" "nats-box/deployment/pod-template.yaml" "ctx" $) .) | nindent 4 }}
|
||||
{{- end }}
|
|
@ -0,0 +1,44 @@
|
|||
metadata:
|
||||
labels:
|
||||
{{- include "natsBox.labels" $ | nindent 4 }}
|
||||
spec:
|
||||
containers:
|
||||
{{- with .Values.natsBox.container }}
|
||||
- {{ include "nats.loadMergePatch" (merge (dict "file" "nats-box/deployment/container.yaml" "ctx" $) .) | nindent 4 }}
|
||||
{{- end }}
|
||||
|
||||
# service discovery uses DNS; don't need service env vars
|
||||
enableServiceLinks: false
|
||||
|
||||
{{- with .Values.global.image.pullSecretNames }}
|
||||
imagePullSecrets:
|
||||
{{- range . }}
|
||||
- name: {{ . | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{- with .Values.natsBox.serviceAccount }}
|
||||
{{- if .enabled }}
|
||||
serviceAccountName: {{ .name | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
volumes:
|
||||
# contexts secret
|
||||
- name: contexts
|
||||
secret:
|
||||
secretName: {{ .Values.natsBox.contextsSecret.name }}
|
||||
# contents secret
|
||||
{{- if .hasContentsSecret }}
|
||||
- name: contents
|
||||
secret:
|
||||
secretName: {{ .Values.natsBox.contentsSecret.name }}
|
||||
{{- end }}
|
||||
# tlsCA
|
||||
{{- include "nats.tlsCAVolume" $ | nindent 2 }}
|
||||
# secrets
|
||||
{{- range (include "natsBox.secretNames" $ | fromJson).secretNames }}
|
||||
- name: {{ .name | quote }}
|
||||
secret:
|
||||
secretName: {{ .secretName | quote }}
|
||||
{{- end }}
|
|
@ -0,0 +1,7 @@
|
|||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.natsBox.serviceAccount.name }}
|
||||
labels:
|
||||
{{- include "natsBox.labels" $ | nindent 4 }}
|
|
@ -0,0 +1,12 @@
|
|||
apiVersion: policy/v1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.podDisruptionBudget.name }}
|
||||
labels:
|
||||
{{- include "nats.labels" $ | nindent 4 }}
|
||||
spec:
|
||||
maxUnavailable: 1
|
||||
selector:
|
||||
matchLabels:
|
||||
{{- include "nats.selectorLabels" $ | nindent 6 }}
|
|
@ -0,0 +1,13 @@
|
|||
apiVersion: monitoring.coreos.com/v1
|
||||
kind: PodMonitor
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.promExporter.podMonitor.name }}
|
||||
labels:
|
||||
{{- include "nats.labels" $ | nindent 4 }}
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
{{- include "nats.selectorLabels" $ | nindent 6 }}
|
||||
podMetricsEndpoints:
|
||||
- port: prom-metrics
|
|
@ -0,0 +1,7 @@
|
|||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.serviceAccount.name }}
|
||||
labels:
|
||||
{{- include "nats.labels" $ | nindent 4 }}
|
|
@ -0,0 +1,23 @@
|
|||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.service.name }}
|
||||
labels:
|
||||
{{- include "nats.labels" $ | nindent 4 }}
|
||||
spec:
|
||||
selector:
|
||||
{{- include "nats.selectorLabels" $ | nindent 4 }}
|
||||
ports:
|
||||
{{- range $protocol := list "nats" "leafnodes" "websocket" "mqtt" "cluster" "gateway" "monitor" "profiling" }}
|
||||
{{- $configProtocol := get $.Values.config $protocol }}
|
||||
{{- $servicePort := get $.Values.service.ports $protocol }}
|
||||
{{- if and (or (eq $protocol "nats") $configProtocol.enabled) $servicePort.enabled }}
|
||||
{{- $tlsEnabled := false }}
|
||||
{{- if hasKey $configProtocol "tls" }}
|
||||
{{- $tlsEnabled = $configProtocol.tls.enabled }}
|
||||
{{- end }}
|
||||
{{- $appProtocol := or (eq $protocol "websocket") (eq $protocol "monitor") | ternary ($tlsEnabled | ternary "https" "http") ($tlsEnabled | ternary "tls" "tcp") }}
|
||||
- {{ merge (dict "name" $protocol "targetPort" $protocol "appProtocol" $appProtocol) (omit $servicePort "enabled") (dict "port" $configProtocol.port) | toYaml | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,13 @@
|
|||
{{- with .Values.config.jetstream.fileStore.pvc }}
|
||||
metadata:
|
||||
name: {{ .name }}
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
resources:
|
||||
requests:
|
||||
storage: {{ .size | quote }}
|
||||
{{- with .storageClassName }}
|
||||
storageClassName: {{ . | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,106 @@
|
|||
name: nats
|
||||
{{ include "nats.image" (merge (pick $.Values "global") .Values.container.image) }}
|
||||
|
||||
ports:
|
||||
{{- range $protocol := list "nats" "leafnodes" "websocket" "mqtt" "cluster" "gateway" "monitor" "profiling" }}
|
||||
{{- $configProtocol := get $.Values.config $protocol }}
|
||||
{{- $containerPort := get $.Values.container.ports $protocol }}
|
||||
{{- if or (eq $protocol "nats") $configProtocol.enabled }}
|
||||
- {{ merge (dict "name" $protocol "containerPort" $configProtocol.port) $containerPort | toYaml | nindent 2 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
args:
|
||||
- --config
|
||||
- /etc/nats-config/nats.conf
|
||||
|
||||
env:
|
||||
- name: POD_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.name
|
||||
- name: SERVER_NAME
|
||||
value: {{ printf "%s$(POD_NAME)" .Values.config.serverNamePrefix | quote }}
|
||||
{{- with .Values.container.env }}
|
||||
{{- include "nats.env" . }}
|
||||
{{- end }}
|
||||
|
||||
lifecycle:
|
||||
preStop:
|
||||
exec:
|
||||
# send the lame duck shutdown signal to trigger a graceful shutdown
|
||||
command:
|
||||
- nats-server
|
||||
- -sl=ldm=/var/run/nats/nats.pid
|
||||
|
||||
{{- with .Values.config.monitor }}
|
||||
{{- if .enabled }}
|
||||
startupProbe:
|
||||
httpGet:
|
||||
path: /healthz
|
||||
port: monitor
|
||||
{{- if .tls.enabled }}
|
||||
scheme: HTTPS
|
||||
{{- end}}
|
||||
initialDelaySeconds: 10
|
||||
timeoutSeconds: 5
|
||||
periodSeconds: 10
|
||||
successThreshold: 1
|
||||
failureThreshold: 90
|
||||
readinessProbe:
|
||||
httpGet:
|
||||
path: /healthz?js-server-only=true
|
||||
port: monitor
|
||||
{{- if .tls.enabled }}
|
||||
scheme: HTTPS
|
||||
{{- end}}
|
||||
initialDelaySeconds: 10
|
||||
timeoutSeconds: 5
|
||||
periodSeconds: 10
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /healthz?js-enabled-only=true
|
||||
port: monitor
|
||||
{{- if .tls.enabled }}
|
||||
scheme: HTTPS
|
||||
{{- end}}
|
||||
initialDelaySeconds: 10
|
||||
timeoutSeconds: 5
|
||||
periodSeconds: 30
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
volumeMounts:
|
||||
# nats config
|
||||
- name: config
|
||||
mountPath: /etc/nats-config
|
||||
# PID volume
|
||||
- name: pid
|
||||
mountPath: /var/run/nats
|
||||
# JetStream PVC
|
||||
{{- with .Values.config.jetstream }}
|
||||
{{- if and .enabled .fileStore.enabled .fileStore.pvc.enabled }}
|
||||
{{- with .fileStore }}
|
||||
- name: {{ .pvc.name }}
|
||||
mountPath: {{ .dir | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
# resolver PVC
|
||||
{{- with .Values.config.resolver }}
|
||||
{{- if and .enabled .pvc.enabled }}
|
||||
- name: {{ .pvc.name }}
|
||||
mountPath: {{ .dir | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
# tlsCA
|
||||
{{- include "nats.tlsCAVolumeMount" $ }}
|
||||
# secrets
|
||||
{{- range (include "nats.secretNames" $ | fromJson).secretNames }}
|
||||
- name: {{ .name | quote }}
|
||||
mountPath: {{ .dir | quote }}
|
||||
{{- end }}
|
|
@ -0,0 +1,71 @@
|
|||
metadata:
|
||||
labels:
|
||||
{{- include "nats.labels" $ | nindent 4 }}
|
||||
annotations:
|
||||
{{- if .Values.podTemplate.configChecksumAnnotation }}
|
||||
{{- $configMap := include "nats.loadMergePatch" (merge (dict "file" "config-map.yaml" "ctx" $) $.Values.configMap) }}
|
||||
checksum/config: {{ sha256sum $configMap }}
|
||||
{{- end }}
|
||||
spec:
|
||||
containers:
|
||||
# nats
|
||||
{{- $nats := dict }}
|
||||
{{- with .Values.container }}
|
||||
{{- $nats = include "nats.loadMergePatch" (merge (dict "file" "stateful-set/nats-container.yaml" "ctx" $) .) | fromYaml }}
|
||||
- {{ toYaml $nats | nindent 4 }}
|
||||
{{- end }}
|
||||
# reloader
|
||||
{{- with .Values.reloader }}
|
||||
{{- if .enabled }}
|
||||
- {{ include "nats.loadMergePatch" (merge (dict "file" "stateful-set/reloader-container.yaml" "ctx" (merge (dict "natsVolumeMounts" $nats.volumeMounts) $)) .) | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- with .Values.promExporter }}
|
||||
{{- if .enabled }}
|
||||
- {{ include "nats.loadMergePatch" (merge (dict "file" "stateful-set/prom-exporter-container.yaml" "ctx" $) .) | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
# service discovery uses DNS; don't need service env vars
|
||||
enableServiceLinks: false
|
||||
|
||||
{{- with .Values.global.image.pullSecretNames }}
|
||||
imagePullSecrets:
|
||||
{{- range . }}
|
||||
- name: {{ . | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{- with .Values.serviceAccount }}
|
||||
{{- if .enabled }}
|
||||
serviceAccountName: {{ .name | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{- if .Values.reloader.enabled }}
|
||||
shareProcessNamespace: true
|
||||
{{- end }}
|
||||
|
||||
volumes:
|
||||
# nats config
|
||||
- name: config
|
||||
configMap:
|
||||
name: {{ .Values.configMap.name }}
|
||||
# PID volume
|
||||
- name: pid
|
||||
emptyDir: {}
|
||||
# tlsCA
|
||||
{{- include "nats.tlsCAVolume" $ | nindent 2 }}
|
||||
# secrets
|
||||
{{- range (include "nats.secretNames" $ | fromJson).secretNames }}
|
||||
- name: {{ .name | quote }}
|
||||
secret:
|
||||
secretName: {{ .secretName | quote }}
|
||||
{{- end }}
|
||||
|
||||
{{- with .Values.podTemplate.topologySpreadConstraints }}
|
||||
topologySpreadConstraints:
|
||||
{{- range $k, $v := . }}
|
||||
- {{ merge (dict "topologyKey" $k "labelSelector" (dict "matchLabels" (include "nats.selectorLabels" $ | fromYaml))) $v | toYaml | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end}}
|
|
@ -0,0 +1,30 @@
|
|||
name: prom-exporter
|
||||
{{ include "nats.image" (merge (pick $.Values "global") .Values.promExporter.image) }}
|
||||
|
||||
ports:
|
||||
- name: prom-metrics
|
||||
containerPort: {{ .Values.promExporter.port }}
|
||||
|
||||
{{- with .Values.promExporter.env }}
|
||||
env:
|
||||
{{- include "nats.env" . }}
|
||||
{{- end }}
|
||||
|
||||
args:
|
||||
- -port={{ .Values.promExporter.port }}
|
||||
- -connz
|
||||
- -routez
|
||||
- -subz
|
||||
- -varz
|
||||
- -prefix=nats
|
||||
- -use_internal_server_id
|
||||
{{- if .Values.config.jetstream.enabled }}
|
||||
- -jsz=all
|
||||
{{- end }}
|
||||
{{- if .Values.config.leafnodes.enabled }}
|
||||
- -leafz
|
||||
{{- end }}
|
||||
{{- if .Values.config.gateway.enabled }}
|
||||
- -gatewayz
|
||||
{{- end }}
|
||||
- http://localhost:{{ .Values.config.monitor.port }}/
|
|
@ -0,0 +1,27 @@
|
|||
name: reloader
|
||||
{{ include "nats.image" (merge (pick $.Values "global") .Values.reloader.image) }}
|
||||
|
||||
{{- with .Values.reloader.env }}
|
||||
env:
|
||||
{{- include "nats.env" . }}
|
||||
{{- end }}
|
||||
|
||||
args:
|
||||
- -pid
|
||||
- /var/run/nats/nats.pid
|
||||
- -config
|
||||
- /etc/nats-config/nats.conf
|
||||
{{ include "nats.reloaderConfig" (dict "config" .config "dir" "/etc/nats-config") }}
|
||||
|
||||
volumeMounts:
|
||||
- name: pid
|
||||
mountPath: /var/run/nats
|
||||
{{- range $mnt := .natsVolumeMounts }}
|
||||
{{- $found := false }}
|
||||
{{- range $.Values.reloader.natsVolumeMountPrefixes }}
|
||||
{{- if and (not $found) (hasPrefix . $mnt.mountPath) }}
|
||||
{{- $found = true }}
|
||||
- {{ toYaml $mnt | nindent 2}}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,13 @@
|
|||
{{- with .Values.config.resolver.pvc }}
|
||||
metadata:
|
||||
name: {{ .name }}
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
resources:
|
||||
requests:
|
||||
storage: {{ .size | quote }}
|
||||
{{- with .storageClassName }}
|
||||
storageClassName: {{ . | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,37 @@
|
|||
apiVersion: apps/v1
|
||||
kind: StatefulSet
|
||||
metadata:
|
||||
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||
name: {{ .Values.statefulSet.name }}
|
||||
labels:
|
||||
{{- include "nats.labels" $ | nindent 4 }}
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
{{- include "nats.selectorLabels" $ | nindent 6 }}
|
||||
{{- if .Values.config.cluster.enabled }}
|
||||
replicas: {{ .Values.config.cluster.replicas }}
|
||||
{{- else }}
|
||||
replicas: 1
|
||||
{{- end }}
|
||||
serviceName: {{ .Values.headlessService.name }}
|
||||
podManagementPolicy: Parallel
|
||||
template:
|
||||
{{- with .Values.podTemplate }}
|
||||
{{ include "nats.loadMergePatch" (merge (dict "file" "stateful-set/pod-template.yaml" "ctx" $) .) | nindent 4 }}
|
||||
{{- end }}
|
||||
volumeClaimTemplates:
|
||||
{{- with .Values.config.jetstream }}
|
||||
{{- if and .enabled .fileStore.enabled .fileStore.pvc.enabled }}
|
||||
{{- with .fileStore.pvc }}
|
||||
- {{ include "nats.loadMergePatch" (merge (dict "file" "stateful-set/jetstream-pvc.yaml" "ctx" $) .) | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- with .Values.config.resolver }}
|
||||
{{- if and .enabled .pvc.enabled }}
|
||||
{{- with .pvc }}
|
||||
- {{ include "nats.loadMergePatch" (merge (dict "file" "stateful-set/resolver-pvc.yaml" "ctx" $) .) | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,12 @@
|
|||
questions:
|
||||
- variable: cluster.enabled
|
||||
default: false
|
||||
type: boolean
|
||||
label: Enable Cluster
|
||||
group: "Cluster Settings"
|
||||
show_subquestion_if: "true"
|
||||
subquestions:
|
||||
- variable: cluster.replicas
|
||||
default: 3
|
||||
type: int
|
||||
label: Replicas
|
|
@ -0,0 +1,281 @@
|
|||
{{/*
|
||||
Expand the name of the chart.
|
||||
*/}}
|
||||
{{- define "nats.name" -}}
|
||||
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Create a default fully qualified app name.
|
||||
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
|
||||
If release name contains chart name it will be used as a full name.
|
||||
*/}}
|
||||
{{- define "nats.fullname" -}}
|
||||
{{- if .Values.fullnameOverride }}
|
||||
{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }}
|
||||
{{- else }}
|
||||
{{- $name := default .Chart.Name .Values.nameOverride }}
|
||||
{{- if contains $name .Release.Name }}
|
||||
{{- .Release.Name | trunc 63 | trimSuffix "-" }}
|
||||
{{- else }}
|
||||
{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Create chart name and version as used by the chart label.
|
||||
*/}}
|
||||
{{- define "nats.chart" -}}
|
||||
{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Print the namespace
|
||||
*/}}
|
||||
{{- define "nats.namespace" -}}
|
||||
{{- default .Release.Namespace .Values.namespaceOverride }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Print the namespace for the metadata section
|
||||
*/}}
|
||||
{{- define "nats.metadataNamespace" -}}
|
||||
{{- with .Values.namespaceOverride }}
|
||||
namespace: {{ . | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Set default values.
|
||||
*/}}
|
||||
{{- define "nats.defaultValues" }}
|
||||
{{- if not .defaultValuesSet }}
|
||||
{{- $name := include "nats.fullname" . }}
|
||||
{{- with .Values }}
|
||||
{{- $_ := set .config.jetstream.fileStore.pvc "name" (.config.jetstream.fileStore.pvc.name | default (printf "%s-js" $name)) }}
|
||||
{{- $_ := set .config.resolver.pvc "name" (.config.resolver.pvc.name | default (printf "%s-resolver" $name)) }}
|
||||
{{- $_ := set .config.websocket.ingress "name" (.config.websocket.ingress.name | default (printf "%s-ws" $name)) }}
|
||||
{{- $_ := set .configMap "name" (.configMap.name | default (printf "%s-config" $name)) }}
|
||||
{{- $_ := set .headlessService "name" (.headlessService.name | default (printf "%s-headless" $name)) }}
|
||||
{{- $_ := set .natsBox.contentsSecret "name" (.natsBox.contentsSecret.name | default (printf "%s-box-contents" $name)) }}
|
||||
{{- $_ := set .natsBox.contextsSecret "name" (.natsBox.contextsSecret.name | default (printf "%s-box-contexts" $name)) }}
|
||||
{{- $_ := set .natsBox.deployment "name" (.natsBox.deployment.name | default (printf "%s-box" $name)) }}
|
||||
{{- $_ := set .natsBox.serviceAccount "name" (.natsBox.serviceAccount.name | default (printf "%s-box" $name)) }}
|
||||
{{- $_ := set .podDisruptionBudget "name" (.podDisruptionBudget.name | default $name) }}
|
||||
{{- $_ := set .service "name" (.service.name | default $name) }}
|
||||
{{- $_ := set .serviceAccount "name" (.serviceAccount.name | default $name) }}
|
||||
{{- $_ := set .statefulSet "name" (.statefulSet.name | default $name) }}
|
||||
{{- $_ := set .promExporter.podMonitor "name" (.promExporter.podMonitor.name | default $name) }}
|
||||
{{- end }}
|
||||
|
||||
{{- $values := get (include "tplYaml" (dict "doc" .Values "ctx" $) | fromJson) "doc" }}
|
||||
{{- $_ := set . "Values" $values }}
|
||||
|
||||
{{- $hasContentsSecret := false }}
|
||||
{{- range $ctxKey, $ctxVal := .Values.natsBox.contexts }}
|
||||
{{- range $secretKey, $secretVal := dict "creds" "nats-creds" "nkey" "nats-nkeys" "tls" "nats-certs" }}
|
||||
{{- $secret := get $ctxVal $secretKey }}
|
||||
{{- if $secret }}
|
||||
{{- $_ := set $secret "dir" ($secret.dir | default (printf "/etc/%s/%s" $secretVal $ctxKey)) }}
|
||||
{{- if and (ne $secretKey "tls") $secret.contents }}
|
||||
{{- $hasContentsSecret = true }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- $_ := set $ "hasContentsSecret" $hasContentsSecret }}
|
||||
|
||||
{{- with .Values.config }}
|
||||
{{- $config := include "nats.loadMergePatch" (merge (dict "file" "config/config.yaml" "ctx" $) .) | fromYaml }}
|
||||
{{- $_ := set $ "config" $config }}
|
||||
{{- end }}
|
||||
|
||||
{{- $_ := set . "defaultValuesSet" true }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
NATS labels
|
||||
*/}}
|
||||
{{- define "nats.labels" -}}
|
||||
{{- with .Values.global.labels -}}
|
||||
{{ toYaml . }}
|
||||
{{ end -}}
|
||||
helm.sh/chart: {{ include "nats.chart" . }}
|
||||
{{ include "nats.selectorLabels" . }}
|
||||
{{- if .Chart.AppVersion }}
|
||||
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
|
||||
{{- end }}
|
||||
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
NATS selector labels
|
||||
*/}}
|
||||
{{- define "nats.selectorLabels" -}}
|
||||
app.kubernetes.io/name: {{ include "nats.name" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/component: nats
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
NATS Box labels
|
||||
*/}}
|
||||
{{- define "natsBox.labels" -}}
|
||||
{{- with .Values.global.labels -}}
|
||||
{{ toYaml . }}
|
||||
{{ end -}}
|
||||
helm.sh/chart: {{ include "nats.chart" . }}
|
||||
{{ include "natsBox.selectorLabels" . }}
|
||||
{{- if .Chart.AppVersion }}
|
||||
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
|
||||
{{- end }}
|
||||
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
NATS Box selector labels
|
||||
*/}}
|
||||
{{- define "natsBox.selectorLabels" -}}
|
||||
app.kubernetes.io/name: {{ include "nats.name" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/component: nats-box
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Print the image
|
||||
*/}}
|
||||
{{- define "nats.image" }}
|
||||
{{- $image := printf "%s:%s" .repository .tag }}
|
||||
{{- if or .registry .global.image.registry }}
|
||||
{{- $image = printf "%s/%s" (.registry | default .global.image.registry) $image }}
|
||||
{{- end -}}
|
||||
image: {{ $image }}
|
||||
{{- if or .pullPolicy .global.image.pullPolicy }}
|
||||
imagePullPolicy: {{ .pullPolicy | default .global.image.pullPolicy }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{- define "nats.secretNames" -}}
|
||||
{{- $secrets := list }}
|
||||
{{- range $protocol := list "nats" "leafnodes" "websocket" "mqtt" "cluster" "gateway" }}
|
||||
{{- $configProtocol := get $.Values.config $protocol }}
|
||||
{{- if and (or (eq $protocol "nats") $configProtocol.enabled) $configProtocol.tls.enabled $configProtocol.tls.secretName }}
|
||||
{{- $secrets = append $secrets (merge (dict "name" (printf "%s-tls" $protocol)) $configProtocol.tls) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- toJson (dict "secretNames" $secrets) }}
|
||||
{{- end }}
|
||||
|
||||
{{- define "natsBox.secretNames" -}}
|
||||
{{- $secrets := list }}
|
||||
{{- range $ctxKey, $ctxVal := .Values.natsBox.contexts }}
|
||||
{{- range $secretKey, $secretVal := dict "creds" "nats-creds" "nkey" "nats-nkeys" "tls" "nats-certs" }}
|
||||
{{- $secret := get $ctxVal $secretKey }}
|
||||
{{- if and $secret $secret.secretName }}
|
||||
{{- $secrets = append $secrets (merge (dict "name" (printf "ctx-%s-%s" $ctxKey $secretKey)) $secret) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- toJson (dict "secretNames" $secrets) }}
|
||||
{{- end }}
|
||||
|
||||
{{- define "nats.tlsCAVolume" -}}
|
||||
{{- with .Values.tlsCA }}
|
||||
{{- if and .enabled (or .configMapName .secretName) }}
|
||||
- name: tls-ca
|
||||
{{- if .configMapName }}
|
||||
configMap:
|
||||
name: {{ .configMapName | quote }}
|
||||
{{- else if .secretName }}
|
||||
secret:
|
||||
secretName: {{ .secretName | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{- define "nats.tlsCAVolumeMount" -}}
|
||||
{{- with .Values.tlsCA }}
|
||||
{{- if and .enabled (or .configMapName .secretName) }}
|
||||
- name: tls-ca
|
||||
mountPath: {{ .dir | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
translates env var map to list
|
||||
*/}}
|
||||
{{- define "nats.env" -}}
|
||||
{{- range $k, $v := . }}
|
||||
{{- if kindIs "string" $v }}
|
||||
- name: {{ $k | quote }}
|
||||
value: {{ $v | quote }}
|
||||
{{- else if kindIs "map" $v }}
|
||||
- {{ merge (dict "name" $k) $v | toYaml | nindent 2 }}
|
||||
{{- else }}
|
||||
{{- fail (cat "env var" $k "must be string or map, got" (kindOf $v)) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{- /*
|
||||
nats.loadMergePatch
|
||||
input: map with 4 keys:
|
||||
- file: name of file to load
|
||||
- ctx: context to pass to tpl
|
||||
- merge: interface{} to merge
|
||||
- patch: []interface{} valid JSON Patch document
|
||||
output: JSON encoded map with 1 key:
|
||||
- doc: interface{} patched json result
|
||||
*/}}
|
||||
{{- define "nats.loadMergePatch" -}}
|
||||
{{- $doc := tpl (.ctx.Files.Get (printf "files/%s" .file)) .ctx | fromYaml | default dict -}}
|
||||
{{- $doc = mergeOverwrite $doc (deepCopy (.merge | default dict)) -}}
|
||||
{{- get (include "jsonpatch" (dict "doc" $doc "patch" (.patch | default list)) | fromJson ) "doc" | toYaml -}}
|
||||
{{- end }}
|
||||
|
||||
|
||||
{{- /*
|
||||
nats.reloaderConfig
|
||||
input: map with 2 keys:
|
||||
- config: interface{} nats config
|
||||
- dir: dir config file is in
|
||||
output: YAML list of reloader config files
|
||||
*/}}
|
||||
{{- define "nats.reloaderConfig" -}}
|
||||
{{- $dir := trimSuffix "/" .dir -}}
|
||||
{{- with .config -}}
|
||||
{{- if kindIs "map" . -}}
|
||||
{{- range $k, $v := . -}}
|
||||
{{- if or (eq $k "cert_file") (eq $k "key_file") (eq $k "ca_file") }}
|
||||
- -config
|
||||
- {{ $v }}
|
||||
{{- else if hasSuffix "$include" $k }}
|
||||
- -config
|
||||
- {{ clean (printf "%s/%s" $dir $v) }}
|
||||
{{- else }}
|
||||
{{- include "nats.reloaderConfig" (dict "config" $v "dir" $dir) }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
|
||||
{{- /*
|
||||
nats.formatConfig
|
||||
input: map[string]interface{}
|
||||
output: string with following format rules
|
||||
1. keys ending in $natsRaw are unquoted
|
||||
2. keys ending in $natsInclude are converted to include directives
|
||||
*/}}
|
||||
{{- define "nats.formatConfig" -}}
|
||||
{{-
|
||||
(regexReplaceAll "\"<<\\s+(.*)\\s+>>\""
|
||||
(regexReplaceAll "\".*\\$include\": \"(.*)\",?" (include "toPrettyRawJson" .) "include ${1};")
|
||||
"${1}")
|
||||
-}}
|
||||
{{- end -}}
|
|
@ -0,0 +1,219 @@
|
|||
{{- /*
|
||||
jsonpatch
|
||||
input: map with 2 keys:
|
||||
- doc: interface{} valid JSON document
|
||||
- patch: []interface{} valid JSON Patch document
|
||||
output: JSON encoded map with 1 key:
|
||||
- doc: interface{} patched json result
|
||||
*/}}
|
||||
{{- define "jsonpatch" -}}
|
||||
{{- $params := fromJson (toJson .) -}}
|
||||
{{- $patches := $params.patch -}}
|
||||
{{- $docContainer := pick $params "doc" -}}
|
||||
|
||||
{{- range $patch := $patches -}}
|
||||
{{- if not (hasKey $patch "op") -}}
|
||||
{{- fail "patch is missing op key" -}}
|
||||
{{- end -}}
|
||||
{{- if and (ne $patch.op "add") (ne $patch.op "remove") (ne $patch.op "replace") (ne $patch.op "copy") (ne $patch.op "move") (ne $patch.op "test") -}}
|
||||
{{- fail (cat "patch has invalid op" $patch.op) -}}
|
||||
{{- end -}}
|
||||
{{- if not (hasKey $patch "path") -}}
|
||||
{{- fail "patch is missing path key" -}}
|
||||
{{- end -}}
|
||||
{{- if and (or (eq $patch.op "add") (eq $patch.op "replace") (eq $patch.op "test")) (not (hasKey $patch "value")) -}}
|
||||
{{- fail (cat "patch with op" $patch.op "is missing value key") -}}
|
||||
{{- end -}}
|
||||
{{- if and (or (eq $patch.op "copy") (eq $patch.op "move")) (not (hasKey $patch "from")) -}}
|
||||
{{- fail (cat "patch with op" $patch.op "is missing from key") -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- $opPathKeys := list "path" -}}
|
||||
{{- if or (eq $patch.op "copy") (eq $patch.op "move") -}}
|
||||
{{- $opPathKeys = append $opPathKeys "from" -}}
|
||||
{{- end -}}
|
||||
{{- $reSlice := list -}}
|
||||
|
||||
{{- range $opPathKey := $opPathKeys -}}
|
||||
{{- $obj := $docContainer -}}
|
||||
{{- if and (eq $patch.op "copy") (eq $opPathKey "from") -}}
|
||||
{{- $obj = (fromJson (toJson $docContainer)) -}}
|
||||
{{- end -}}
|
||||
{{- $key := "doc" -}}
|
||||
{{- $lastMap := dict "root" $obj -}}
|
||||
{{- $lastKey := "root" -}}
|
||||
{{- $paths := (splitList "/" (get $patch $opPathKey)) -}}
|
||||
{{- $firstPath := index $paths 0 -}}
|
||||
{{- if ne (index $paths 0) "" -}}
|
||||
{{- fail (cat "invalid" $opPathKey (get $patch $opPathKey) "must be empty string or start with /") -}}
|
||||
{{- end -}}
|
||||
{{- $paths = slice $paths 1 -}}
|
||||
|
||||
{{- range $path := $paths -}}
|
||||
{{- $path = replace "~1" "/" $path -}}
|
||||
{{- $path = replace "~0" "~" $path -}}
|
||||
|
||||
{{- if kindIs "slice" $obj -}}
|
||||
{{- $mapObj := dict -}}
|
||||
{{- range $i, $v := $obj -}}
|
||||
{{- $_ := set $mapObj (toString $i) $v -}}
|
||||
{{- end -}}
|
||||
{{- $obj = $mapObj -}}
|
||||
{{- $_ := set $lastMap $lastKey $obj -}}
|
||||
{{- $reSlice = prepend $reSlice (dict "lastMap" $lastMap "lastKey" $lastKey "mapObj" $obj) -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- if kindIs "map" $obj -}}
|
||||
{{- if not (hasKey $obj $key) -}}
|
||||
{{- fail (cat "key" $key "does not exist") -}}
|
||||
{{- end -}}
|
||||
{{- $lastKey = $key -}}
|
||||
{{- $lastMap = $obj -}}
|
||||
{{- $obj = index $obj $key -}}
|
||||
{{- $key = $path -}}
|
||||
{{- else -}}
|
||||
{{- fail (cat "cannot iterate into path" $key "on type" (kindOf $obj)) -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- $_ := set $patch (printf "%sKey" $opPathKey) $key -}}
|
||||
{{- $_ := set $patch (printf "%sLastKey" $opPathKey) $lastKey -}}
|
||||
{{- $_ = set $patch (printf "%sLastMap" $opPathKey) $lastMap -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- if eq $patch.op "move" }}
|
||||
{{- if and (ne $patch.path $patch.from) (hasPrefix (printf "%s/" $patch.path) (printf "%s/" $patch.from)) -}}
|
||||
{{- fail (cat "from" $patch.from "may not be a child of path" $patch.path) -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- if or (eq $patch.op "move") (eq $patch.op "copy") (eq $patch.op "test") }}
|
||||
{{- $key := $patch.fromKey -}}
|
||||
{{- $lastMap := $patch.fromLastMap -}}
|
||||
{{- $lastKey := $patch.fromLastKey -}}
|
||||
{{- $setKey := "value" -}}
|
||||
{{- if eq $patch.op "test" }}
|
||||
{{- $key = $patch.pathKey -}}
|
||||
{{- $lastMap = $patch.pathLastMap -}}
|
||||
{{- $lastKey = $patch.pathLastKey -}}
|
||||
{{- $setKey = "testValue" -}}
|
||||
{{- end -}}
|
||||
{{- $obj := index $lastMap $lastKey -}}
|
||||
|
||||
{{- if kindIs "map" $obj -}}
|
||||
{{- if not (hasKey $obj $key) -}}
|
||||
{{- fail (cat $key "does not exist") -}}
|
||||
{{- end -}}
|
||||
{{- $_ := set $patch $setKey (index $obj $key) -}}
|
||||
|
||||
{{- else if kindIs "slice" $obj -}}
|
||||
{{- $i := atoi $key -}}
|
||||
{{- if ne $key (toString $i) -}}
|
||||
{{- fail (cat "cannot convert" $key "to int") -}}
|
||||
{{- end -}}
|
||||
{{- if lt $i 0 -}}
|
||||
{{- fail "slice index <0" -}}
|
||||
{{- else if lt $i (len $obj) -}}
|
||||
{{- $_ := set $patch $setKey (index $obj $i) -}}
|
||||
{{- else -}}
|
||||
{{- fail "slice index >= slice length" -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- else -}}
|
||||
{{- fail (cat "cannot" $patch.op $key "on type" (kindOf $obj)) -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- if or (eq $patch.op "remove") (eq $patch.op "replace") (eq $patch.op "move") }}
|
||||
{{- $key := $patch.pathKey -}}
|
||||
{{- $lastMap := $patch.pathLastMap -}}
|
||||
{{- $lastKey := $patch.pathLastKey -}}
|
||||
{{- if eq $patch.op "move" }}
|
||||
{{- $key = $patch.fromKey -}}
|
||||
{{- $lastMap = $patch.fromLastMap -}}
|
||||
{{- $lastKey = $patch.fromLastKey -}}
|
||||
{{- end -}}
|
||||
{{- $obj := index $lastMap $lastKey -}}
|
||||
|
||||
{{- if kindIs "map" $obj -}}
|
||||
{{- if not (hasKey $obj $key) -}}
|
||||
{{- fail (cat $key "does not exist") -}}
|
||||
{{- end -}}
|
||||
{{- $_ := unset $obj $key -}}
|
||||
|
||||
{{- else if kindIs "slice" $obj -}}
|
||||
{{- $i := atoi $key -}}
|
||||
{{- if ne $key (toString $i) -}}
|
||||
{{- fail (cat "cannot convert" $key "to int") -}}
|
||||
{{- end -}}
|
||||
{{- if lt $i 0 -}}
|
||||
{{- fail "slice index <0" -}}
|
||||
{{- else if eq $i 0 -}}
|
||||
{{- $_ := set $lastMap $lastKey (slice $obj 1) -}}
|
||||
{{- else if lt $i (sub (len $obj) 1) -}}
|
||||
{{- $_ := set $lastMap $lastKey (concat (slice $obj 0 $i) (slice $obj (add $i 1) (len $obj))) -}}
|
||||
{{- else if eq $i (sub (len $obj) 1) -}}
|
||||
{{- $_ := set $lastMap $lastKey (slice $obj 0 (sub (len $obj) 1)) -}}
|
||||
{{- else -}}
|
||||
{{- fail "slice index >= slice length" -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- else -}}
|
||||
{{- fail (cat "cannot" $patch.op $key "on type" (kindOf $obj)) -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- if or (eq $patch.op "add") (eq $patch.op "replace") (eq $patch.op "move") (eq $patch.op "copy") }}
|
||||
{{- $key := $patch.pathKey -}}
|
||||
{{- $lastMap := $patch.pathLastMap -}}
|
||||
{{- $lastKey := $patch.pathLastKey -}}
|
||||
{{- $value := $patch.value -}}
|
||||
{{- $obj := index $lastMap $lastKey -}}
|
||||
|
||||
{{- if kindIs "map" $obj -}}
|
||||
{{- $_ := set $obj $key $value -}}
|
||||
|
||||
{{- else if kindIs "slice" $obj -}}
|
||||
{{- $i := 0 -}}
|
||||
{{- if eq $key "-" -}}
|
||||
{{- $i = len $obj -}}
|
||||
{{- else -}}
|
||||
{{- $i = atoi $key -}}
|
||||
{{- if ne $key (toString $i) -}}
|
||||
{{- fail (cat "cannot convert" $key "to int") -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- if lt $i 0 -}}
|
||||
{{- fail "slice index <0" -}}
|
||||
{{- else if eq $i 0 -}}
|
||||
{{- $_ := set $lastMap $lastKey (prepend $obj $value) -}}
|
||||
{{- else if lt $i (len $obj) -}}
|
||||
{{- $_ := set $lastMap $lastKey (concat (append (slice $obj 0 $i) $value) (slice $obj $i)) -}}
|
||||
{{- else if eq $i (len $obj) -}}
|
||||
{{- $_ := set $lastMap $lastKey (append $obj $value) -}}
|
||||
{{- else -}}
|
||||
{{- fail "slice index > slice length" -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- else -}}
|
||||
{{- fail (cat "cannot" $patch.op $key "on type" (kindOf $obj)) -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- if eq $patch.op "test" }}
|
||||
{{- if not (deepEqual $patch.value $patch.testValue) }}
|
||||
{{- fail (cat "test failed, expected" (toJson $patch.value) "but got" (toJson $patch.testValue)) -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- range $reSliceOp := $reSlice -}}
|
||||
{{- $sliceObj := list -}}
|
||||
{{- range $i := until (len $reSliceOp.mapObj) -}}
|
||||
{{- $sliceObj = append $sliceObj (index $reSliceOp.mapObj (toString $i)) -}}
|
||||
{{- end -}}
|
||||
{{- $_ := set $reSliceOp.lastMap $reSliceOp.lastKey $sliceObj -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- end -}}
|
||||
{{- toJson $docContainer -}}
|
||||
{{- end -}}
|
|
@ -0,0 +1,28 @@
|
|||
{{- /*
|
||||
toPrettyRawJson
|
||||
input: interface{} valid JSON document
|
||||
output: pretty raw JSON string
|
||||
*/}}
|
||||
{{- define "toPrettyRawJson" -}}
|
||||
{{- include "toPrettyRawJsonStr" (toPrettyJson .) -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- /*
|
||||
toPrettyRawJsonStr
|
||||
input: pretty JSON string
|
||||
output: pretty raw JSON string
|
||||
*/}}
|
||||
{{- define "toPrettyRawJsonStr" -}}
|
||||
{{- $s :=
|
||||
(regexReplaceAll "([^\\\\](?:\\\\\\\\)*)\\\\u003e"
|
||||
(regexReplaceAll "([^\\\\](?:\\\\\\\\)*)\\\\u003c"
|
||||
(regexReplaceAll "([^\\\\](?:\\\\\\\\)*)\\\\u0026" . "${1}&")
|
||||
"${1}<")
|
||||
"${1}>")
|
||||
-}}
|
||||
{{- if regexMatch "([^\\\\](?:\\\\\\\\)*)\\\\u00(26|3c|3e)" $s -}}
|
||||
{{- include "toPrettyRawJsonStr" $s -}}
|
||||
{{- else -}}
|
||||
{{- $s -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
|
@ -0,0 +1,114 @@
|
|||
{{- /*
|
||||
tplYaml
|
||||
input: map with 2 keys:
|
||||
- doc: interface{}
|
||||
- ctx: context to pass to tpl function
|
||||
output: JSON encoded map with 1 key:
|
||||
- doc: interface{} with any keys called tpl or tplSpread values templated and replaced
|
||||
|
||||
maps matching the following syntax will be templated and parsed as YAML
|
||||
{
|
||||
$tplYaml: string
|
||||
}
|
||||
|
||||
maps matching the follow syntax will be templated, parsed as YAML, and spread into the parent map/slice
|
||||
{
|
||||
$tplYamlSpread: string
|
||||
}
|
||||
*/}}
|
||||
{{- define "tplYaml" -}}
|
||||
{{- $patch := get (include "tplYamlItr" (dict "ctx" .ctx "parentKind" "" "parentPath" "" "path" "/" "value" .doc) | fromJson) "patch" -}}
|
||||
{{- include "jsonpatch" (dict "doc" .doc "patch" $patch) -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- /*
|
||||
tplYamlItr
|
||||
input: map with 4 keys:
|
||||
- path: string JSONPath to current element
|
||||
- parentKind: string kind of parent element
|
||||
- parentPath: string JSONPath to parent element
|
||||
- value: interface{}
|
||||
- ctx: context to pass to tpl function
|
||||
output: JSON encoded map with 1 key:
|
||||
- patch: list of patches to apply in order to template
|
||||
*/}}
|
||||
{{- define "tplYamlItr" -}}
|
||||
{{- $params := . -}}
|
||||
{{- $kind := kindOf $params.value -}}
|
||||
{{- $patch := list -}}
|
||||
{{- $joinPath := $params.path -}}
|
||||
{{- if eq $params.path "/" -}}
|
||||
{{- $joinPath = "" -}}
|
||||
{{- end -}}
|
||||
{{- $joinParentPath := $params.parentPath -}}
|
||||
{{- if eq $params.parentPath "/" -}}
|
||||
{{- $joinParentPath = "" -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- if eq $kind "slice" -}}
|
||||
{{- $iAdj := 0 -}}
|
||||
{{- range $i, $v := $params.value -}}
|
||||
{{- $iPath := printf "%s/%d" $joinPath (add $i $iAdj) -}}
|
||||
{{- $itrPatch := get (include "tplYamlItr" (dict "ctx" $params.ctx "parentKind" $kind "parentPath" $params.path "path" $iPath "value" $v) | fromJson) "patch" -}}
|
||||
{{- $itrLen := len $itrPatch -}}
|
||||
{{- if gt $itrLen 0 -}}
|
||||
{{- $patch = concat $patch $itrPatch -}}
|
||||
{{- if eq (get (index $itrPatch 0) "op") "remove" -}}
|
||||
{{- $iAdj = add $iAdj (sub $itrLen 2) -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- else if eq $kind "map" -}}
|
||||
{{- if and (eq (len $params.value) 1) (or (hasKey $params.value "$tplYaml") (hasKey $params.value "$tplYamlSpread")) -}}
|
||||
{{- $tpl := get $params.value "$tplYaml" -}}
|
||||
{{- $spread := false -}}
|
||||
{{- if hasKey $params.value "$tplYamlSpread" -}}
|
||||
{{- if eq $params.path "/" -}}
|
||||
{{- fail "cannot $tplYamlSpread on root object" -}}
|
||||
{{- end -}}
|
||||
{{- $tpl = get $params.value "$tplYamlSpread" -}}
|
||||
{{- $spread = true -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- $res := tpl $tpl $params.ctx -}}
|
||||
{{- $res = get (fromYaml (tpl "tpl: {{ nindent 2 .res }}" (merge (dict "res" $res) $params.ctx))) "tpl" -}}
|
||||
|
||||
{{- if eq $spread false -}}
|
||||
{{- $patch = append $patch (dict "op" "replace" "path" $params.path "value" $res) -}}
|
||||
{{- else -}}
|
||||
{{- $resKind := kindOf $res -}}
|
||||
{{- if and (ne $resKind "invalid") (ne $resKind $params.parentKind) -}}
|
||||
{{- fail (cat "can only $tplYamlSpread slice onto a slice or map onto a map; attempted to spread" $resKind "on" $params.parentKind "at path" $params.path) -}}
|
||||
{{- end -}}
|
||||
{{- $patch = append $patch (dict "op" "remove" "path" $params.path) -}}
|
||||
{{- if eq $resKind "invalid" -}}
|
||||
{{- /* no-op */ -}}
|
||||
{{- else if eq $resKind "slice" -}}
|
||||
{{- range $v := reverse $res -}}
|
||||
{{- $patch = append $patch (dict "op" "add" "path" $params.path "value" $v) -}}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{- range $k, $v := $res -}}
|
||||
{{- $kPath := replace "~" "~0" $k -}}
|
||||
{{- $kPath = replace "/" "~1" $kPath -}}
|
||||
{{- $kPath = printf "%s/%s" $joinParentPath $kPath -}}
|
||||
{{- $patch = append $patch (dict "op" "add" "path" $kPath "value" $v) -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{- range $k, $v := $params.value -}}
|
||||
{{- $kPath := replace "~" "~0" $k -}}
|
||||
{{- $kPath = replace "/" "~1" $kPath -}}
|
||||
{{- $kPath = printf "%s/%s" $joinPath $kPath -}}
|
||||
{{- $itrPatch := get (include "tplYamlItr" (dict "ctx" $params.ctx "parentKind" $kind "parentPath" $params.path "path" $kPath "value" $v) | fromJson) "patch" -}}
|
||||
{{- if gt (len $itrPatch) 0 -}}
|
||||
{{- $patch = concat $patch $itrPatch -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- toJson (dict "patch" $patch) -}}
|
||||
{{- end -}}
|
|
@ -0,0 +1,4 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.configMap }}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "config-map.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
|
@ -0,0 +1,5 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- range .Values.extraResources }}
|
||||
---
|
||||
{{ . | toYaml }}
|
||||
{{- end }}
|
|
@ -0,0 +1,4 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.headlessService }}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "headless-service.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
|
@ -0,0 +1,6 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.config.websocket.ingress }}
|
||||
{{- if and .enabled .hosts $.Values.config.websocket.enabled $.Values.service.enabled $.Values.service.ports.websocket.enabled }}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "ingress.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,10 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- if .hasContentsSecret }}
|
||||
{{- with .Values.natsBox }}
|
||||
{{- if .enabled }}
|
||||
{{- with .contentsSecret}}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "nats-box/contents-secret.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,8 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.natsBox }}
|
||||
{{- if .enabled }}
|
||||
{{- with .contextsSecret}}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "nats-box/contexts-secret/contexts-secret.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,8 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.natsBox }}
|
||||
{{- if .enabled }}
|
||||
{{- with .deployment }}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "nats-box/deployment/deployment.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,8 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- if .Values.natsBox.enabled }}
|
||||
{{- with .Values.natsBox.serviceAccount }}
|
||||
{{- if .enabled }}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "nats-box/service-account.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,6 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.podDisruptionBudget }}
|
||||
{{- if .enabled }}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "pod-disruption-budget.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,8 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.promExporter }}
|
||||
{{- if and .enabled .podMonitor.enabled }}
|
||||
{{- with .podMonitor }}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "pod-monitor.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,6 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.serviceAccount }}
|
||||
{{- if .enabled }}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "service-account.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,6 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.service }}
|
||||
{{- if .enabled }}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "service.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,4 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.statefulSet }}
|
||||
{{- include "nats.loadMergePatch" (merge (dict "file" "stateful-set/stateful-set.yaml" "ctx" $) .) }}
|
||||
{{- end }}
|
|
@ -0,0 +1,37 @@
|
|||
{{- include "nats.defaultValues" . }}
|
||||
{{- with .Values.natsBox | deepCopy }}
|
||||
{{- $natsBox := . }}
|
||||
{{- if .enabled -}}
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
{{- with .container }}
|
||||
{{- $_ := set . "merge" (dict
|
||||
"args" (list
|
||||
"sh"
|
||||
"-ec"
|
||||
"nats reply --echo echo & pid=\"$!\"; sleep 1; nats request echo hi > /tmp/resp; kill \"$pid\"; wait; grep -qF hi /tmp/resp"
|
||||
)
|
||||
) }}
|
||||
{{- $_ := set . "patch" list }}
|
||||
{{- end }}
|
||||
{{- with .podTemplate }}
|
||||
{{- $_ := set . "merge" (dict
|
||||
"metadata" (dict
|
||||
"name" (printf "%s-test-request-reply" $.Values.statefulSet.name)
|
||||
"labels" (dict
|
||||
"app.kubernetes.io/component" "test-request-reply"
|
||||
)
|
||||
"annotations" (dict
|
||||
"helm.sh/hook" "test"
|
||||
"helm.sh/hook-delete-policy" "before-hook-creation,hook-succeeded"
|
||||
)
|
||||
)
|
||||
"spec" (dict
|
||||
"restartPolicy" "Never"
|
||||
)
|
||||
) }}
|
||||
{{- $_ := set . "patch" list }}
|
||||
{{ include "nats.loadMergePatch" (merge (dict "file" "nats-box/deployment/pod-template.yaml" "ctx" (merge (dict "Values" (dict "natsBox" $natsBox)) $)) .) }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,669 @@
|
|||
################################################################################
|
||||
# Global options
|
||||
################################################################################
|
||||
global:
|
||||
image:
|
||||
# global image pull policy to use for all container images in the chart
|
||||
# can be overridden by individual image pullPolicy
|
||||
pullPolicy:
|
||||
# global list of secret names to use as image pull secrets for all pod specs in the chart
|
||||
# secrets must exist in the same namespace
|
||||
# https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
pullSecretNames: []
|
||||
# global registry to use for all container images in the chart
|
||||
# can be overridden by individual image registry
|
||||
registry:
|
||||
|
||||
# global labels will be applied to all resources deployed by the chart
|
||||
labels: {}
|
||||
|
||||
################################################################################
|
||||
# Common options
|
||||
################################################################################
|
||||
# override name of the chart
|
||||
nameOverride:
|
||||
# override full name of the chart+release
|
||||
fullnameOverride:
|
||||
# override the namespace that resources are installed into
|
||||
namespaceOverride:
|
||||
|
||||
# reference a common CA Certificate or Bundle in all nats config `tls` blocks and nats-box contexts
|
||||
# note: `tls.verify` still must be set in the appropriate nats config `tls` blocks to require mTLS
|
||||
tlsCA:
|
||||
enabled: false
|
||||
# set configMapName in order to mount an existing configMap to dir
|
||||
configMapName:
|
||||
# set secretName in order to mount an existing secretName to dir
|
||||
secretName:
|
||||
# directory to mount the configMap or secret to
|
||||
dir: /etc/nats-ca-cert
|
||||
# key in the configMap or secret that contains the CA Certificate or Bundle
|
||||
key: ca.crt
|
||||
|
||||
################################################################################
|
||||
# NATS Stateful Set and associated resources
|
||||
################################################################################
|
||||
|
||||
############################################################
|
||||
# NATS config
|
||||
############################################################
|
||||
config:
|
||||
cluster:
|
||||
enabled: false
|
||||
port: 6222
|
||||
# must be 2 or higher when jetstream is enabled
|
||||
replicas: 3
|
||||
|
||||
# apply to generated route URLs that connect to other pods in the StatefulSet
|
||||
routeURLs:
|
||||
# if both user and password are set, they will be added to route URLs
|
||||
# and the cluster authorization block
|
||||
user:
|
||||
password:
|
||||
# set to true to use FQDN in route URLs
|
||||
useFQDN: false
|
||||
k8sClusterDomain: cluster.local
|
||||
|
||||
tls:
|
||||
enabled: false
|
||||
# set secretName in order to mount an existing secret to dir
|
||||
secretName:
|
||||
dir: /etc/nats-certs/cluster
|
||||
cert: tls.crt
|
||||
key: tls.key
|
||||
# merge or patch the tls config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
# merge or patch the cluster config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/clustering/cluster_config
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
jetstream:
|
||||
enabled: false
|
||||
|
||||
fileStore:
|
||||
enabled: true
|
||||
dir: /data
|
||||
|
||||
############################################################
|
||||
# stateful set -> volume claim templates -> jetstream pvc
|
||||
############################################################
|
||||
pvc:
|
||||
enabled: true
|
||||
size: 10Gi
|
||||
storageClassName:
|
||||
|
||||
# merge or patch the jetstream pvc
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#persistentvolumeclaim-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}-js"
|
||||
name:
|
||||
|
||||
# defaults to the PVC size
|
||||
maxSize:
|
||||
|
||||
memoryStore:
|
||||
enabled: false
|
||||
# ensure that container has a sufficient memory limit greater than maxSize
|
||||
maxSize: 1Gi
|
||||
|
||||
# merge or patch the jetstream config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration#jetstream
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
nats:
|
||||
port: 4222
|
||||
tls:
|
||||
enabled: false
|
||||
# set secretName in order to mount an existing secret to dir
|
||||
secretName:
|
||||
dir: /etc/nats-certs/nats
|
||||
cert: tls.crt
|
||||
key: tls.key
|
||||
# merge or patch the tls config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
leafnodes:
|
||||
enabled: false
|
||||
port: 7422
|
||||
tls:
|
||||
enabled: false
|
||||
# set secretName in order to mount an existing secret to dir
|
||||
secretName:
|
||||
dir: /etc/nats-certs/leafnodes
|
||||
cert: tls.crt
|
||||
key: tls.key
|
||||
# merge or patch the tls config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
# merge or patch the leafnodes config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/leafnodes/leafnode_conf
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
websocket:
|
||||
enabled: false
|
||||
port: 8080
|
||||
tls:
|
||||
enabled: false
|
||||
# set secretName in order to mount an existing secret to dir
|
||||
secretName:
|
||||
dir: /etc/nats-certs/websocket
|
||||
cert: tls.crt
|
||||
key: tls.key
|
||||
# merge or patch the tls config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
############################################################
|
||||
# ingress
|
||||
############################################################
|
||||
# service must be enabled also
|
||||
ingress:
|
||||
enabled: false
|
||||
# must contain at least 1 host otherwise ingress will not be created
|
||||
hosts: []
|
||||
path: /
|
||||
pathType: Exact
|
||||
# sets to the ingress class name
|
||||
className:
|
||||
# set to an existing secret name to enable TLS on the ingress; applies to all hosts
|
||||
tlsSecretName:
|
||||
|
||||
# merge or patch the ingress
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#ingress-v1-networking-k8s-io
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}-ws"
|
||||
name:
|
||||
|
||||
# merge or patch the websocket config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/websocket/websocket_conf
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
mqtt:
|
||||
enabled: false
|
||||
port: 1883
|
||||
tls:
|
||||
enabled: false
|
||||
# set secretName in order to mount an existing secret to dir
|
||||
secretName:
|
||||
dir: /etc/nats-certs/mqtt
|
||||
cert: tls.crt
|
||||
key: tls.key
|
||||
# merge or patch the tls config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
# merge or patch the mqtt config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/mqtt/mqtt_config
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
gateway:
|
||||
enabled: false
|
||||
port: 7222
|
||||
tls:
|
||||
enabled: false
|
||||
# set secretName in order to mount an existing secret to dir
|
||||
secretName:
|
||||
dir: /etc/nats-certs/gateway
|
||||
cert: tls.crt
|
||||
key: tls.key
|
||||
# merge or patch the tls config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
# merge or patch the gateway config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/gateways/gateway#gateway-configuration-block
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
monitor:
|
||||
enabled: true
|
||||
port: 8222
|
||||
tls:
|
||||
# config.nats.tls must be enabled also
|
||||
# when enabled, monitoring port will use HTTPS with the options from config.nats.tls
|
||||
enabled: false
|
||||
|
||||
profiling:
|
||||
enabled: false
|
||||
port: 65432
|
||||
|
||||
resolver:
|
||||
enabled: false
|
||||
dir: /data/resolver
|
||||
|
||||
############################################################
|
||||
# stateful set -> volume claim templates -> resolver pvc
|
||||
############################################################
|
||||
pvc:
|
||||
enabled: true
|
||||
size: 1Gi
|
||||
storageClassName:
|
||||
|
||||
# merge or patch the pvc
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#persistentvolumeclaim-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}-resolver"
|
||||
name:
|
||||
|
||||
# merge or patch the resolver
|
||||
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/auth_intro/jwt/resolver
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
# adds a prefix to the server name, which defaults to the pod name
|
||||
# helpful for ensuring server name is unique in a super cluster
|
||||
serverNamePrefix: ""
|
||||
|
||||
# merge or patch the nats config
|
||||
# https://docs.nats.io/running-a-nats-service/configuration
|
||||
# following special rules apply
|
||||
# 1. strings that start with << and end with >> will be unquoted
|
||||
# use this for variables and numbers with units
|
||||
# 2. keys ending in $include will be switched to include directives
|
||||
# keys are sorted alphabetically, use prefix before $includes to control includes ordering
|
||||
# paths should be relative to /etc/nats-config/nats.conf
|
||||
# example:
|
||||
#
|
||||
# merge:
|
||||
# $include: ./my-config.conf
|
||||
# zzz$include: ./my-config-last.conf
|
||||
# server_name: nats
|
||||
# authorization:
|
||||
# token: << $TOKEN >>
|
||||
# jetstream:
|
||||
# max_memory_store: << 1GB >>
|
||||
#
|
||||
# will yield the config:
|
||||
# {
|
||||
# include ./my-config.conf;
|
||||
# "authorization": {
|
||||
# "token": $TOKEN
|
||||
# },
|
||||
# "jetstream": {
|
||||
# "max_memory_store": 1GB
|
||||
# },
|
||||
# "server_name": "nats",
|
||||
# include ./my-config-last.conf;
|
||||
# }
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
############################################################
|
||||
# stateful set -> pod template -> nats container
|
||||
############################################################
|
||||
container:
|
||||
image:
|
||||
repository: nats
|
||||
tag: 2.10.25-alpine
|
||||
pullPolicy:
|
||||
registry:
|
||||
|
||||
# container port options
|
||||
# must be enabled in the config section also
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#containerport-v1-core
|
||||
ports:
|
||||
nats: {}
|
||||
leafnodes: {}
|
||||
websocket: {}
|
||||
mqtt: {}
|
||||
cluster: {}
|
||||
gateway: {}
|
||||
monitor: {}
|
||||
profiling: {}
|
||||
|
||||
# map with key as env var name, value can be string or map
|
||||
# example:
|
||||
#
|
||||
# env:
|
||||
# GOMEMLIMIT: 7GiB
|
||||
# TOKEN:
|
||||
# valueFrom:
|
||||
# secretKeyRef:
|
||||
# name: nats-auth
|
||||
# key: token
|
||||
env: {}
|
||||
|
||||
# merge or patch the container
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
############################################################
|
||||
# stateful set -> pod template -> reloader container
|
||||
############################################################
|
||||
reloader:
|
||||
enabled: true
|
||||
image:
|
||||
repository: natsio/nats-server-config-reloader
|
||||
tag: 0.16.1
|
||||
pullPolicy:
|
||||
registry:
|
||||
|
||||
# env var map, see nats.env for an example
|
||||
env: {}
|
||||
|
||||
# all nats container volume mounts with the following prefixes
|
||||
# will be mounted into the reloader container
|
||||
natsVolumeMountPrefixes:
|
||||
- /etc/
|
||||
|
||||
# merge or patch the container
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
############################################################
|
||||
# stateful set -> pod template -> prom-exporter container
|
||||
############################################################
|
||||
# config.monitor must be enabled
|
||||
promExporter:
|
||||
enabled: false
|
||||
image:
|
||||
repository: natsio/prometheus-nats-exporter
|
||||
tag: 0.16.0
|
||||
pullPolicy:
|
||||
registry:
|
||||
|
||||
port: 7777
|
||||
# env var map, see nats.env for an example
|
||||
env: {}
|
||||
|
||||
# merge or patch the container
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
############################################################
|
||||
# prometheus pod monitor
|
||||
############################################################
|
||||
podMonitor:
|
||||
enabled: false
|
||||
|
||||
# merge or patch the pod monitor
|
||||
# https://prometheus-operator.dev/docs/operator/api/#monitoring.coreos.com/v1.PodMonitor
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}"
|
||||
name:
|
||||
|
||||
|
||||
############################################################
|
||||
# service
|
||||
############################################################
|
||||
service:
|
||||
enabled: true
|
||||
|
||||
# service port options
|
||||
# additional boolean field enable to control whether port is exposed in the service
|
||||
# must be enabled in the config section also
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#serviceport-v1-core
|
||||
ports:
|
||||
nats:
|
||||
enabled: true
|
||||
leafnodes:
|
||||
enabled: true
|
||||
websocket:
|
||||
enabled: true
|
||||
mqtt:
|
||||
enabled: true
|
||||
cluster:
|
||||
enabled: false
|
||||
gateway:
|
||||
enabled: false
|
||||
monitor:
|
||||
enabled: false
|
||||
profiling:
|
||||
enabled: false
|
||||
|
||||
# merge or patch the service
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#service-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}"
|
||||
name:
|
||||
|
||||
############################################################
|
||||
# other nats extension points
|
||||
############################################################
|
||||
|
||||
# stateful set
|
||||
statefulSet:
|
||||
# merge or patch the stateful set
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#statefulset-v1-apps
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}"
|
||||
name:
|
||||
|
||||
# stateful set -> pod template
|
||||
podTemplate:
|
||||
# adds a hash of the ConfigMap as a pod annotation
|
||||
# this will cause the StatefulSet to roll when the ConfigMap is updated
|
||||
configChecksumAnnotation: true
|
||||
|
||||
# map of topologyKey: topologySpreadConstraint
|
||||
# labelSelector will be added to match StatefulSet pods
|
||||
#
|
||||
# topologySpreadConstraints:
|
||||
# kubernetes.io/hostname:
|
||||
# maxSkew: 1
|
||||
#
|
||||
topologySpreadConstraints: {}
|
||||
|
||||
# merge or patch the pod template
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#pod-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
# headless service
|
||||
headlessService:
|
||||
# merge or patch the headless service
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#service-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}-headless"
|
||||
name:
|
||||
|
||||
# config map
|
||||
configMap:
|
||||
# merge or patch the config map
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#configmap-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}-config"
|
||||
name:
|
||||
|
||||
# pod disruption budget
|
||||
podDisruptionBudget:
|
||||
enabled: true
|
||||
# merge or patch the pod disruption budget
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#poddisruptionbudget-v1-policy
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}"
|
||||
name:
|
||||
|
||||
# service account
|
||||
serviceAccount:
|
||||
enabled: false
|
||||
# merge or patch the service account
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#serviceaccount-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}"
|
||||
name:
|
||||
|
||||
|
||||
############################################################
|
||||
# natsBox
|
||||
#
|
||||
# NATS Box Deployment and associated resources
|
||||
############################################################
|
||||
natsBox:
|
||||
enabled: true
|
||||
|
||||
############################################################
|
||||
# NATS contexts
|
||||
############################################################
|
||||
contexts:
|
||||
default:
|
||||
creds:
|
||||
# set contents in order to create a secret with the creds file contents
|
||||
contents:
|
||||
# set secretName in order to mount an existing secret to dir
|
||||
secretName:
|
||||
# defaults to /etc/nats-creds/<context-name>
|
||||
dir:
|
||||
key: nats.creds
|
||||
nkey:
|
||||
# set contents in order to create a secret with the nkey file contents
|
||||
contents:
|
||||
# set secretName in order to mount an existing secret to dir
|
||||
secretName:
|
||||
# defaults to /etc/nats-nkeys/<context-name>
|
||||
dir:
|
||||
key: nats.nk
|
||||
# used to connect with client certificates
|
||||
tls:
|
||||
# set secretName in order to mount an existing secret to dir
|
||||
secretName:
|
||||
# defaults to /etc/nats-certs/<context-name>
|
||||
dir:
|
||||
cert: tls.crt
|
||||
key: tls.key
|
||||
|
||||
# merge or patch the context
|
||||
# https://docs.nats.io/using-nats/nats-tools/nats_cli#nats-contexts
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
# name of context to select by default
|
||||
defaultContextName: default
|
||||
|
||||
############################################################
|
||||
# deployment -> pod template -> nats-box container
|
||||
############################################################
|
||||
container:
|
||||
image:
|
||||
repository: natsio/nats-box
|
||||
tag: 0.16.0
|
||||
pullPolicy:
|
||||
registry:
|
||||
|
||||
# env var map, see nats.env for an example
|
||||
env: {}
|
||||
|
||||
# merge or patch the container
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
############################################################
|
||||
# other nats-box extension points
|
||||
############################################################
|
||||
|
||||
# deployment
|
||||
deployment:
|
||||
# merge or patch the deployment
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#deployment-v1-apps
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}-box"
|
||||
name:
|
||||
|
||||
# deployment -> pod template
|
||||
podTemplate:
|
||||
# merge or patch the pod template
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#pod-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
|
||||
# contexts secret
|
||||
contextsSecret:
|
||||
# merge or patch the context secret
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#secret-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}-box-contexts"
|
||||
name:
|
||||
|
||||
# contents secret
|
||||
contentsSecret:
|
||||
# merge or patch the contents secret
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#secret-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}-box-contents"
|
||||
name:
|
||||
|
||||
# service account
|
||||
serviceAccount:
|
||||
enabled: false
|
||||
# merge or patch the service account
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#serviceaccount-v1-core
|
||||
merge: {}
|
||||
patch: []
|
||||
# defaults to "{{ include "nats.fullname" $ }}-box"
|
||||
name:
|
||||
|
||||
|
||||
################################################################################
|
||||
# Extra user-defined resources
|
||||
################################################################################
|
||||
#
|
||||
# add arbitrary user-generated resources
|
||||
# example:
|
||||
#
|
||||
# config:
|
||||
# websocket:
|
||||
# enabled: true
|
||||
# extraResources:
|
||||
# - apiVersion: networking.istio.io/v1beta1
|
||||
# kind: VirtualService
|
||||
# metadata:
|
||||
# name:
|
||||
# $tplYaml: >
|
||||
# {{ include "nats.fullname" $ | quote }}
|
||||
# labels:
|
||||
# $tplYaml: |
|
||||
# {{ include "nats.labels" $ }}
|
||||
# spec:
|
||||
# hosts:
|
||||
# - demo.nats.io
|
||||
# gateways:
|
||||
# - my-gateway
|
||||
# http:
|
||||
# - name: default
|
||||
# match:
|
||||
# - name: root
|
||||
# uri:
|
||||
# exact: /
|
||||
# route:
|
||||
# - destination:
|
||||
# host:
|
||||
# $tplYaml: >
|
||||
# {{ .Values.service.name | quote }}
|
||||
# port:
|
||||
# number:
|
||||
# $tplYaml: >
|
||||
# {{ .Values.config.websocket.port }}
|
||||
#
|
||||
extraResources: []
|
|
@ -1,7 +1,6 @@
|
|||
annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: NATS Server
|
||||
catalog.cattle.io/featured: "5"
|
||||
catalog.cattle.io/kube-version: '>=1.16-0'
|
||||
catalog.cattle.io/release-name: nats
|
||||
apiVersion: v2
|
||||
|
|
|
@ -0,0 +1,23 @@
|
|||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*.orig
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
.vscode/
|
|
@ -0,0 +1,27 @@
|
|||
annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Speedscale Operator
|
||||
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
||||
catalog.cattle.io/release-name: speedscale-operator
|
||||
apiVersion: v1
|
||||
appVersion: 2.3.149
|
||||
description: Stress test your APIs with real world scenarios. Collect and replay
|
||||
traffic without scripting.
|
||||
home: https://speedscale.com
|
||||
icon: file://assets/icons/speedscale-operator.png
|
||||
keywords:
|
||||
- speedscale
|
||||
- test
|
||||
- testing
|
||||
- regression
|
||||
- reliability
|
||||
- load
|
||||
- replay
|
||||
- network
|
||||
- traffic
|
||||
kubeVersion: '>= 1.17.0-0'
|
||||
maintainers:
|
||||
- email: support@speedscale.com
|
||||
name: Speedscale Support
|
||||
name: speedscale-operator
|
||||
version: 2.3.149
|
|
@ -0,0 +1,201 @@
|
|||
Apache License
|
||||
Version 2.0, January 2004
|
||||
http://www.apache.org/licenses/
|
||||
|
||||
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||
|
||||
1. Definitions.
|
||||
|
||||
"License" shall mean the terms and conditions for use, reproduction,
|
||||
and distribution as defined by Sections 1 through 9 of this document.
|
||||
|
||||
"Licensor" shall mean the copyright owner or entity authorized by
|
||||
the copyright owner that is granting the License.
|
||||
|
||||
"Legal Entity" shall mean the union of the acting entity and all
|
||||
other entities that control, are controlled by, or are under common
|
||||
control with that entity. For the purposes of this definition,
|
||||
"control" means (i) the power, direct or indirect, to cause the
|
||||
direction or management of such entity, whether by contract or
|
||||
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
||||
outstanding shares, or (iii) beneficial ownership of such entity.
|
||||
|
||||
"You" (or "Your") shall mean an individual or Legal Entity
|
||||
exercising permissions granted by this License.
|
||||
|
||||
"Source" form shall mean the preferred form for making modifications,
|
||||
including but not limited to software source code, documentation
|
||||
source, and configuration files.
|
||||
|
||||
"Object" form shall mean any form resulting from mechanical
|
||||
transformation or translation of a Source form, including but
|
||||
not limited to compiled object code, generated documentation,
|
||||
and conversions to other media types.
|
||||
|
||||
"Work" shall mean the work of authorship, whether in Source or
|
||||
Object form, made available under the License, as indicated by a
|
||||
copyright notice that is included in or attached to the work
|
||||
(an example is provided in the Appendix below).
|
||||
|
||||
"Derivative Works" shall mean any work, whether in Source or Object
|
||||
form, that is based on (or derived from) the Work and for which the
|
||||
editorial revisions, annotations, elaborations, or other modifications
|
||||
represent, as a whole, an original work of authorship. For the purposes
|
||||
of this License, Derivative Works shall not include works that remain
|
||||
separable from, or merely link (or bind by name) to the interfaces of,
|
||||
the Work and Derivative Works thereof.
|
||||
|
||||
"Contribution" shall mean any work of authorship, including
|
||||
the original version of the Work and any modifications or additions
|
||||
to that Work or Derivative Works thereof, that is intentionally
|
||||
submitted to Licensor for inclusion in the Work by the copyright owner
|
||||
or by an individual or Legal Entity authorized to submit on behalf of
|
||||
the copyright owner. For the purposes of this definition, "submitted"
|
||||
means any form of electronic, verbal, or written communication sent
|
||||
to the Licensor or its representatives, including but not limited to
|
||||
communication on electronic mailing lists, source code control systems,
|
||||
and issue tracking systems that are managed by, or on behalf of, the
|
||||
Licensor for the purpose of discussing and improving the Work, but
|
||||
excluding communication that is conspicuously marked or otherwise
|
||||
designated in writing by the copyright owner as "Not a Contribution."
|
||||
|
||||
"Contributor" shall mean Licensor and any individual or Legal Entity
|
||||
on behalf of whom a Contribution has been received by Licensor and
|
||||
subsequently incorporated within the Work.
|
||||
|
||||
2. Grant of Copyright License. Subject to the terms and conditions of
|
||||
this License, each Contributor hereby grants to You a perpetual,
|
||||
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||
copyright license to reproduce, prepare Derivative Works of,
|
||||
publicly display, publicly perform, sublicense, and distribute the
|
||||
Work and such Derivative Works in Source or Object form.
|
||||
|
||||
3. Grant of Patent License. Subject to the terms and conditions of
|
||||
this License, each Contributor hereby grants to You a perpetual,
|
||||
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||
(except as stated in this section) patent license to make, have made,
|
||||
use, offer to sell, sell, import, and otherwise transfer the Work,
|
||||
where such license applies only to those patent claims licensable
|
||||
by such Contributor that are necessarily infringed by their
|
||||
Contribution(s) alone or by combination of their Contribution(s)
|
||||
with the Work to which such Contribution(s) was submitted. If You
|
||||
institute patent litigation against any entity (including a
|
||||
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
||||
or a Contribution incorporated within the Work constitutes direct
|
||||
or contributory patent infringement, then any patent licenses
|
||||
granted to You under this License for that Work shall terminate
|
||||
as of the date such litigation is filed.
|
||||
|
||||
4. Redistribution. You may reproduce and distribute copies of the
|
||||
Work or Derivative Works thereof in any medium, with or without
|
||||
modifications, and in Source or Object form, provided that You
|
||||
meet the following conditions:
|
||||
|
||||
(a) You must give any other recipients of the Work or
|
||||
Derivative Works a copy of this License; and
|
||||
|
||||
(b) You must cause any modified files to carry prominent notices
|
||||
stating that You changed the files; and
|
||||
|
||||
(c) You must retain, in the Source form of any Derivative Works
|
||||
that You distribute, all copyright, patent, trademark, and
|
||||
attribution notices from the Source form of the Work,
|
||||
excluding those notices that do not pertain to any part of
|
||||
the Derivative Works; and
|
||||
|
||||
(d) If the Work includes a "NOTICE" text file as part of its
|
||||
distribution, then any Derivative Works that You distribute must
|
||||
include a readable copy of the attribution notices contained
|
||||
within such NOTICE file, excluding those notices that do not
|
||||
pertain to any part of the Derivative Works, in at least one
|
||||
of the following places: within a NOTICE text file distributed
|
||||
as part of the Derivative Works; within the Source form or
|
||||
documentation, if provided along with the Derivative Works; or,
|
||||
within a display generated by the Derivative Works, if and
|
||||
wherever such third-party notices normally appear. The contents
|
||||
of the NOTICE file are for informational purposes only and
|
||||
do not modify the License. You may add Your own attribution
|
||||
notices within Derivative Works that You distribute, alongside
|
||||
or as an addendum to the NOTICE text from the Work, provided
|
||||
that such additional attribution notices cannot be construed
|
||||
as modifying the License.
|
||||
|
||||
You may add Your own copyright statement to Your modifications and
|
||||
may provide additional or different license terms and conditions
|
||||
for use, reproduction, or distribution of Your modifications, or
|
||||
for any such Derivative Works as a whole, provided Your use,
|
||||
reproduction, and distribution of the Work otherwise complies with
|
||||
the conditions stated in this License.
|
||||
|
||||
5. Submission of Contributions. Unless You explicitly state otherwise,
|
||||
any Contribution intentionally submitted for inclusion in the Work
|
||||
by You to the Licensor shall be under the terms and conditions of
|
||||
this License, without any additional terms or conditions.
|
||||
Notwithstanding the above, nothing herein shall supersede or modify
|
||||
the terms of any separate license agreement you may have executed
|
||||
with Licensor regarding such Contributions.
|
||||
|
||||
6. Trademarks. This License does not grant permission to use the trade
|
||||
names, trademarks, service marks, or product names of the Licensor,
|
||||
except as required for reasonable and customary use in describing the
|
||||
origin of the Work and reproducing the content of the NOTICE file.
|
||||
|
||||
7. Disclaimer of Warranty. Unless required by applicable law or
|
||||
agreed to in writing, Licensor provides the Work (and each
|
||||
Contributor provides its Contributions) on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
||||
implied, including, without limitation, any warranties or conditions
|
||||
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
||||
PARTICULAR PURPOSE. You are solely responsible for determining the
|
||||
appropriateness of using or redistributing the Work and assume any
|
||||
risks associated with Your exercise of permissions under this License.
|
||||
|
||||
8. Limitation of Liability. In no event and under no legal theory,
|
||||
whether in tort (including negligence), contract, or otherwise,
|
||||
unless required by applicable law (such as deliberate and grossly
|
||||
negligent acts) or agreed to in writing, shall any Contributor be
|
||||
liable to You for damages, including any direct, indirect, special,
|
||||
incidental, or consequential damages of any character arising as a
|
||||
result of this License or out of the use or inability to use the
|
||||
Work (including but not limited to damages for loss of goodwill,
|
||||
work stoppage, computer failure or malfunction, or any and all
|
||||
other commercial damages or losses), even if such Contributor
|
||||
has been advised of the possibility of such damages.
|
||||
|
||||
9. Accepting Warranty or Additional Liability. While redistributing
|
||||
the Work or Derivative Works thereof, You may choose to offer,
|
||||
and charge a fee for, acceptance of support, warranty, indemnity,
|
||||
or other liability obligations and/or rights consistent with this
|
||||
License. However, in accepting such obligations, You may act only
|
||||
on Your own behalf and on Your sole responsibility, not on behalf
|
||||
of any other Contributor, and only if You agree to indemnify,
|
||||
defend, and hold each Contributor harmless for any liability
|
||||
incurred by, or claims asserted against, such Contributor by reason
|
||||
of your accepting any such warranty or additional liability.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
APPENDIX: How to apply the Apache License to your work.
|
||||
|
||||
To apply the Apache License to your work, attach the following
|
||||
boilerplate notice, with the fields enclosed by brackets "[]"
|
||||
replaced with your own identifying information. (Don't include
|
||||
the brackets!) The text should be enclosed in the appropriate
|
||||
comment syntax for the file format. We also recommend that a
|
||||
file or class name and description of purpose be included on the
|
||||
same "printed page" as the copyright notice for easier
|
||||
identification within third-party archives.
|
||||
|
||||
Copyright 2021 Speedscale
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
|
@ -0,0 +1,111 @@
|
|||
![GitHub Tag](https://img.shields.io/github/v/tag/speedscale/operator-helm)
|
||||
|
||||
|
||||
# Speedscale Operator
|
||||
|
||||
The [Speedscale](https://www.speedscale.com) Operator is a [Kubernetes operator](https://kubernetes.io/docs/concepts/extend-kubernetes/operator/)
|
||||
that watches for deployments to be applied to the cluster and takes action based on annotations. The operator
|
||||
can inject a proxy to capture traffic into or out of applications, or setup an isolation test environment around
|
||||
a deployment for testing. The operator itself is a deployment that will be always present on the cluster once
|
||||
the helm chart is installed.
|
||||
|
||||
## Prerequisites
|
||||
|
||||
- Kubernetes 1.20+
|
||||
- Helm 3+
|
||||
- Appropriate [network and firewall configuration](https://docs.speedscale.com/reference/networking) for Speedscale cloud and webhook traffic
|
||||
|
||||
## Get Repo Info
|
||||
|
||||
```bash
|
||||
helm repo add speedscale https://speedscale.github.io/operator-helm/
|
||||
helm repo update
|
||||
```
|
||||
|
||||
_See [helm repo](https://helm.sh/docs/helm/helm_repo/) for command documentation._
|
||||
|
||||
## Install Chart
|
||||
|
||||
An API key is required. Sign up for a [free Speedscale trial](https://speedscale.com/free-trial/) if you do not have one.
|
||||
|
||||
```bash
|
||||
helm install speedscale-operator speedscale/speedscale-operator \
|
||||
-n speedscale \
|
||||
--create-namespace \
|
||||
--set apiKey=<YOUR-SPEEDSCALE-API-KEY> \
|
||||
--set clusterName=<YOUR-CLUSTER-NAME>
|
||||
```
|
||||
|
||||
_See [helm install](https://helm.sh/docs/helm/helm_install/) for command documentation._
|
||||
|
||||
### Pre-install job failure
|
||||
|
||||
We use pre-install job to check provided API key and provision some of the required resources.
|
||||
|
||||
If the job failed during the installation, you'll see the following error during install:
|
||||
|
||||
```
|
||||
Error: INSTALLATION FAILED: failed pre-install: job failed: BackoffLimitExceeded
|
||||
```
|
||||
|
||||
You can inspect the logs using this command:
|
||||
|
||||
```bash
|
||||
kubectl -n speedscale logs job/speedscale-operator-pre-install
|
||||
```
|
||||
|
||||
After fixing the error, uninstall the helm release, delete the failed job
|
||||
and try installing again:
|
||||
|
||||
```bash
|
||||
helm -n speedscale uninstall speedscale-operator
|
||||
kubectl -n speedscale delete job speedscale-operator-pre-install
|
||||
```
|
||||
|
||||
## Uninstall Chart
|
||||
|
||||
```bash
|
||||
helm -n speedscale uninstall speedscale-operator
|
||||
```
|
||||
|
||||
This removes all the Kubernetes components associated with the chart and deletes the release.
|
||||
|
||||
_See [helm uninstall](https://helm.sh/docs/helm/helm_uninstall/) for command documentation._
|
||||
|
||||
CRDs created by this chart are not removed by default and should be manually cleaned up:
|
||||
|
||||
```bash
|
||||
kubectl delete crd trafficreplays.speedscale.com
|
||||
```
|
||||
|
||||
## Upgrading Chart
|
||||
|
||||
```bash
|
||||
helm repo update
|
||||
helm -n speedscale upgrade speedscale-operator speedscale/speedscale-operator
|
||||
```
|
||||
|
||||
Resources capturing traffic will need to be rolled to pick up the latest
|
||||
Speedscale sidecar. Use the rollout restart command for each namespace and
|
||||
resource type:
|
||||
|
||||
```bash
|
||||
kubectl -n <namespace> rollout restart deployment
|
||||
```
|
||||
|
||||
With Helm v3, CRDs created by this chart are not updated by default
|
||||
and should be manually updated.
|
||||
Consult also the [Helm Documentation on CRDs](https://helm.sh/docs/chart_best_practices/custom_resource_definitions).
|
||||
|
||||
_See [helm upgrade](https://helm.sh/docs/helm/helm_upgrade/) for command documentation._
|
||||
|
||||
### Upgrading an existing Release to a new version
|
||||
|
||||
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
||||
incompatible breaking change needing manual actions.
|
||||
|
||||
|
||||
## Help
|
||||
|
||||
Speedscale docs information available at [docs.speedscale.com](https://docs.speedscale.com) or join us
|
||||
on the [Speedscale community Slack](https://join.slack.com/t/speedscalecommunity/shared_invite/zt-x5rcrzn4-XHG1QqcHNXIM~4yozRrz8A)!
|
|
@ -0,0 +1,111 @@
|
|||
![GitHub Tag](https://img.shields.io/github/v/tag/speedscale/operator-helm)
|
||||
|
||||
|
||||
# Speedscale Operator
|
||||
|
||||
The [Speedscale](https://www.speedscale.com) Operator is a [Kubernetes operator](https://kubernetes.io/docs/concepts/extend-kubernetes/operator/)
|
||||
that watches for deployments to be applied to the cluster and takes action based on annotations. The operator
|
||||
can inject a proxy to capture traffic into or out of applications, or setup an isolation test environment around
|
||||
a deployment for testing. The operator itself is a deployment that will be always present on the cluster once
|
||||
the helm chart is installed.
|
||||
|
||||
## Prerequisites
|
||||
|
||||
- Kubernetes 1.20+
|
||||
- Helm 3+
|
||||
- Appropriate [network and firewall configuration](https://docs.speedscale.com/reference/networking) for Speedscale cloud and webhook traffic
|
||||
|
||||
## Get Repo Info
|
||||
|
||||
```bash
|
||||
helm repo add speedscale https://speedscale.github.io/operator-helm/
|
||||
helm repo update
|
||||
```
|
||||
|
||||
_See [helm repo](https://helm.sh/docs/helm/helm_repo/) for command documentation._
|
||||
|
||||
## Install Chart
|
||||
|
||||
An API key is required. Sign up for a [free Speedscale trial](https://speedscale.com/free-trial/) if you do not have one.
|
||||
|
||||
```bash
|
||||
helm install speedscale-operator speedscale/speedscale-operator \
|
||||
-n speedscale \
|
||||
--create-namespace \
|
||||
--set apiKey=<YOUR-SPEEDSCALE-API-KEY> \
|
||||
--set clusterName=<YOUR-CLUSTER-NAME>
|
||||
```
|
||||
|
||||
_See [helm install](https://helm.sh/docs/helm/helm_install/) for command documentation._
|
||||
|
||||
### Pre-install job failure
|
||||
|
||||
We use pre-install job to check provided API key and provision some of the required resources.
|
||||
|
||||
If the job failed during the installation, you'll see the following error during install:
|
||||
|
||||
```
|
||||
Error: INSTALLATION FAILED: failed pre-install: job failed: BackoffLimitExceeded
|
||||
```
|
||||
|
||||
You can inspect the logs using this command:
|
||||
|
||||
```bash
|
||||
kubectl -n speedscale logs job/speedscale-operator-pre-install
|
||||
```
|
||||
|
||||
After fixing the error, uninstall the helm release, delete the failed job
|
||||
and try installing again:
|
||||
|
||||
```bash
|
||||
helm -n speedscale uninstall speedscale-operator
|
||||
kubectl -n speedscale delete job speedscale-operator-pre-install
|
||||
```
|
||||
|
||||
## Uninstall Chart
|
||||
|
||||
```bash
|
||||
helm -n speedscale uninstall speedscale-operator
|
||||
```
|
||||
|
||||
This removes all the Kubernetes components associated with the chart and deletes the release.
|
||||
|
||||
_See [helm uninstall](https://helm.sh/docs/helm/helm_uninstall/) for command documentation._
|
||||
|
||||
CRDs created by this chart are not removed by default and should be manually cleaned up:
|
||||
|
||||
```bash
|
||||
kubectl delete crd trafficreplays.speedscale.com
|
||||
```
|
||||
|
||||
## Upgrading Chart
|
||||
|
||||
```bash
|
||||
helm repo update
|
||||
helm -n speedscale upgrade speedscale-operator speedscale/speedscale-operator
|
||||
```
|
||||
|
||||
Resources capturing traffic will need to be rolled to pick up the latest
|
||||
Speedscale sidecar. Use the rollout restart command for each namespace and
|
||||
resource type:
|
||||
|
||||
```bash
|
||||
kubectl -n <namespace> rollout restart deployment
|
||||
```
|
||||
|
||||
With Helm v3, CRDs created by this chart are not updated by default
|
||||
and should be manually updated.
|
||||
Consult also the [Helm Documentation on CRDs](https://helm.sh/docs/chart_best_practices/custom_resource_definitions).
|
||||
|
||||
_See [helm upgrade](https://helm.sh/docs/helm/helm_upgrade/) for command documentation._
|
||||
|
||||
### Upgrading an existing Release to a new version
|
||||
|
||||
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
||||
incompatible breaking change needing manual actions.
|
||||
|
||||
|
||||
## Help
|
||||
|
||||
Speedscale docs information available at [docs.speedscale.com](https://docs.speedscale.com) or join us
|
||||
on the [Speedscale community Slack](https://join.slack.com/t/speedscalecommunity/shared_invite/zt-x5rcrzn4-XHG1QqcHNXIM~4yozRrz8A)!
|
|
@ -0,0 +1,9 @@
|
|||
questions:
|
||||
- variable: apiKey
|
||||
default: "fffffffffffffffffffffffffffffffffffffffffffff"
|
||||
description: "An API key is required to connect to the Speedscale cloud."
|
||||
required: true
|
||||
type: string
|
||||
label: API Key
|
||||
group: Authentication
|
||||
|
|
@ -0,0 +1,12 @@
|
|||
Thank you for installing the Speedscale Operator!
|
||||
|
||||
Next you'll need to add the Speedscale Proxy Sidecar to your deployments.
|
||||
See https://docs.speedscale.com/setup/sidecar/install/
|
||||
|
||||
If upgrading use the rollout restart command for each namespace and resource
|
||||
type to ensure Speedscale sidecars are updated:
|
||||
|
||||
kubectl -n <namespace> rollout restart deployment
|
||||
|
||||
Once your deployment is running the sidecar your service will show up on
|
||||
https://app.speedscale.com/.
|
|
@ -0,0 +1,209 @@
|
|||
{{- $cacrt := "" -}}
|
||||
{{- $crt := "" -}}
|
||||
{{- $key := "" -}}
|
||||
{{- $s := (lookup "v1" "Secret" .Release.Namespace "speedscale-webhook-certs") -}}
|
||||
{{- if $s -}}
|
||||
{{- $cacrt = index $s.data "ca.crt" | default (index $s.data "tls.crt") | b64dec -}}
|
||||
{{- $crt = index $s.data "tls.crt" | b64dec -}}
|
||||
{{- $key = index $s.data "tls.key" | b64dec -}}
|
||||
{{ else }}
|
||||
{{- $altNames := list ( printf "speedscale-operator.%s" .Release.Namespace ) ( printf "speedscale-operator.%s.svc" .Release.Namespace ) -}}
|
||||
{{- $ca := genCA "speedscale-operator" 3650 -}}
|
||||
{{- $cert := genSignedCert "speedscale-operator" nil $altNames 3650 $ca -}}
|
||||
{{- $cacrt = $ca.Cert -}}
|
||||
{{- $crt = $cert.Cert -}}
|
||||
{{- $key = $cert.Key -}}
|
||||
{{- end -}}
|
||||
---
|
||||
apiVersion: admissionregistration.k8s.io/v1
|
||||
kind: MutatingWebhookConfiguration
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: speedscale-operator
|
||||
annotations:
|
||||
argocd.argoproj.io/hook: PreSync
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
webhooks:
|
||||
- admissionReviewVersions:
|
||||
- v1
|
||||
clientConfig:
|
||||
caBundle: {{ $cacrt | b64enc }}
|
||||
service:
|
||||
name: speedscale-operator
|
||||
namespace: {{ .Release.Namespace }}
|
||||
path: /mutate
|
||||
failurePolicy: Ignore
|
||||
name: sidecar.speedscale.com
|
||||
namespaceSelector:
|
||||
matchExpressions:
|
||||
- key: kubernetes.io/metadata.name
|
||||
operator: "NotIn"
|
||||
values:
|
||||
- kube-system
|
||||
- kube-node-lease
|
||||
{{- if .Values.namespaceSelector }}
|
||||
- key: kubernetes.io/metadata.name
|
||||
operator: "In"
|
||||
values:
|
||||
{{- range .Values.namespaceSelector }}
|
||||
- {{ . | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
reinvocationPolicy: IfNeeded
|
||||
rules:
|
||||
- apiGroups:
|
||||
- apps
|
||||
- batch
|
||||
apiVersions:
|
||||
- v1
|
||||
operations:
|
||||
- CREATE
|
||||
- UPDATE
|
||||
- DELETE
|
||||
resources:
|
||||
- deployments
|
||||
- statefulsets
|
||||
- daemonsets
|
||||
- jobs
|
||||
- replicasets
|
||||
- apiGroups:
|
||||
- ""
|
||||
apiVersions:
|
||||
- v1
|
||||
operations:
|
||||
- CREATE
|
||||
- UPDATE
|
||||
- DELETE
|
||||
resources:
|
||||
- pods
|
||||
- apiGroups:
|
||||
- argoproj.io
|
||||
apiVersions:
|
||||
- "*"
|
||||
operations:
|
||||
- CREATE
|
||||
- UPDATE
|
||||
- DELETE
|
||||
resources:
|
||||
- rollouts
|
||||
sideEffects: None
|
||||
timeoutSeconds: 10
|
||||
---
|
||||
apiVersion: admissionregistration.k8s.io/v1
|
||||
kind: MutatingWebhookConfiguration
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: speedscale-operator-replay
|
||||
annotations:
|
||||
argocd.argoproj.io/hook: PreSync
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
webhooks:
|
||||
- admissionReviewVersions:
|
||||
- v1
|
||||
clientConfig:
|
||||
caBundle: {{ $cacrt | b64enc }}
|
||||
service:
|
||||
name: speedscale-operator
|
||||
namespace: {{ .Release.Namespace }}
|
||||
path: /mutate-speedscale-com-v1-trafficreplay
|
||||
failurePolicy: Fail
|
||||
name: replay.speedscale.com
|
||||
namespaceSelector:
|
||||
matchExpressions:
|
||||
- key: kubernetes.io/metadata.name
|
||||
operator: "NotIn"
|
||||
values:
|
||||
- kube-system
|
||||
- kube-node-lease
|
||||
{{- if .Values.namespaceSelector }}
|
||||
- key: kubernetes.io/metadata.name
|
||||
operator: "In"
|
||||
values:
|
||||
{{- range .Values.namespaceSelector }}
|
||||
- {{ . | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
- speedscale.com
|
||||
apiVersions:
|
||||
- v1
|
||||
operations:
|
||||
- CREATE
|
||||
- UPDATE
|
||||
resources:
|
||||
- trafficreplays
|
||||
sideEffects: None
|
||||
timeoutSeconds: 10
|
||||
---
|
||||
apiVersion: admissionregistration.k8s.io/v1
|
||||
kind: ValidatingWebhookConfiguration
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: speedscale-operator-replay
|
||||
annotations:
|
||||
argocd.argoproj.io/hook: PreSync
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
webhooks:
|
||||
- admissionReviewVersions:
|
||||
- v1
|
||||
clientConfig:
|
||||
caBundle: {{ $cacrt | b64enc }}
|
||||
service:
|
||||
name: speedscale-operator
|
||||
namespace: {{ .Release.Namespace }}
|
||||
path: /validate-speedscale-com-v1-trafficreplay
|
||||
failurePolicy: Fail
|
||||
name: replay.speedscale.com
|
||||
namespaceSelector:
|
||||
matchExpressions:
|
||||
- key: kubernetes.io/metadata.name
|
||||
operator: "NotIn"
|
||||
values:
|
||||
- kube-system
|
||||
- kube-node-lease
|
||||
{{- if .Values.namespaceSelector }}
|
||||
- key: kubernetes.io/metadata.name
|
||||
operator: "In"
|
||||
values:
|
||||
{{- range .Values.namespaceSelector }}
|
||||
- {{ . | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
- speedscale.com
|
||||
apiVersions:
|
||||
- v1
|
||||
operations:
|
||||
- CREATE
|
||||
- UPDATE
|
||||
- DELETE
|
||||
resources:
|
||||
- trafficreplays
|
||||
sideEffects: None
|
||||
timeoutSeconds: 10
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
annotations:
|
||||
helm.sh/hook: pre-install
|
||||
helm.sh/hook-delete-policy: before-hook-creation
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
creationTimestamp: null
|
||||
name: speedscale-webhook-certs
|
||||
namespace: {{ .Release.Namespace }}
|
||||
type: kubernetes.io/tls
|
||||
data:
|
||||
ca.crt: {{ $cacrt | b64enc }}
|
||||
tls.crt: {{ $crt | b64enc }}
|
||||
tls.key: {{ $key | b64enc }}
|
|
@ -0,0 +1,43 @@
|
|||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: speedscale-operator
|
||||
namespace: {{ .Release.Namespace }}
|
||||
annotations:
|
||||
argocd.argoproj.io/hook: PreSync
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
data:
|
||||
CLUSTER_NAME: {{ .Values.clusterName }}
|
||||
IMAGE_PULL_POLICY: {{ .Values.image.pullPolicy }}
|
||||
IMAGE_PULL_SECRETS: ""
|
||||
IMAGE_REGISTRY: {{ .Values.image.registry }}
|
||||
IMAGE_TAG: {{ .Values.image.tag }}
|
||||
INSTANCE_ID: '{{- $cm := (lookup "v1" "ConfigMap" .Release.Namespace "speedscale-operator") -}}{{ if $cm }}{{ $cm.data.INSTANCE_ID }}{{ else }}{{ ( printf "%s-%s" .Values.clusterName uuidv4 ) }}{{ end }}'
|
||||
LOG_LEVEL: {{ .Values.logLevel }}
|
||||
SPEEDSCALE_DLP_CONFIG: {{ .Values.dlp.config }}
|
||||
SPEEDSCALE_FILTER_RULE: {{ .Values.filterRule }}
|
||||
TELEMETRY_INTERVAL: 60s
|
||||
WITH_DLP: {{ .Values.dlp.enabled | quote }}
|
||||
WITH_INSPECTOR: {{ .Values.dashboardAccess | quote }}
|
||||
API_KEY_SECRET_NAME: {{ .Values.apiKeySecret | quote }}
|
||||
DEPLOY_DEMO: {{ .Values.deployDemo | quote }}
|
||||
GLOBAL_ANNOTATIONS: {{ .Values.globalAnnotations | toJson | quote }}
|
||||
GLOBAL_LABELS: {{ .Values.globalLabels | toJson | quote }}
|
||||
{{- if .Values.http_proxy }}
|
||||
HTTP_PROXY: {{ .Values.http_proxy }}
|
||||
{{- end }}
|
||||
{{- if .Values.https_proxy }}
|
||||
HTTPS_PROXY: {{ .Values.https_proxy }}
|
||||
{{- end }}
|
||||
{{- if .Values.no_proxy }}
|
||||
NO_PROXY: {{ .Values.no_proxy }}
|
||||
{{- end }}
|
||||
PRIVILEGED_SIDECARS: {{ .Values.privilegedSidecars | quote }}
|
||||
DISABLE_SMARTDNS: {{ .Values.disableSidecarSmartReverseDNS | quote }}
|
||||
SIDECAR_CONFIG: {{ .Values.sidecar | toJson | quote }}
|
||||
FORWARDER_CONFIG: {{ .Values.forwarder | toJson | quote }}
|
||||
TEST_PREP_TIMEOUT: {{ .Values.operator.test_prep_timeout }}
|
||||
CONTROL_PLANE_TIMEOUT: {{ .Values.operator.control_plane_timeout }}
|
|
@ -0,0 +1,161 @@
|
|||
apiVersion: apiextensions.k8s.io/v1
|
||||
kind: CustomResourceDefinition
|
||||
metadata:
|
||||
annotations:
|
||||
controller-gen.kubebuilder.io/version: v0.15.0
|
||||
creationTimestamp: null
|
||||
name: agenttasks.speedscale.com
|
||||
spec:
|
||||
group: speedscale.com
|
||||
names:
|
||||
kind: AgentTask
|
||||
listKind: AgentTaskList
|
||||
plural: agenttasks
|
||||
shortNames:
|
||||
- sat
|
||||
singular: agenttask
|
||||
scope: Namespaced
|
||||
versions:
|
||||
- additionalPrinterColumns:
|
||||
- jsonPath: .status.active
|
||||
name: Active
|
||||
type: boolean
|
||||
- jsonPath: .spec.mode
|
||||
name: Mode
|
||||
type: string
|
||||
- jsonPath: .status.conditions[-1:].message
|
||||
name: Status
|
||||
type: string
|
||||
- jsonPath: .metadata.creationTimestamp
|
||||
name: Age
|
||||
type: date
|
||||
name: v1
|
||||
schema:
|
||||
openAPIV3Schema:
|
||||
description: AgentTask is the Schema for the agenttasks API.
|
||||
properties:
|
||||
apiVersion:
|
||||
description: |-
|
||||
APIVersion defines the versioned schema of this representation of an object.
|
||||
Servers should convert recognized schemas to the latest internal value, and
|
||||
may reject unrecognized values.
|
||||
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
||||
type: string
|
||||
kind:
|
||||
description: |-
|
||||
Kind is a string value representing the REST resource this object represents.
|
||||
Servers may infer this from the endpoint the client submits requests to.
|
||||
Cannot be updated.
|
||||
In CamelCase.
|
||||
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
||||
type: string
|
||||
metadata:
|
||||
type: object
|
||||
spec:
|
||||
description: Spec is the desired state of the AgentTask.
|
||||
type: object
|
||||
status:
|
||||
default:
|
||||
observedGeneration: -1
|
||||
description: Status is the current state of the AgentTask.
|
||||
properties:
|
||||
active:
|
||||
description: Active indicates whether this agent task is currently
|
||||
underway or not.
|
||||
type: boolean
|
||||
conditions:
|
||||
items:
|
||||
description: "Condition contains details for one aspect of the current
|
||||
state of this API Resource.\n---\nThis struct is intended for
|
||||
direct use as an array at the field path .status.conditions. For
|
||||
example,\n\n\n\ttype FooStatus struct{\n\t // Represents the
|
||||
observations of a foo's current state.\n\t // Known .status.conditions.type
|
||||
are: \"Available\", \"Progressing\", and \"Degraded\"\n\t //
|
||||
+patchMergeKey=type\n\t // +patchStrategy=merge\n\t // +listType=map\n\t
|
||||
\ // +listMapKey=type\n\t Conditions []metav1.Condition `json:\"conditions,omitempty\"
|
||||
patchStrategy:\"merge\" patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"`\n\n\n\t
|
||||
\ // other fields\n\t}"
|
||||
properties:
|
||||
lastTransitionTime:
|
||||
description: |-
|
||||
lastTransitionTime is the last time the condition transitioned from one status to another.
|
||||
This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.
|
||||
format: date-time
|
||||
type: string
|
||||
message:
|
||||
description: |-
|
||||
message is a human readable message indicating details about the transition.
|
||||
This may be an empty string.
|
||||
maxLength: 32768
|
||||
type: string
|
||||
observedGeneration:
|
||||
description: |-
|
||||
observedGeneration represents the .metadata.generation that the condition was set based upon.
|
||||
For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
|
||||
with respect to the current state of the instance.
|
||||
format: int64
|
||||
minimum: 0
|
||||
type: integer
|
||||
reason:
|
||||
description: |-
|
||||
reason contains a programmatic identifier indicating the reason for the condition's last transition.
|
||||
Producers of specific condition types may define expected values and meanings for this field,
|
||||
and whether the values are considered a guaranteed API.
|
||||
The value should be a CamelCase string.
|
||||
This field may not be empty.
|
||||
maxLength: 1024
|
||||
minLength: 1
|
||||
pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$
|
||||
type: string
|
||||
status:
|
||||
description: status of the condition, one of True, False, Unknown.
|
||||
enum:
|
||||
- "True"
|
||||
- "False"
|
||||
- Unknown
|
||||
type: string
|
||||
type:
|
||||
description: |-
|
||||
type of condition in CamelCase or in foo.example.com/CamelCase.
|
||||
---
|
||||
Many .condition.type values are consistent across resources like Available, but because arbitrary conditions can be
|
||||
useful (see .node.status.conditions), the ability to deconflict is important.
|
||||
The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
|
||||
maxLength: 316
|
||||
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
|
||||
type: string
|
||||
required:
|
||||
- lastTransitionTime
|
||||
- message
|
||||
- reason
|
||||
- status
|
||||
- type
|
||||
type: object
|
||||
type: array
|
||||
observedGeneration:
|
||||
description: ObservedGeneration is the last observed generation.
|
||||
format: int64
|
||||
type: integer
|
||||
reconcileFailures:
|
||||
description: |-
|
||||
ReconcileFailures is the number of times the agent task controller
|
||||
experienced an error during the reconciliation process. The agent
|
||||
task will be deleted if too many errors occur.
|
||||
format: int64
|
||||
type: integer
|
||||
reportID:
|
||||
description: The ID of the agent report associated with this agent
|
||||
task.
|
||||
type: string
|
||||
type: object
|
||||
type: object
|
||||
served: true
|
||||
storage: true
|
||||
subresources:
|
||||
status: {}
|
||||
status:
|
||||
acceptedNames:
|
||||
kind: ""
|
||||
plural: ""
|
||||
conditions: null
|
||||
storedVersions: null
|
|
@ -0,0 +1,522 @@
|
|||
apiVersion: apiextensions.k8s.io/v1
|
||||
kind: CustomResourceDefinition
|
||||
metadata:
|
||||
annotations:
|
||||
controller-gen.kubebuilder.io/version: v0.15.0
|
||||
creationTimestamp: null
|
||||
name: trafficreplays.speedscale.com
|
||||
spec:
|
||||
group: speedscale.com
|
||||
names:
|
||||
kind: TrafficReplay
|
||||
listKind: TrafficReplayList
|
||||
plural: trafficreplays
|
||||
shortNames:
|
||||
- replay
|
||||
singular: trafficreplay
|
||||
scope: Namespaced
|
||||
versions:
|
||||
- additionalPrinterColumns:
|
||||
- jsonPath: .status.active
|
||||
name: Active
|
||||
type: boolean
|
||||
- jsonPath: .spec.mode
|
||||
name: Mode
|
||||
type: string
|
||||
- jsonPath: .status.conditions[-1:].message
|
||||
name: Status
|
||||
type: string
|
||||
- jsonPath: .metadata.creationTimestamp
|
||||
name: Age
|
||||
type: date
|
||||
name: v1
|
||||
schema:
|
||||
openAPIV3Schema:
|
||||
description: TrafficReplay is the Schema for the trafficreplays API.
|
||||
properties:
|
||||
apiVersion:
|
||||
description: |-
|
||||
APIVersion defines the versioned schema of this representation of an object.
|
||||
Servers should convert recognized schemas to the latest internal value, and
|
||||
may reject unrecognized values.
|
||||
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
||||
type: string
|
||||
kind:
|
||||
description: |-
|
||||
Kind is a string value representing the REST resource this object represents.
|
||||
Servers may infer this from the endpoint the client submits requests to.
|
||||
Cannot be updated.
|
||||
In CamelCase.
|
||||
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
||||
type: string
|
||||
metadata:
|
||||
type: object
|
||||
spec:
|
||||
description: Spec defines the desired state of TrafficReplay.
|
||||
properties:
|
||||
buildTag:
|
||||
description: |-
|
||||
BuildTag links a unique tag, build hash, etc. to the generated
|
||||
traffic replay report. That way you can connect the report results to the
|
||||
version of the code that was tested.
|
||||
type: string
|
||||
cleanup:
|
||||
description: |-
|
||||
Cleanup is the name of cleanup mode used for this TrafficReplay. Set to
|
||||
"none" to leave resources in the state they were during the replay. The
|
||||
default mode "inventory" will revert the environment to the state it was
|
||||
before the replay.
|
||||
enum:
|
||||
- inventory
|
||||
- all
|
||||
- none
|
||||
type: string
|
||||
collectLogs:
|
||||
description: 'DEPRECATED: use TestReport.ActualConfig.Cluster.CollectLogs'
|
||||
type: boolean
|
||||
configChecksum:
|
||||
description: |-
|
||||
ConfigChecksum, managed my the operator, is the SHA1 checksum of the
|
||||
configuration.
|
||||
type: string
|
||||
customURL:
|
||||
description: |-
|
||||
CustomURL specifies a custom URL to send *ALL* traffic to. Use
|
||||
Workload.CustomURI to send traffic to a specific URL for only that
|
||||
workload.
|
||||
type: string
|
||||
generatorLowData:
|
||||
description: |-
|
||||
GeneratorLowData forces the generator into a high
|
||||
efficiency/low data output mode. This is ideal for high volume
|
||||
performance tests. Defaults to false.
|
||||
DEPRECATED
|
||||
type: boolean
|
||||
mode:
|
||||
description: Mode is the name of replay mode used for this TrafficReplay.
|
||||
enum:
|
||||
- full-replay
|
||||
- responder-only
|
||||
- generator-only
|
||||
type: string
|
||||
needsReport:
|
||||
description: 'DEPRECATED: replays always create reports'
|
||||
type: boolean
|
||||
proxyMode:
|
||||
description: |-
|
||||
ProxyMode defines proxy operational mode used with injected sidecar.
|
||||
DEPRECATED
|
||||
type: string
|
||||
responderLowData:
|
||||
description: |-
|
||||
ResponderLowData forces the responder into a high
|
||||
efficiency/low data output mode. This is ideal for high volume
|
||||
performance tests. Defaults to false.
|
||||
DEPRECATED
|
||||
type: boolean
|
||||
secretRefs:
|
||||
description: |-
|
||||
SecretRefs hold the references to the secrets which contain
|
||||
various secrets like (e.g. short-lived JWTs to be used by the generator
|
||||
for authorization with HTTP calls).
|
||||
items:
|
||||
description: |-
|
||||
LocalObjectReference contains enough information to locate the referenced
|
||||
Kubernetes resource object.
|
||||
properties:
|
||||
name:
|
||||
description: Name of the referent.
|
||||
type: string
|
||||
required:
|
||||
- name
|
||||
type: object
|
||||
type: array
|
||||
sidecar:
|
||||
description: |-
|
||||
Sidecar defines sidecar specific configuration.
|
||||
DEPRECATED: use Workloads
|
||||
properties:
|
||||
inject:
|
||||
description: 'DEPRECATED: do not use'
|
||||
type: boolean
|
||||
patch:
|
||||
description: Patch is .yaml file patch for the Workload
|
||||
format: byte
|
||||
type: string
|
||||
tls:
|
||||
properties:
|
||||
in:
|
||||
description: In provides configuration for sidecar inbound
|
||||
TLS.
|
||||
properties:
|
||||
private:
|
||||
description: Private is the filename of the TLS inbound
|
||||
private key.
|
||||
type: string
|
||||
public:
|
||||
description: Public is the filename of the TLS inbound
|
||||
public key.
|
||||
type: string
|
||||
secret:
|
||||
description: Secret is a secret with the TLS keys to use
|
||||
for inbound traffic.
|
||||
type: string
|
||||
type: object
|
||||
mutual:
|
||||
description: Mutual provides configuration for sidecar mutual
|
||||
TLS.
|
||||
properties:
|
||||
private:
|
||||
description: Private is the filename of the mutual TLS
|
||||
private key.
|
||||
type: string
|
||||
public:
|
||||
description: Public is the filename of the mutual TLS
|
||||
public key.
|
||||
type: string
|
||||
secret:
|
||||
description: Secret is a secret with the mutual TLS keys.
|
||||
type: string
|
||||
type: object
|
||||
out:
|
||||
description: |-
|
||||
Out enables or disables TLS out on the
|
||||
sidecar during replay.
|
||||
type: boolean
|
||||
type: object
|
||||
type: object
|
||||
snapshotID:
|
||||
description: |-
|
||||
SnapshotID is the id of the traffic snapshot for this
|
||||
TrafficReplay.
|
||||
type: string
|
||||
testConfigID:
|
||||
description: |-
|
||||
TestConfigID is the id of the replay configuration to be used
|
||||
by the generator and responder for the TrafficReplay.
|
||||
type: string
|
||||
timeout:
|
||||
description: |-
|
||||
Timeout is the time to wait for replay test to finish. Defaults
|
||||
to value of the `TIMEOUT` setting of the operator.
|
||||
type: string
|
||||
ttlAfterReady:
|
||||
description: |-
|
||||
TTLAfterReady provides a TTL (time to live) mechanism to limit
|
||||
the lifetime of TrafficReplay object that have finished the execution and
|
||||
reached its final state (either complete or failed).
|
||||
type: string
|
||||
workloadRef:
|
||||
description: |-
|
||||
WorkloadRef is the reference to the target workload (SUT) for
|
||||
TrafficReplay. The operations will be performed in the namespace of the
|
||||
target object.
|
||||
DEPRECATED: use Workloads
|
||||
properties:
|
||||
apiVersion:
|
||||
description: API version of the referenced object.
|
||||
type: string
|
||||
kind:
|
||||
description: Kind of the referenced object. Defaults to "Deployment".
|
||||
type: string
|
||||
name:
|
||||
description: |-
|
||||
Name of the referenced object. Required when defining for a test unless a
|
||||
custom URI is provided. Always required when defining mocks.
|
||||
type: string
|
||||
namespace:
|
||||
description: Namespace of the referenced object. Defaults to the
|
||||
TrafficReplay namespace.
|
||||
type: string
|
||||
required:
|
||||
- name
|
||||
type: object
|
||||
workloads:
|
||||
description: |-
|
||||
Workloads define target workloads (SUT) for a TrafficReplay. Many
|
||||
workloads may be provided, or none. Workloads may be modified and
|
||||
restarted during replay to configure communication with a responder.
|
||||
items:
|
||||
description: |-
|
||||
Workload represents a Kubernetes workload to be targeted during replay and
|
||||
associated settings.
|
||||
properties:
|
||||
customURI:
|
||||
description: |-
|
||||
CustomURI will be target of the traffic instead of directly targeting
|
||||
workload. This is required if a Ref is not specified.
|
||||
type: string
|
||||
inTrafficKey:
|
||||
description: 'DEPRECATED: use Tests'
|
||||
type: string
|
||||
inTrafficKeys:
|
||||
description: 'DEPRECATED: use Tests'
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
mocks:
|
||||
description: |-
|
||||
Mocks are strings used to identify slices of outbound snapshot traffic to
|
||||
mock for this workload and maps directly to a snapshot's `OutTraffic`
|
||||
field. Snapshot egress traffic can be split across multiple slices where
|
||||
each slice contains part of the traffic. A workload may specify multiple
|
||||
keys and multiple workloads may specify the same key.
|
||||
|
||||
|
||||
Only the traffic slices defined here will be mocked. A workload with no
|
||||
keys defined will not mock any traffic. Pass '*' to mock all traffic.
|
||||
|
||||
|
||||
Mock strings may only match part of the snapshot's `OutTraffic` key if the
|
||||
string matches exactly one key. For example, the test string
|
||||
`foo.example.com` would match the `OutTraffic` key of
|
||||
my-service:foo.example.com:8080, as long as no other keys would match
|
||||
`foo.example.com`. Multiple mocks must be specified for multiple keys
|
||||
unless using '*'.
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
outTrafficKeys:
|
||||
description: 'DEPRECATED: use Mocks'
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
ref:
|
||||
description: |-
|
||||
Ref is a reference to a cluster workload, like a service, deployment or
|
||||
statefulset. This is required unless a CustomURI is specified.
|
||||
properties:
|
||||
apiVersion:
|
||||
description: API version of the referenced object.
|
||||
type: string
|
||||
kind:
|
||||
description: Kind of the referenced object. Defaults to
|
||||
"Deployment".
|
||||
type: string
|
||||
name:
|
||||
description: |-
|
||||
Name of the referenced object. Required when defining for a test unless a
|
||||
custom URI is provided. Always required when defining mocks.
|
||||
type: string
|
||||
namespace:
|
||||
description: Namespace of the referenced object. Defaults
|
||||
to the TrafficReplay namespace.
|
||||
type: string
|
||||
required:
|
||||
- name
|
||||
type: object
|
||||
routing:
|
||||
description: Routing configures how workloads route egress traffic
|
||||
to responders
|
||||
enum:
|
||||
- hostalias
|
||||
- nat
|
||||
type: string
|
||||
sidecar:
|
||||
description: |-
|
||||
TODO: this is not implemented, come back and replace deprecated Sidecar with workload specific settings
|
||||
Sidecar defines sidecar specific configuration.
|
||||
properties:
|
||||
inject:
|
||||
description: 'DEPRECATED: do not use'
|
||||
type: boolean
|
||||
patch:
|
||||
description: Patch is .yaml file patch for the Workload
|
||||
format: byte
|
||||
type: string
|
||||
tls:
|
||||
properties:
|
||||
in:
|
||||
description: In provides configuration for sidecar inbound
|
||||
TLS.
|
||||
properties:
|
||||
private:
|
||||
description: Private is the filename of the TLS
|
||||
inbound private key.
|
||||
type: string
|
||||
public:
|
||||
description: Public is the filename of the TLS inbound
|
||||
public key.
|
||||
type: string
|
||||
secret:
|
||||
description: Secret is a secret with the TLS keys
|
||||
to use for inbound traffic.
|
||||
type: string
|
||||
type: object
|
||||
mutual:
|
||||
description: Mutual provides configuration for sidecar
|
||||
mutual TLS.
|
||||
properties:
|
||||
private:
|
||||
description: Private is the filename of the mutual
|
||||
TLS private key.
|
||||
type: string
|
||||
public:
|
||||
description: Public is the filename of the mutual
|
||||
TLS public key.
|
||||
type: string
|
||||
secret:
|
||||
description: Secret is a secret with the mutual
|
||||
TLS keys.
|
||||
type: string
|
||||
type: object
|
||||
out:
|
||||
description: |-
|
||||
Out enables or disables TLS out on the
|
||||
sidecar during replay.
|
||||
type: boolean
|
||||
type: object
|
||||
type: object
|
||||
tests:
|
||||
description: |-
|
||||
Tests are strings used to identify slices of inbound snapshot traffic this
|
||||
workload is targeting and maps directly to a snapshot's `InTraffic` field.
|
||||
Snapshot ingress traffic can be split across multiple slices where each
|
||||
slice contains part of the traffic. A key must only be specified once
|
||||
across all workloads, but a workload may specify multiple keys. Pass '*'
|
||||
to match all keys.
|
||||
|
||||
|
||||
Test strings may only match part of the snapshot's `InTraffic` key if the
|
||||
string matches exactly one key. For example, the test string
|
||||
`foo.example.com` would match the `InTraffic` key of
|
||||
my-service:foo.example.com:8080, as long as no other keys would match
|
||||
`foo.example.com`
|
||||
|
||||
|
||||
This field is optional in the spec to provide support for single-workload
|
||||
and legacy replays, but must be specified for multi-workload replays in
|
||||
order to provide deterministic replay configuration.
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
type: object
|
||||
type: array
|
||||
required:
|
||||
- snapshotID
|
||||
- testConfigID
|
||||
type: object
|
||||
status:
|
||||
default:
|
||||
observedGeneration: -1
|
||||
description: Status defines the observed state of TrafficReplay.
|
||||
properties:
|
||||
active:
|
||||
description: Active indicates whether this traffic replay is currently
|
||||
underway or not.
|
||||
type: boolean
|
||||
conditions:
|
||||
items:
|
||||
description: "Condition contains details for one aspect of the current
|
||||
state of this API Resource.\n---\nThis struct is intended for
|
||||
direct use as an array at the field path .status.conditions. For
|
||||
example,\n\n\n\ttype FooStatus struct{\n\t // Represents the
|
||||
observations of a foo's current state.\n\t // Known .status.conditions.type
|
||||
are: \"Available\", \"Progressing\", and \"Degraded\"\n\t //
|
||||
+patchMergeKey=type\n\t // +patchStrategy=merge\n\t // +listType=map\n\t
|
||||
\ // +listMapKey=type\n\t Conditions []metav1.Condition `json:\"conditions,omitempty\"
|
||||
patchStrategy:\"merge\" patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"`\n\n\n\t
|
||||
\ // other fields\n\t}"
|
||||
properties:
|
||||
lastTransitionTime:
|
||||
description: |-
|
||||
lastTransitionTime is the last time the condition transitioned from one status to another.
|
||||
This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.
|
||||
format: date-time
|
||||
type: string
|
||||
message:
|
||||
description: |-
|
||||
message is a human readable message indicating details about the transition.
|
||||
This may be an empty string.
|
||||
maxLength: 32768
|
||||
type: string
|
||||
observedGeneration:
|
||||
description: |-
|
||||
observedGeneration represents the .metadata.generation that the condition was set based upon.
|
||||
For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
|
||||
with respect to the current state of the instance.
|
||||
format: int64
|
||||
minimum: 0
|
||||
type: integer
|
||||
reason:
|
||||
description: |-
|
||||
reason contains a programmatic identifier indicating the reason for the condition's last transition.
|
||||
Producers of specific condition types may define expected values and meanings for this field,
|
||||
and whether the values are considered a guaranteed API.
|
||||
The value should be a CamelCase string.
|
||||
This field may not be empty.
|
||||
maxLength: 1024
|
||||
minLength: 1
|
||||
pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$
|
||||
type: string
|
||||
status:
|
||||
description: status of the condition, one of True, False, Unknown.
|
||||
enum:
|
||||
- "True"
|
||||
- "False"
|
||||
- Unknown
|
||||
type: string
|
||||
type:
|
||||
description: |-
|
||||
type of condition in CamelCase or in foo.example.com/CamelCase.
|
||||
---
|
||||
Many .condition.type values are consistent across resources like Available, but because arbitrary conditions can be
|
||||
useful (see .node.status.conditions), the ability to deconflict is important.
|
||||
The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
|
||||
maxLength: 316
|
||||
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
|
||||
type: string
|
||||
required:
|
||||
- lastTransitionTime
|
||||
- message
|
||||
- reason
|
||||
- status
|
||||
- type
|
||||
type: object
|
||||
type: array
|
||||
finishedTime:
|
||||
description: Information when the traffic replay has finished.
|
||||
format: date-time
|
||||
type: string
|
||||
initializedTime:
|
||||
description: Information when the test environment was successfully
|
||||
prepared.
|
||||
format: date-time
|
||||
type: string
|
||||
lastHeartbeatTime:
|
||||
description: 'DEPRECATED: will not be set'
|
||||
format: date-time
|
||||
type: string
|
||||
observedGeneration:
|
||||
description: ObservedGeneration is the last observed generation.
|
||||
format: int64
|
||||
type: integer
|
||||
reconcileFailures:
|
||||
description: |-
|
||||
ReconcileFailures is the number of times the traffic replay controller
|
||||
experienced an error during the reconciliation process. The traffic
|
||||
replay will be deleted if too many errors occur.
|
||||
format: int64
|
||||
type: integer
|
||||
reportID:
|
||||
description: The ID of the traffic replay report created.
|
||||
type: string
|
||||
reportURL:
|
||||
description: The URL to the traffic replay report.
|
||||
type: string
|
||||
startedTime:
|
||||
description: Information when the traffic replay has started.
|
||||
format: date-time
|
||||
type: string
|
||||
type: object
|
||||
type: object
|
||||
served: true
|
||||
storage: true
|
||||
subresources:
|
||||
status: {}
|
||||
status:
|
||||
acceptedNames:
|
||||
kind: ""
|
||||
plural: ""
|
||||
conditions: null
|
||||
storedVersions: null
|
|
@ -0,0 +1,132 @@
|
|||
---
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
annotations:
|
||||
operator.speedscale.com/ignore: "true"
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
labels:
|
||||
app: speedscale-operator
|
||||
controlplane.speedscale.com/component: operator
|
||||
{{- if .Values.globalLabels }}
|
||||
{{ toYaml .Values.globalLabels | indent 4}}
|
||||
{{- end }}
|
||||
name: speedscale-operator
|
||||
namespace: {{ .Release.Namespace }}
|
||||
spec:
|
||||
replicas: 1
|
||||
selector:
|
||||
matchLabels:
|
||||
app: speedscale-operator
|
||||
controlplane.speedscale.com/component: operator
|
||||
strategy:
|
||||
type: Recreate
|
||||
template:
|
||||
metadata:
|
||||
annotations:
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 8}}
|
||||
{{- end }}
|
||||
labels:
|
||||
app: speedscale-operator
|
||||
controlplane.speedscale.com/component: operator
|
||||
{{- if .Values.globalLabels }}
|
||||
{{ toYaml .Values.globalLabels | indent 8}}
|
||||
{{- end }}
|
||||
spec:
|
||||
containers:
|
||||
- command:
|
||||
- /operator
|
||||
env:
|
||||
- name: POD_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
apiVersion: v1
|
||||
fieldPath: metadata.name
|
||||
- name: POD_NAMESPACE
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
apiVersion: v1
|
||||
fieldPath: metadata.namespace
|
||||
envFrom:
|
||||
- configMapRef:
|
||||
name: speedscale-operator
|
||||
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.23/#container-v1-core
|
||||
# When a key exists in multiple sources, the value associated with the last source will take precedence.
|
||||
# Values defined by an Env with a duplicate key will take precedence.
|
||||
- configMapRef:
|
||||
name: speedscale-operator-override
|
||||
optional: true
|
||||
- secretRef:
|
||||
name: '{{ ne .Values.apiKeySecret "" | ternary .Values.apiKeySecret "speedscale-apikey" }}'
|
||||
optional: false
|
||||
image: '{{ .Values.image.registry }}/operator:{{ .Values.image.tag }}'
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||
livenessProbe:
|
||||
failureThreshold: 5
|
||||
httpGet:
|
||||
path: /healthz
|
||||
port: health-check
|
||||
scheme: HTTP
|
||||
initialDelaySeconds: 30
|
||||
periodSeconds: 30
|
||||
successThreshold: 1
|
||||
timeoutSeconds: 5
|
||||
name: operator
|
||||
ports:
|
||||
- containerPort: 443
|
||||
name: webhook-server
|
||||
- containerPort: 8081
|
||||
name: health-check
|
||||
readinessProbe:
|
||||
failureThreshold: 10
|
||||
httpGet:
|
||||
path: /readyz
|
||||
port: health-check
|
||||
scheme: HTTP
|
||||
initialDelaySeconds: 5
|
||||
periodSeconds: 5
|
||||
successThreshold: 1
|
||||
timeoutSeconds: 5
|
||||
resources: {{- toYaml .Values.operator.resources | nindent 10 }}
|
||||
securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
privileged: false
|
||||
readOnlyRootFilesystem: true
|
||||
runAsNonRoot: false
|
||||
# Run as root to bind 443 https://github.com/kubernetes/kubernetes/issues/56374
|
||||
runAsUser: 0
|
||||
volumeMounts:
|
||||
- mountPath: /tmp
|
||||
name: tmp
|
||||
- mountPath: /tmp/k8s-webhook-server/serving-certs
|
||||
name: webhook-certs
|
||||
readOnly: true
|
||||
- mountPath: /etc/ssl/speedscale
|
||||
name: speedscale-tls-out
|
||||
readOnly: true
|
||||
hostNetwork: {{ .Values.hostNetwork }}
|
||||
securityContext:
|
||||
runAsNonRoot: true
|
||||
serviceAccountName: speedscale-operator
|
||||
terminationGracePeriodSeconds: 10
|
||||
volumes:
|
||||
- emptyDir: {}
|
||||
name: tmp
|
||||
- name: webhook-certs
|
||||
secret:
|
||||
secretName: speedscale-webhook-certs
|
||||
- name: speedscale-tls-out
|
||||
secret:
|
||||
secretName: speedscale-certs
|
||||
{{- if .Values.affinity }}
|
||||
affinity: {{ toYaml .Values.affinity | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.tolerations }}
|
||||
tolerations: {{ toYaml .Values.tolerations | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.nodeSelector }}
|
||||
nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
|
||||
{{- end }}
|
|
@ -0,0 +1,79 @@
|
|||
---
|
||||
apiVersion: batch/v1
|
||||
kind: Job
|
||||
metadata:
|
||||
annotations:
|
||||
helm.sh/hook: pre-install
|
||||
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
|
||||
helm.sh/hook-weight: "4"
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
creationTimestamp: null
|
||||
name: speedscale-operator-pre-install
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
{{- if .Values.globalLabels }}
|
||||
{{ toYaml .Values.globalLabels | indent 4}}
|
||||
{{- end }}
|
||||
spec:
|
||||
backoffLimit: 0
|
||||
ttlSecondsAfterFinished: 30
|
||||
template:
|
||||
metadata:
|
||||
annotations:
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 8}}
|
||||
{{- end }}
|
||||
creationTimestamp: null
|
||||
labels:
|
||||
{{- if .Values.globalLabels }}
|
||||
{{ toYaml .Values.globalLabels | indent 8}}
|
||||
{{- end }}
|
||||
spec:
|
||||
containers:
|
||||
- args:
|
||||
- |-
|
||||
# ensure valid settings before the chart reports a successfull install
|
||||
{{- if .Values.http_proxy }}
|
||||
HTTP_PROXY={{ .Values.http_proxy | quote }} \
|
||||
{{- end }}
|
||||
{{- if .Values.https_proxy }}
|
||||
HTTPS_PROXY={{ .Values.https_proxy | quote }} \
|
||||
{{- end }}
|
||||
{{- if .Values.no_proxy }}
|
||||
NO_PROXY={{ .Values.no_proxy | quote }} \
|
||||
{{- end }}
|
||||
speedctl init --overwrite --no-rcfile-update \
|
||||
--api-key $SPEEDSCALE_API_KEY \
|
||||
--app-url $SPEEDSCALE_APP_URL
|
||||
|
||||
# in case we're in istio
|
||||
curl -X POST http://127.0.0.1:15000/quitquitquit || true
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
envFrom:
|
||||
- secretRef:
|
||||
name: '{{ ne .Values.apiKeySecret "" | ternary .Values.apiKeySecret "speedscale-apikey" }}'
|
||||
optional: false
|
||||
image: '{{ .Values.image.registry }}/speedscale-cli:{{ .Values.image.tag }}'
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||
name: speedscale-cli
|
||||
resources:
|
||||
limits:
|
||||
memory: "128M"
|
||||
cpu: "1"
|
||||
requests:
|
||||
memory: "64M"
|
||||
cpu: "100m"
|
||||
restartPolicy: Never
|
||||
{{- if .Values.affinity }}
|
||||
affinity: {{ toYaml .Values.affinity | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.tolerations }}
|
||||
tolerations: {{ toYaml .Values.tolerations | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.nodeSelector }}
|
||||
nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
|
||||
{{- end }}
|
|
@ -0,0 +1,246 @@
|
|||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: speedscale-operator
|
||||
{{- if .Values.globalAnnotations }}
|
||||
annotations: {{ toYaml .Values.globalAnnotations | nindent 4 }}
|
||||
{{- end }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
- apps
|
||||
resources:
|
||||
- deployments
|
||||
- statefulsets
|
||||
- daemonsets
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- apps
|
||||
resources:
|
||||
- replicasets
|
||||
verbs:
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- batch
|
||||
resources:
|
||||
- jobs
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- apiextensions.k8s.io
|
||||
resources:
|
||||
- customresourcedefinitions
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- apiGroups:
|
||||
- admissionregistration.k8s.io
|
||||
resources:
|
||||
- mutatingwebhookconfigurations
|
||||
- validatingwebhookconfigurations
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- apiGroups:
|
||||
- rbac.authorization.k8s.io
|
||||
resources:
|
||||
- clusterrolebindings
|
||||
- clusterroles
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- namespaces
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- configmaps
|
||||
- secrets
|
||||
- pods
|
||||
- services
|
||||
- serviceaccounts
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods/log
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- events
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- nodes
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- metrics.k8s.io
|
||||
resources:
|
||||
- pods
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- rbac.authorization.k8s.io
|
||||
resources:
|
||||
- rolebindings
|
||||
- roles
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- networking.istio.io
|
||||
resources:
|
||||
- envoyfilters
|
||||
- sidecars
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- security.istio.io
|
||||
resources:
|
||||
- peerauthentications
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- coordination.k8s.io
|
||||
resources:
|
||||
- leases
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- speedscale.com
|
||||
resources:
|
||||
- trafficreplays
|
||||
- agenttasks
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- speedscale.com
|
||||
resources:
|
||||
- trafficreplays/status
|
||||
- agenttasks/status
|
||||
verbs:
|
||||
- get
|
||||
- update
|
||||
- patch
|
||||
- apiGroups:
|
||||
- argoproj.io
|
||||
resources:
|
||||
- rollouts
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: speedscale-operator
|
||||
{{- if .Values.globalAnnotations }}
|
||||
annotations: {{ toYaml .Values.globalAnnotations | nindent 4 }}
|
||||
{{- end }}
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: speedscale-operator
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: speedscale-operator
|
||||
namespace: {{ .Release.Namespace }}
|
||||
---
|
||||
apiVersion: v1
|
||||
automountServiceAccountToken: true
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
labels:
|
||||
app: speedscale-operator
|
||||
controlplane.speedscale.com/component: operator
|
||||
name: speedscale-operator
|
||||
namespace: {{ .Release.Namespace }}
|
||||
{{- if .Values.globalAnnotations }}
|
||||
annotations: {{ toYaml .Values.globalAnnotations | nindent 4 }}
|
||||
{{- end }}
|
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
{{ if .Values.apiKey }}
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: speedscale-apikey
|
||||
namespace: {{ .Release.Namespace }}
|
||||
annotations:
|
||||
helm.sh/hook: pre-install
|
||||
helm.sh/hook-weight: "3"
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
type: Opaque
|
||||
data:
|
||||
SPEEDSCALE_API_KEY: {{ .Values.apiKey | b64enc }}
|
||||
SPEEDSCALE_APP_URL: {{ .Values.appUrl | b64enc }}
|
||||
{{ end }}
|
|
@ -0,0 +1,22 @@
|
|||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
labels:
|
||||
app: speedscale-operator
|
||||
controlplane.speedscale.com/component: operator
|
||||
name: speedscale-operator
|
||||
namespace: {{ .Release.Namespace }}
|
||||
{{- if .Values.globalAnnotations }}
|
||||
annotations: {{ toYaml .Values.globalAnnotations | nindent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
ports:
|
||||
- port: 443
|
||||
protocol: TCP
|
||||
selector:
|
||||
app: speedscale-operator
|
||||
controlplane.speedscale.com/component: operator
|
||||
status:
|
||||
loadBalancer: {}
|
|
@ -0,0 +1,189 @@
|
|||
{{- $crt := "" -}}
|
||||
{{- $key := "" -}}
|
||||
{{- $s := (lookup "v1" "Secret" .Release.Namespace "speedscale-certs") -}}
|
||||
{{- if $s -}}
|
||||
{{- $crt = index $s.data "tls.crt" | b64dec -}}
|
||||
{{- $key = index $s.data "tls.key" | b64dec -}}
|
||||
{{ else }}
|
||||
{{- $cert := genCA "Speedscale" 3650 -}}
|
||||
{{- $crt = $cert.Cert -}}
|
||||
{{- $key = $cert.Key -}}
|
||||
{{- end -}}
|
||||
---
|
||||
apiVersion: batch/v1
|
||||
kind: Job
|
||||
metadata:
|
||||
annotations:
|
||||
helm.sh/hook: pre-install
|
||||
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
|
||||
helm.sh/hook-weight: "5"
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
creationTimestamp: null
|
||||
name: speedscale-operator-create-jks
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
{{- if .Values.globalLabels }}
|
||||
{{ toYaml .Values.globalLabels | indent 4}}
|
||||
{{- end }}
|
||||
spec:
|
||||
backoffLimit: 0
|
||||
ttlSecondsAfterFinished: 30
|
||||
template:
|
||||
metadata:
|
||||
annotations:
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 8}}
|
||||
{{- end }}
|
||||
creationTimestamp: null
|
||||
labels:
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 8}}
|
||||
{{- end }}
|
||||
spec:
|
||||
containers:
|
||||
- args:
|
||||
- |-
|
||||
keytool -keystore /usr/lib/jvm/jre/lib/security/cacerts -importcert -noprompt -trustcacerts -storepass changeit -alias speedscale -file /etc/ssl/speedscale/tls.crt
|
||||
kubectl -n ${POD_NAMESPACE} delete secret speedscale-jks || true
|
||||
kubectl -n ${POD_NAMESPACE} create secret generic speedscale-jks --from-file=cacerts.jks=/usr/lib/jvm/jre/lib/security/cacerts
|
||||
|
||||
# in case we're in istio
|
||||
curl -X POST http://127.0.0.1:15000/quitquitquit || true
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
volumeMounts:
|
||||
- mountPath: /etc/ssl/speedscale
|
||||
name: speedscale-tls-out
|
||||
readOnly: true
|
||||
env:
|
||||
- name: POD_NAMESPACE
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
apiVersion: v1
|
||||
fieldPath: metadata.namespace
|
||||
envFrom:
|
||||
- secretRef:
|
||||
name: '{{ ne .Values.apiKeySecret "" | ternary .Values.apiKeySecret "speedscale-apikey" }}'
|
||||
optional: false
|
||||
image: '{{ .Values.image.registry }}/amazoncorretto'
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||
name: create-jks
|
||||
resources:
|
||||
limits:
|
||||
memory: "256M"
|
||||
cpu: "1"
|
||||
requests:
|
||||
memory: "128M"
|
||||
cpu: "200m"
|
||||
restartPolicy: Never
|
||||
serviceAccountName: speedscale-operator-provisioning
|
||||
volumes:
|
||||
- name: speedscale-tls-out
|
||||
secret:
|
||||
secretName: speedscale-certs
|
||||
{{- if .Values.affinity }}
|
||||
affinity: {{ toYaml .Values.affinity | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.tolerations }}
|
||||
tolerations: {{ toYaml .Values.tolerations | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.nodeSelector }}
|
||||
nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
|
||||
{{- end }}
|
||||
---
|
||||
apiVersion: v1
|
||||
automountServiceAccountToken: true
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
annotations:
|
||||
helm.sh/hook: pre-install
|
||||
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
|
||||
helm.sh/hook-weight: "1"
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
creationTimestamp: null
|
||||
labels:
|
||||
app: speedscale-operator
|
||||
controlplane.speedscale.com/component: operator
|
||||
name: speedscale-operator-provisioning
|
||||
namespace: {{ .Release.Namespace }}
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
annotations:
|
||||
helm.sh/hook: pre-install
|
||||
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
|
||||
helm.sh/hook-weight: "2"
|
||||
creationTimestamp: null
|
||||
name: speedscale-operator-provisioning
|
||||
rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- secrets
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- admissionregistration.k8s.io
|
||||
resources:
|
||||
- mutatingwebhookconfigurations
|
||||
- validatingwebhookconfigurations
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- deletecollection
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
annotations:
|
||||
helm.sh/hook: pre-install
|
||||
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
|
||||
helm.sh/hook-weight: "3"
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
creationTimestamp: null
|
||||
name: speedscale-operator-provisioning
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: speedscale-operator-provisioning
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: speedscale-operator-provisioning
|
||||
namespace: {{ .Release.Namespace }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
annotations:
|
||||
helm.sh/hook: pre-install
|
||||
helm.sh/hook-delete-policy: before-hook-creation
|
||||
{{- if .Values.globalAnnotations }}
|
||||
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||
{{- end }}
|
||||
creationTimestamp: null
|
||||
name: speedscale-certs
|
||||
namespace: {{ .Release.Namespace }}
|
||||
type: kubernetes.io/tls
|
||||
data:
|
||||
tls.crt: {{ $crt | b64enc }}
|
||||
tls.key: {{ $key | b64enc }}
|
|
@ -0,0 +1,138 @@
|
|||
# An API key is required to connect to the Speedscale cloud.
|
||||
# If you need a key email support@speedscale.com.
|
||||
apiKey: ""
|
||||
|
||||
# A secret name can be referenced instead of the api key itself.
|
||||
# The secret must be of the format:
|
||||
#
|
||||
# type: Opaque
|
||||
# data:
|
||||
# SPEEDSCALE_API_KEY: <key>
|
||||
# SPEEDSCALE_APP_URL: <appUrl>
|
||||
apiKeySecret: ""
|
||||
|
||||
# Speedscale domain to use.
|
||||
appUrl: "app.speedscale.com"
|
||||
|
||||
# The name of your cluster.
|
||||
clusterName: "my-cluster"
|
||||
|
||||
# Speedscale components image settings.
|
||||
image:
|
||||
registry: gcr.io/speedscale
|
||||
tag: v2.3.149
|
||||
pullPolicy: Always
|
||||
|
||||
# Log level for Speedscale components.
|
||||
logLevel: "info"
|
||||
|
||||
# Namespaces to be watched by Speedscale Operator as a list of names.
|
||||
namespaceSelector: []
|
||||
|
||||
# Instructs operator to deploy resources necessary to interact with your cluster from the Speedscale dashboard.
|
||||
dashboardAccess: true
|
||||
|
||||
# Filter Rule to apply to the Speedscale Forwarder
|
||||
filterRule: "standard"
|
||||
|
||||
# Data Loss Prevention settings.
|
||||
dlp:
|
||||
# Instructs operator to enable data loss prevention features
|
||||
enabled: false
|
||||
|
||||
# Configuration for data loss prevention
|
||||
config: "standard"
|
||||
|
||||
# If the operator pod/webhooks need to be on the host network.
|
||||
# This is only needed if the control plane cannot connect directly to a pod
|
||||
# for eg. if Calico is used as EKS's default networking
|
||||
# https://docs.tigera.io/calico/3.25/getting-started/kubernetes/managed-public-cloud/eks#install-eks-with-calico-networking
|
||||
hostNetwork: false
|
||||
|
||||
# A set of annotations to be applied to all Speedscale related deployments,
|
||||
# services, jobs, pods, etc.
|
||||
#
|
||||
# Example:
|
||||
# annotation.first: value
|
||||
# annotation.second: value
|
||||
globalAnnotations: {}
|
||||
|
||||
# A set of labels to be applied to all Speedscale related deployments,
|
||||
# services, jobs, pods, etc.
|
||||
#
|
||||
# Example:
|
||||
# label1: value
|
||||
# label2: value
|
||||
globalLabels: {}
|
||||
|
||||
# A full affinity object as detailed: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity
|
||||
affinity: {}
|
||||
|
||||
# The list of tolerations as detailed: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/
|
||||
tolerations: []
|
||||
|
||||
# A nodeselector object as detailed: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes/
|
||||
nodeSelector: {}
|
||||
|
||||
# Deploy a demo app at startup. Set this to an empty string to not deploy.
|
||||
# Valid values: ["java", ""]
|
||||
deployDemo: "java"
|
||||
|
||||
# Proxy connection settings if required by your network. These translate to standard proxy environment
|
||||
# variables HTTP_PROXY, HTTPS_PROXY, and NO_PROXY
|
||||
http_proxy: ""
|
||||
https_proxy: ""
|
||||
no_proxy: ""
|
||||
|
||||
# control if sidecar init containers should run with privileged set
|
||||
privilegedSidecars: false
|
||||
|
||||
# control if the sidecar should enable/disable use of the smart dns lookup feature (requires NET_ADMIN)
|
||||
disableSidecarSmartReverseDNS: false
|
||||
|
||||
# Operator settings. These limits are recommended unless you have a cluster
|
||||
# with a very large number of workloads (for eg. 10k+ deployments, replicasets, etc.).
|
||||
operator:
|
||||
resources:
|
||||
limits:
|
||||
cpu: 500m
|
||||
memory: 512Mi
|
||||
requests:
|
||||
cpu: 100m
|
||||
memory: 128Mi
|
||||
# how long to wait for the SUT to become ready
|
||||
test_prep_timeout: 10m
|
||||
# timeout for deploying & upgrading control plane components
|
||||
control_plane_timeout: 5m
|
||||
|
||||
|
||||
# Default sidecar settings. Example:
|
||||
# sidecar:
|
||||
# resources:
|
||||
# limits:
|
||||
# cpu: 500m
|
||||
# memory: 512Mi
|
||||
# ephemeral-storage: 100Mi
|
||||
# requests:
|
||||
# cpu: 10m
|
||||
# memory: 32Mi
|
||||
# ephemeral-storage: 100Mi
|
||||
# ignore_src_hosts: example.com, example.org
|
||||
# ignore_src_ips: 8.8.8.8, 1.1.1.1
|
||||
# ignore_dst_hosts: example.com, example.org
|
||||
# ignore_dst_ips: 8.8.8.8, 1.1.1.1
|
||||
# insert_init_first: false
|
||||
# tls_out: false
|
||||
# reinitialize_iptables: false
|
||||
sidecar: {}
|
||||
|
||||
# Forwarder settings
|
||||
# forwarder:
|
||||
# resources:
|
||||
# limits:
|
||||
# cpu: 500m
|
||||
# memory: 500M
|
||||
# requests:
|
||||
# cpu: 300m
|
||||
# memory: 250M
|
||||
forwarder: {}
|
61
index.yaml
61
index.yaml
|
@ -28497,11 +28497,37 @@ entries:
|
|||
catalog.cattle.io/kube-version: '>=1.16-0'
|
||||
catalog.cattle.io/release-name: nats
|
||||
apiVersion: v2
|
||||
appVersion: 2.10.25
|
||||
created: "2025-01-25T00:02:05.266034289Z"
|
||||
description: A Helm chart for the NATS.io High Speed Cloud Native Distributed
|
||||
Communications Technology.
|
||||
digest: eb4540a9c3074057c9d8253adcdb3b2dbf73387307c9777764ba4d3c44b7cc4e
|
||||
home: http://github.com/nats-io/k8s
|
||||
icon: file://assets/icons/nats.png
|
||||
keywords:
|
||||
- nats
|
||||
- messaging
|
||||
- cncf
|
||||
kubeVersion: '>=1.16-0'
|
||||
maintainers:
|
||||
- email: info@nats.io
|
||||
name: The NATS Authors
|
||||
url: https://github.com/nats-io
|
||||
name: nats
|
||||
urls:
|
||||
- assets/nats/nats-1.2.10.tgz
|
||||
version: 1.2.10
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: NATS Server
|
||||
catalog.cattle.io/kube-version: '>=1.16-0'
|
||||
catalog.cattle.io/release-name: nats
|
||||
apiVersion: v2
|
||||
appVersion: 2.10.24
|
||||
created: "2025-01-15T00:01:38.507163219Z"
|
||||
description: A Helm chart for the NATS.io High Speed Cloud Native Distributed
|
||||
Communications Technology.
|
||||
digest: d6a315ab17a2dd7bfa3b2f60e8f9031b3463fb7379d3f7750eec0596a1bf8e4d
|
||||
digest: 6c9d6e74f3b4f02fc727902a5b624586b3e909f08bdc9b11d076d22ea10b9d0f
|
||||
home: http://github.com/nats-io/k8s
|
||||
icon: file://assets/icons/nats.png
|
||||
keywords:
|
||||
|
@ -40746,6 +40772,37 @@ entries:
|
|||
- assets/redpanda/redpanda-4.0.33.tgz
|
||||
version: 4.0.33
|
||||
speedscale-operator:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Speedscale Operator
|
||||
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
||||
catalog.cattle.io/release-name: speedscale-operator
|
||||
apiVersion: v1
|
||||
appVersion: 2.3.149
|
||||
created: "2025-01-25T00:02:07.018624252Z"
|
||||
description: Stress test your APIs with real world scenarios. Collect and replay
|
||||
traffic without scripting.
|
||||
digest: 8daa193ab55b2319f332c1bbc5880e818f5cf076e4ee7fc5876f834d417a013f
|
||||
home: https://speedscale.com
|
||||
icon: file://assets/icons/speedscale-operator.png
|
||||
keywords:
|
||||
- speedscale
|
||||
- test
|
||||
- testing
|
||||
- regression
|
||||
- reliability
|
||||
- load
|
||||
- replay
|
||||
- network
|
||||
- traffic
|
||||
kubeVersion: '>= 1.17.0-0'
|
||||
maintainers:
|
||||
- email: support@speedscale.com
|
||||
name: Speedscale Support
|
||||
name: speedscale-operator
|
||||
urls:
|
||||
- assets/speedscale/speedscale-operator-2.3.149.tgz
|
||||
version: 2.3.149
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Speedscale Operator
|
||||
|
@ -48474,4 +48531,4 @@ entries:
|
|||
urls:
|
||||
- assets/netfoundry/ziti-host-1.5.1.tgz
|
||||
version: 1.5.1
|
||||
generated: "2025-01-24T00:01:40.139673015Z"
|
||||
generated: "2025-01-25T00:02:01.352221227Z"
|
||||
|
|
Loading…
Reference in New Issue