Added chart versions:
nats/nats: - 1.2.10 speedscale/speedscale-operator: - 2.3.149pull/1103/head
parent
464c28e908
commit
5be4a5bd61
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -0,0 +1,26 @@
|
||||||
|
# Patterns to ignore when building packages.
|
||||||
|
# This supports shell glob matching, relative path matching, and
|
||||||
|
# negation (prefixed with !). Only one pattern per line.
|
||||||
|
.DS_Store
|
||||||
|
# Common VCS dirs
|
||||||
|
.git/
|
||||||
|
.gitignore
|
||||||
|
.bzr/
|
||||||
|
.bzrignore
|
||||||
|
.hg/
|
||||||
|
.hgignore
|
||||||
|
.svn/
|
||||||
|
# Common backup files
|
||||||
|
*.swp
|
||||||
|
*.bak
|
||||||
|
*.tmp
|
||||||
|
*.orig
|
||||||
|
*~
|
||||||
|
# Various IDEs
|
||||||
|
.project
|
||||||
|
.idea/
|
||||||
|
*.tmproj
|
||||||
|
.vscode/
|
||||||
|
|
||||||
|
# template tests
|
||||||
|
/test
|
|
@ -0,0 +1,23 @@
|
||||||
|
annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: NATS Server
|
||||||
|
catalog.cattle.io/featured: "5"
|
||||||
|
catalog.cattle.io/kube-version: '>=1.16-0'
|
||||||
|
catalog.cattle.io/release-name: nats
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: 2.10.25
|
||||||
|
description: A Helm chart for the NATS.io High Speed Cloud Native Distributed Communications
|
||||||
|
Technology.
|
||||||
|
home: http://github.com/nats-io/k8s
|
||||||
|
icon: file://assets/icons/nats.png
|
||||||
|
keywords:
|
||||||
|
- nats
|
||||||
|
- messaging
|
||||||
|
- cncf
|
||||||
|
kubeVersion: '>=1.16-0'
|
||||||
|
maintainers:
|
||||||
|
- email: info@nats.io
|
||||||
|
name: The NATS Authors
|
||||||
|
url: https://github.com/nats-io
|
||||||
|
name: nats
|
||||||
|
version: 1.2.10
|
|
@ -0,0 +1,329 @@
|
||||||
|
# NATS Server
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
[NATS](https://nats.io) is a simple, secure and performant communications system for digital systems, services and devices.
|
||||||
|
NATS is part of the Cloud Native Computing Foundation ([CNCF](https://cncf.io)).
|
||||||
|
NATS has over [30 client language implementations](https://nats.io/download/), and its server can run on-premise, in the cloud, at the edge, and even on a Raspberry Pi.
|
||||||
|
NATS can secure and simplify design and operation of modern distributed systems.
|
||||||
|
|
||||||
|
```shell
|
||||||
|
helm repo add nats https://nats-io.github.io/k8s/helm/charts/
|
||||||
|
helm upgrade --install nats nats/nats
|
||||||
|
```
|
||||||
|
|
||||||
|
## Upgrade Nodes
|
||||||
|
|
||||||
|
- **Upgrading from 0.x**: The `values.yaml` schema changed significantly from 0.x to 1.x. Read [UPGRADING.md](UPGRADING.md) for instructions on upgrading a 0.x release to 1.x.
|
||||||
|
|
||||||
|
## Values
|
||||||
|
|
||||||
|
There are a handful of explicitly defined options which are documented with comments in the [values.yaml](values.yaml) file.
|
||||||
|
|
||||||
|
Everything in the NATS Config or Kubernetes Resources can be overridden by `merge` and `patch`, which is supported for the following values:
|
||||||
|
|
||||||
|
| key | type | enabled by default |
|
||||||
|
|----------------------------------|-----------------------------------------------------------------------------------------------------------------------------|-----------------------------------------|
|
||||||
|
| `config` | [NATS Config](https://docs.nats.io/running-a-nats-service/configuration) | yes |
|
||||||
|
| `config.cluster` | [NATS Cluster](https://docs.nats.io/running-a-nats-service/configuration/clustering/cluster_config) | no |
|
||||||
|
| `config.cluster.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||||
|
| `config.jetstream` | [NATS JetStream](https://docs.nats.io/running-a-nats-service/configuration#jetstream) | no |
|
||||||
|
| `config.jetstream.fileStore.pvc` | [k8s PVC](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#persistentvolumeclaim-v1-core) | yes, when `config.jetstream` is enabled |
|
||||||
|
| `config.nats.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||||
|
| `config.leafnodes` | [NATS LeafNodes](https://docs.nats.io/running-a-nats-service/configuration/leafnodes/leafnode_conf) | no |
|
||||||
|
| `config.leafnodes.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||||
|
| `config.websocket` | [NATS WebSocket](https://docs.nats.io/running-a-nats-service/configuration/websocket/websocket_conf) | no |
|
||||||
|
| `config.websocket.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||||
|
| `config.websocket.ingress` | [k8s Ingress](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#ingress-v1-networking-k8s-io) | no |
|
||||||
|
| `config.mqtt` | [NATS MQTT](https://docs.nats.io/running-a-nats-service/configuration/mqtt/mqtt_config) | no |
|
||||||
|
| `config.mqtt.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||||
|
| `config.gateway` | [NATS Gateway](https://docs.nats.io/running-a-nats-service/configuration/gateways/gateway#gateway-configuration-block) | no |
|
||||||
|
| `config.gateway.tls` | [NATS TLS](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls) | no |
|
||||||
|
| `config.resolver` | [NATS Resolver](https://docs.nats.io/running-a-nats-service/configuration/securing_nats/auth_intro/jwt/resolver) | no |
|
||||||
|
| `config.resolver.pvc` | [k8s PVC](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#persistentvolumeclaim-v1-core) | yes, when `config.resolver` is enabled |
|
||||||
|
| `container` | nats [k8s Container](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core) | yes |
|
||||||
|
| `reloader` | config reloader [k8s Container](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core) | yes |
|
||||||
|
| `promExporter` | prometheus exporter [k8s Container](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core) | no |
|
||||||
|
| `promExporter.podMonitor` | [prometheus PodMonitor](https://prometheus-operator.dev/docs/operator/api/#monitoring.coreos.com/v1.PodMonitor) | no |
|
||||||
|
| `service` | [k8s Service](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#service-v1-core) | yes |
|
||||||
|
| `statefulSet` | [k8s StatefulSet](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#statefulset-v1-apps) | yes |
|
||||||
|
| `podTemplate` | [k8s PodTemplate](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#pod-v1-core) | yes |
|
||||||
|
| `headlessService` | [k8s Service](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#service-v1-core) | yes |
|
||||||
|
| `configMap` | [k8s ConfigMap](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#configmap-v1-core) | yes |
|
||||||
|
| `natsBox.contexts.default` | [NATS Context](https://docs.nats.io/using-nats/nats-tools/nats_cli#nats-contexts) | yes |
|
||||||
|
| `natsBox.contexts.[name]` | [NATS Context](https://docs.nats.io/using-nats/nats-tools/nats_cli#nats-contexts) | no |
|
||||||
|
| `natsBox.container` | nats-box [k8s Container](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core) | yes |
|
||||||
|
| `natsBox.deployment` | [k8s Deployment](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#deployment-v1-apps) | yes |
|
||||||
|
| `natsBox.podTemplate` | [k8s PodTemplate](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#pod-v1-core) | yes |
|
||||||
|
| `natsBox.contextsSecret` | [k8s Secret](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#secret-v1-core) | yes |
|
||||||
|
| `natsBox.contentsSecret` | [k8s Secret](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#secret-v1-core) | yes |
|
||||||
|
|
||||||
|
### Merge
|
||||||
|
|
||||||
|
Merging is performed using the Helm `merge` function. Example - add NATS accounts and container resources:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
config:
|
||||||
|
merge:
|
||||||
|
accounts:
|
||||||
|
A:
|
||||||
|
users:
|
||||||
|
- {user: a, password: a}
|
||||||
|
B:
|
||||||
|
users:
|
||||||
|
- {user: b, password: b}
|
||||||
|
natsBox:
|
||||||
|
contexts:
|
||||||
|
a:
|
||||||
|
merge: {user: a, password: a}
|
||||||
|
b:
|
||||||
|
merge: {user: b, password: b}
|
||||||
|
defaultContextName: a
|
||||||
|
```
|
||||||
|
|
||||||
|
## Patch
|
||||||
|
|
||||||
|
Patching is performed using [JSON Patch](https://jsonpatch.com/). Example - add additional route to end of route list:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
config:
|
||||||
|
cluster:
|
||||||
|
enabled: true
|
||||||
|
patch:
|
||||||
|
- op: add
|
||||||
|
path: /routes/-
|
||||||
|
value: nats://demo.nats.io:6222
|
||||||
|
```
|
||||||
|
|
||||||
|
## Common Configurations
|
||||||
|
|
||||||
|
### JetStream Cluster on 3 separate hosts
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
config:
|
||||||
|
cluster:
|
||||||
|
enabled: true
|
||||||
|
replicas: 3
|
||||||
|
jetstream:
|
||||||
|
enabled: true
|
||||||
|
fileStore:
|
||||||
|
pvc:
|
||||||
|
size: 10Gi
|
||||||
|
|
||||||
|
podTemplate:
|
||||||
|
topologySpreadConstraints:
|
||||||
|
kubernetes.io/hostname:
|
||||||
|
maxSkew: 1
|
||||||
|
whenUnsatisfiable: DoNotSchedule
|
||||||
|
```
|
||||||
|
|
||||||
|
### NATS Container Resources
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
container:
|
||||||
|
env:
|
||||||
|
# different from k8s units, suffix must be B, KiB, MiB, GiB, or TiB
|
||||||
|
# should be ~90% of memory limit
|
||||||
|
GOMEMLIMIT: 7GiB
|
||||||
|
merge:
|
||||||
|
# recommended limit is at least 2 CPU cores and 8Gi Memory for production JetStream clusters
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: "2"
|
||||||
|
memory: 8Gi
|
||||||
|
limits:
|
||||||
|
cpu: "2"
|
||||||
|
memory: 8Gi
|
||||||
|
```
|
||||||
|
|
||||||
|
### Specify Image Version
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
container:
|
||||||
|
image:
|
||||||
|
tag: x.y.z-alpine
|
||||||
|
```
|
||||||
|
|
||||||
|
### Operator Mode with NATS Resolver
|
||||||
|
|
||||||
|
Run `nsc generate config --nats-resolver` and replace the `OPERATOR_JWT`, `SYS_ACCOUNT_ID`, and `SYS_ACCOUNT_JWT` with your values.
|
||||||
|
Make sure that you do not include the trailing `,` in the `SYS_ACCOUNT_JWT`.
|
||||||
|
|
||||||
|
```
|
||||||
|
config:
|
||||||
|
resolver:
|
||||||
|
enabled: true
|
||||||
|
merge:
|
||||||
|
type: full
|
||||||
|
interval: 2m
|
||||||
|
timeout: 1.9s
|
||||||
|
merge:
|
||||||
|
operator: OPERATOR_JWT
|
||||||
|
system_account: SYS_ACCOUNT_ID
|
||||||
|
resolver_preload:
|
||||||
|
SYS_ACCOUNT_ID: SYS_ACCOUNT_JWT
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
## Accessing NATS
|
||||||
|
|
||||||
|
The chart contains 2 services by default, `service` and `headlessService`.
|
||||||
|
|
||||||
|
### `service`
|
||||||
|
|
||||||
|
The `service` is intended to be accessed by NATS Clients. It is a `ClusterIP` service by default, however it can easily be changed to a different service type.
|
||||||
|
|
||||||
|
The `nats`, `websocket`, `leafnodes`, and `mqtt` ports will be exposed through this service by default if they are enabled.
|
||||||
|
|
||||||
|
Example: change this service type to a `LoadBalancer`:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
service:
|
||||||
|
merge:
|
||||||
|
spec:
|
||||||
|
type: LoadBalancer
|
||||||
|
```
|
||||||
|
|
||||||
|
### `headlessService`
|
||||||
|
|
||||||
|
The `headlessService` is used for NATS Servers in the Stateful Set to discover one another. It is primarily intended to be used for Cluster Route connections.
|
||||||
|
|
||||||
|
### TLS Considerations
|
||||||
|
|
||||||
|
The TLS Certificate used for Client Connections should have a SAN covering DNS Name that clients access the `service` at.
|
||||||
|
|
||||||
|
The TLS Certificate used for Cluster Route Connections should have a SAN covering the DNS Name that routes access each other on the `headlessService` at. This is `*.<headless-service-name>` by default.
|
||||||
|
|
||||||
|
## Advanced Features
|
||||||
|
|
||||||
|
### Templating Values
|
||||||
|
|
||||||
|
Anything in `values.yaml` can be templated:
|
||||||
|
|
||||||
|
- maps matching the following syntax will be templated and parsed as YAML:
|
||||||
|
```yaml
|
||||||
|
$tplYaml: |
|
||||||
|
yaml template
|
||||||
|
```
|
||||||
|
- maps matching the follow syntax will be templated, parsed as YAML, and spread into the parent map/slice
|
||||||
|
```yaml
|
||||||
|
$tplYamlSpread: |
|
||||||
|
yaml template
|
||||||
|
```
|
||||||
|
|
||||||
|
Example - change service name:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
service:
|
||||||
|
name:
|
||||||
|
$tplYaml: >-
|
||||||
|
{{ include "nats.fullname" . }}-svc
|
||||||
|
```
|
||||||
|
|
||||||
|
### NATS Config Units and Variables
|
||||||
|
|
||||||
|
NATS configuration extends JSON, and can represent Units and Variables. They must be wrapped in `<< >>` in order to template correctly. Example:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
config:
|
||||||
|
merge:
|
||||||
|
authorization:
|
||||||
|
# variable
|
||||||
|
token: << $TOKEN >>
|
||||||
|
# units
|
||||||
|
max_payload: << 2MB >>
|
||||||
|
```
|
||||||
|
|
||||||
|
templates to the `nats.conf`:
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
"authorization": {
|
||||||
|
"token": $TOKEN
|
||||||
|
},
|
||||||
|
"max_payload": 2MB,
|
||||||
|
"port": 4222,
|
||||||
|
...
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### NATS Config Includes
|
||||||
|
|
||||||
|
Any NATS Config key ending in `$include` will be replaced with an include directive. Included files should be in paths relative to `/etc/nats-config`. Multiple `$include` keys are supported by using a prefix, and will be sorted alphabetically. Example:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
config:
|
||||||
|
merge:
|
||||||
|
00$include: auth.conf
|
||||||
|
01$include: params.conf
|
||||||
|
configMap:
|
||||||
|
merge:
|
||||||
|
data:
|
||||||
|
auth.conf: |
|
||||||
|
accounts: {
|
||||||
|
A: {
|
||||||
|
users: [
|
||||||
|
{user: a, password: a}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
B: {
|
||||||
|
users: [
|
||||||
|
{user: b, password: b}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
}
|
||||||
|
params.conf: |
|
||||||
|
max_payload: 2MB
|
||||||
|
```
|
||||||
|
|
||||||
|
templates to the `nats.conf`:
|
||||||
|
|
||||||
|
```
|
||||||
|
include auth.conf;
|
||||||
|
"port": 4222,
|
||||||
|
...
|
||||||
|
include params.conf;
|
||||||
|
```
|
||||||
|
|
||||||
|
### Extra Resources
|
||||||
|
|
||||||
|
Enables adding additional arbitrary resources. Example - expose WebSocket via VirtualService in Istio:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
config:
|
||||||
|
websocket:
|
||||||
|
enabled: true
|
||||||
|
extraResources:
|
||||||
|
- apiVersion: networking.istio.io/v1beta1
|
||||||
|
kind: VirtualService
|
||||||
|
metadata:
|
||||||
|
namespace:
|
||||||
|
$tplYamlSpread: >
|
||||||
|
{{ include "nats.metadataNamespace" $ }}
|
||||||
|
name:
|
||||||
|
$tplYaml: >
|
||||||
|
{{ include "nats.fullname" $ | quote }}
|
||||||
|
labels:
|
||||||
|
$tplYaml: |
|
||||||
|
{{ include "nats.labels" $ }}
|
||||||
|
spec:
|
||||||
|
hosts:
|
||||||
|
- demo.nats.io
|
||||||
|
gateways:
|
||||||
|
- my-gateway
|
||||||
|
http:
|
||||||
|
- name: default
|
||||||
|
match:
|
||||||
|
- name: root
|
||||||
|
uri:
|
||||||
|
exact: /
|
||||||
|
route:
|
||||||
|
- destination:
|
||||||
|
host:
|
||||||
|
$tplYaml: >
|
||||||
|
{{ .Values.service.name | quote }}
|
||||||
|
port:
|
||||||
|
number:
|
||||||
|
$tplYaml: >
|
||||||
|
{{ .Values.config.websocket.port }}
|
||||||
|
```
|
|
@ -0,0 +1,155 @@
|
||||||
|
# Upgrading from 0.x to 1.x
|
||||||
|
|
||||||
|
Instructions for upgrading an existing `nats` 0.x release to 1.x.
|
||||||
|
|
||||||
|
## Rename Immutable Fields
|
||||||
|
|
||||||
|
There are a number of immutable fields in the NATS Stateful Set and NATS Box deployment. All 1.x `values.yaml` files targeting an existing 0.x release will require some or all of these settings:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
config:
|
||||||
|
# required if using JetStream file storage
|
||||||
|
jetstream:
|
||||||
|
# uncomment the next line if using JetStream file storage
|
||||||
|
# enabled: true
|
||||||
|
fileStore:
|
||||||
|
pvc:
|
||||||
|
name:
|
||||||
|
$tplYaml: >-
|
||||||
|
{{ include "nats.fullname" . }}-js-pvc
|
||||||
|
# set other PVC options here to make it match 0.x, refer to values.yaml for schema
|
||||||
|
|
||||||
|
# required if using a full or cache resolver
|
||||||
|
resolver:
|
||||||
|
# uncomment the next line if using a full or cache resolver
|
||||||
|
# enabled: true
|
||||||
|
pvc:
|
||||||
|
name: nats-jwt-pvc
|
||||||
|
# set other PVC options here to make it match 0.x, refer to values.yaml for schema
|
||||||
|
|
||||||
|
# required
|
||||||
|
statefulSet:
|
||||||
|
patch:
|
||||||
|
- op: remove
|
||||||
|
path: /spec/selector/matchLabels/app.kubernetes.io~1component
|
||||||
|
- $tplYamlSpread: |-
|
||||||
|
{{- if and
|
||||||
|
.Values.config.jetstream.enabled
|
||||||
|
.Values.config.jetstream.fileStore.enabled
|
||||||
|
.Values.config.jetstream.fileStore.pvc.enabled
|
||||||
|
.Values.config.resolver.enabled
|
||||||
|
.Values.config.resolver.pvc.enabled
|
||||||
|
}}
|
||||||
|
- op: move
|
||||||
|
from: /spec/volumeClaimTemplates/0
|
||||||
|
path: /spec/volumeClaimTemplates/1
|
||||||
|
{{- else}}
|
||||||
|
[]
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
# required
|
||||||
|
headlessService:
|
||||||
|
name:
|
||||||
|
$tplYaml: >-
|
||||||
|
{{ include "nats.fullname" . }}
|
||||||
|
|
||||||
|
# required unless 0.x values explicitly set nats.serviceAccount.create=false
|
||||||
|
serviceAccount:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
# required to use new ClusterIP service for Clients accessing NATS
|
||||||
|
# if using TLS, this may require adding another SAN
|
||||||
|
service:
|
||||||
|
# uncomment the next line to disable the new ClusterIP service
|
||||||
|
# enabled: false
|
||||||
|
name:
|
||||||
|
$tplYaml: >-
|
||||||
|
{{ include "nats.fullname" . }}-svc
|
||||||
|
|
||||||
|
# required if using NatsBox
|
||||||
|
natsBox:
|
||||||
|
deployment:
|
||||||
|
patch:
|
||||||
|
- op: replace
|
||||||
|
path: /spec/selector/matchLabels
|
||||||
|
value:
|
||||||
|
app: nats-box
|
||||||
|
- op: add
|
||||||
|
path: /spec/template/metadata/labels/app
|
||||||
|
value: nats-box
|
||||||
|
```
|
||||||
|
|
||||||
|
## Update NATS Config to new values.yaml schema
|
||||||
|
|
||||||
|
Most values that control the NATS Config have changed and moved under the `config` key. Refer to the 1.x Chart's [values.yaml](values.yaml) for the complete schema.
|
||||||
|
|
||||||
|
After migrating to the new values schema, ensure that changes you expect in the NATS Config files match by templating the old and new config files.
|
||||||
|
|
||||||
|
Template your old 0.x Config Map, this example uses a file called `values-old.yaml`:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
helm template \
|
||||||
|
--version "0.x" \
|
||||||
|
-f values-old.yaml \
|
||||||
|
-s templates/configmap.yaml \
|
||||||
|
nats \
|
||||||
|
nats/nats
|
||||||
|
```
|
||||||
|
|
||||||
|
Template your new 1.x Config Map, this example uses a file called `values.yaml`:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
helm template \
|
||||||
|
--version "^1-beta" \
|
||||||
|
-f values.yaml \
|
||||||
|
-s templates/config-map.yaml \
|
||||||
|
nats \
|
||||||
|
nats/nats
|
||||||
|
```
|
||||||
|
|
||||||
|
## Update Kubernetes Resources to new values.yaml schema
|
||||||
|
|
||||||
|
Most values that control Kubernetes Resources have been changed. Refer to the 1.x Chart's [values.yaml](values.yaml) for the complete schema.
|
||||||
|
|
||||||
|
After migrating to the new values schema, ensure that changes you expect in resources match by templating the old and new resources.
|
||||||
|
|
||||||
|
| Resource | 0.x Template File | 1.x Template File |
|
||||||
|
|-------------------------|---------------------------------|-------------------------------------------|
|
||||||
|
| Config Map | `templates/configmap.yaml` | `templates/config-map.yaml` |
|
||||||
|
| Stateful Set | `templates/statefulset.yaml` | `templates/stateful-set.yaml` |
|
||||||
|
| Headless Service | `templates/service.yaml` | `templates/headless-service.yaml` |
|
||||||
|
| ClusterIP Service | N/A | `templates/service.yaml` |
|
||||||
|
| Network Policy | `templates/networkpolicy.yaml` | N/A |
|
||||||
|
| Pod Disruption Budget | `templates/pdb.yaml` | `templates/pod-disruption-budget.yaml` |
|
||||||
|
| Service Account | `templates/rbac.yaml` | `templates/service-account.yaml` |
|
||||||
|
| Resource | `templates/` | `templates/` |
|
||||||
|
| Resource | `templates/` | `templates/` |
|
||||||
|
| Prometheus Monitor | `templates/serviceMonitor.yaml` | `templates/pod-monitor.yaml` |
|
||||||
|
| NatsBox Deployment | `templates/nats-box.yaml` | `templates/nats-box/deployment.yaml` |
|
||||||
|
| NatsBox Service Account | N/A | `templates/nats-box/service-account.yaml` |
|
||||||
|
| NatsBox Contents Secret | N/A | `templates/nats-box/contents-secret.yaml` |
|
||||||
|
| NatsBox Contexts Secret | N/A | `templates/nats-box/contexts-secret.yaml` |
|
||||||
|
|
||||||
|
For example, to check that the Stateful Set matches:
|
||||||
|
|
||||||
|
Template your old 0.x Stateful Set, this example uses a file called `values-old.yaml`:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
helm template \
|
||||||
|
--version "0.x" \
|
||||||
|
-f values-old.yaml \
|
||||||
|
-s templates/statefulset.yaml \
|
||||||
|
nats \
|
||||||
|
nats/nats
|
||||||
|
```
|
||||||
|
|
||||||
|
Template your new 1.x Stateful Set, this example uses a file called `values.yaml`:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
helm template \
|
||||||
|
--version "^1-beta" \
|
||||||
|
-f values.yaml \
|
||||||
|
-s templates/stateful-set.yaml \
|
||||||
|
nats \
|
||||||
|
nats/nats
|
||||||
|
```
|
|
@ -0,0 +1,3 @@
|
||||||
|
# NATS Server
|
||||||
|
|
||||||
|
[NATS](https://nats.io) is a simple, secure and performant communications system for digital systems, services and devices. NATS is part of the Cloud Native Computing Foundation ([CNCF](https://cncf.io)). NATS has over [30 client language implementations](https://nats.io/download/), and its server can run on-premise, in the cloud, at the edge, and even on a Raspberry Pi. NATS can secure and simplify design and operation of modern distributed systems.
|
|
@ -0,0 +1,10 @@
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.configMap.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "nats.labels" $ | nindent 4 }}
|
||||||
|
data:
|
||||||
|
nats.conf: |
|
||||||
|
{{- include "nats.formatConfig" .config | nindent 4 }}
|
|
@ -0,0 +1,32 @@
|
||||||
|
{{- with .Values.config.cluster }}
|
||||||
|
name: {{ $.Values.statefulSet.name }}
|
||||||
|
port: {{ .port }}
|
||||||
|
no_advertise: true
|
||||||
|
routes:
|
||||||
|
{{- $proto := ternary "tls" "nats" .tls.enabled }}
|
||||||
|
{{- $auth := "" }}
|
||||||
|
{{- if and .routeURLs.user .routeURLs.password }}
|
||||||
|
{{- $auth = printf "%s:%s@" (urlquery .routeURLs.user) (urlquery .routeURLs.password) -}}
|
||||||
|
{{- end }}
|
||||||
|
{{- $domain := $.Values.headlessService.name }}
|
||||||
|
{{- if .routeURLs.useFQDN }}
|
||||||
|
{{- $domain = printf "%s.%s.svc.%s" $domain (include "nats.namespace" $) .routeURLs.k8sClusterDomain }}
|
||||||
|
{{- end }}
|
||||||
|
{{- $port := (int .port) }}
|
||||||
|
{{- range $i, $_ := until (int .replicas) }}
|
||||||
|
- {{ printf "%s://%s%s-%d.%s:%d" $proto $auth $.Values.statefulSet.name $i $domain $port }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- if and .routeURLs.user .routeURLs.password }}
|
||||||
|
authorization:
|
||||||
|
user: {{ .routeURLs.user | quote }}
|
||||||
|
password: {{ .routeURLs.password | quote }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- with .tls }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
tls:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,114 @@
|
||||||
|
{{- with .Values.config }}
|
||||||
|
|
||||||
|
server_name: << $SERVER_NAME >>
|
||||||
|
lame_duck_grace_period: 10s
|
||||||
|
lame_duck_duration: 30s
|
||||||
|
pid_file: /var/run/nats/nats.pid
|
||||||
|
|
||||||
|
########################################
|
||||||
|
# NATS
|
||||||
|
########################################
|
||||||
|
{{- with .nats }}
|
||||||
|
port: {{ .port }}
|
||||||
|
|
||||||
|
{{- with .tls }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
tls:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
########################################
|
||||||
|
# leafnodes
|
||||||
|
########################################
|
||||||
|
{{- with .leafnodes }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
leafnodes:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/leafnodes.yaml" "ctx" $) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
########################################
|
||||||
|
# websocket
|
||||||
|
########################################
|
||||||
|
{{- with .websocket }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
websocket:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/websocket.yaml" "ctx" $) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
########################################
|
||||||
|
# MQTT
|
||||||
|
########################################
|
||||||
|
{{- with .mqtt }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
mqtt:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/mqtt.yaml" "ctx" $) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
########################################
|
||||||
|
# cluster
|
||||||
|
########################################
|
||||||
|
{{- with .cluster }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
cluster:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/cluster.yaml" "ctx" $) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
########################################
|
||||||
|
# gateway
|
||||||
|
########################################
|
||||||
|
{{- with .gateway }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
gateway:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/gateway.yaml" "ctx" $) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
########################################
|
||||||
|
# monitor
|
||||||
|
########################################
|
||||||
|
{{- with .monitor }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
{{- if .tls.enabled }}
|
||||||
|
https_port: {{ .port }}
|
||||||
|
{{- else }}
|
||||||
|
http_port: {{ .port }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
########################################
|
||||||
|
# profiling
|
||||||
|
########################################
|
||||||
|
{{- with .profiling }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
prof_port: {{ .port }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
########################################
|
||||||
|
# jetstream
|
||||||
|
########################################
|
||||||
|
{{- with $.Values.config.jetstream -}}
|
||||||
|
{{- if .enabled }}
|
||||||
|
jetstream:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/jetstream.yaml" "ctx" $) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
########################################
|
||||||
|
# resolver
|
||||||
|
########################################
|
||||||
|
{{- with $.Values.config.resolver -}}
|
||||||
|
{{- if .enabled }}
|
||||||
|
resolver:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/resolver.yaml" "ctx" $) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,11 @@
|
||||||
|
{{- with .Values.config.gateway }}
|
||||||
|
name: {{ $.Values.statefulSet.name }}
|
||||||
|
port: {{ .port }}
|
||||||
|
|
||||||
|
{{- with .tls }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
tls:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,23 @@
|
||||||
|
{{- with .Values.config.jetstream }}
|
||||||
|
{{- with .memoryStore }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
{{- with .maxSize }}
|
||||||
|
max_memory_store: << {{ . }} >>
|
||||||
|
{{- end }}
|
||||||
|
{{- else }}
|
||||||
|
max_memory_store: 0
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with .fileStore }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
store_dir: {{ .dir }}
|
||||||
|
{{- if .maxSize }}
|
||||||
|
max_file_store: << {{ .maxSize }} >>
|
||||||
|
{{- else if .pvc.enabled }}
|
||||||
|
max_file_store: << {{ .pvc.size }} >>
|
||||||
|
{{- end }}
|
||||||
|
{{- else }}
|
||||||
|
max_file_store: 0
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,11 @@
|
||||||
|
{{- with .Values.config.leafnodes }}
|
||||||
|
port: {{ .port }}
|
||||||
|
no_advertise: true
|
||||||
|
|
||||||
|
{{- with .tls }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
tls:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,10 @@
|
||||||
|
{{- with .Values.config.mqtt }}
|
||||||
|
port: {{ .port }}
|
||||||
|
|
||||||
|
{{- with .tls }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
tls:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,10 @@
|
||||||
|
{{- with .protocol }}
|
||||||
|
port: {{ .port }}
|
||||||
|
|
||||||
|
{{- with .tls }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
tls:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,3 @@
|
||||||
|
{{- with .Values.config.resolver }}
|
||||||
|
dir: {{ .dir }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,16 @@
|
||||||
|
# tls
|
||||||
|
{{- with .tls }}
|
||||||
|
{{- if .secretName }}
|
||||||
|
{{- $dir := trimSuffix "/" .dir }}
|
||||||
|
cert_file: {{ printf "%s/%s" $dir (.cert | default "tls.crt") | quote }}
|
||||||
|
key_file: {{ printf "%s/%s" $dir (.key | default "tls.key") | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
# tlsCA
|
||||||
|
{{- with $.Values.tlsCA }}
|
||||||
|
{{- if and .enabled (or .configMapName .secretName) }}
|
||||||
|
{{- $dir := trimSuffix "/" .dir }}
|
||||||
|
ca_file: {{ printf "%s/%s" $dir (.key | default "ca.crt") | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,12 @@
|
||||||
|
{{- with .Values.config.websocket }}
|
||||||
|
port: {{ .port }}
|
||||||
|
|
||||||
|
{{- if .tls.enabled }}
|
||||||
|
{{- with .tls }}
|
||||||
|
tls:
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config/tls.yaml" "ctx" (merge (dict "tls" .) $)) .) | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- else }}
|
||||||
|
no_tls: true
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,24 @@
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.headlessService.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "nats.labels" $ | nindent 4 }}
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
{{- include "nats.selectorLabels" $ | nindent 4 }}
|
||||||
|
clusterIP: None
|
||||||
|
publishNotReadyAddresses: true
|
||||||
|
ports:
|
||||||
|
{{- range $protocol := list "nats" "leafnodes" "websocket" "mqtt" "cluster" "gateway" "monitor" "profiling" }}
|
||||||
|
{{- $configProtocol := get $.Values.config $protocol }}
|
||||||
|
{{- if or (eq $protocol "nats") $configProtocol.enabled }}
|
||||||
|
{{- $tlsEnabled := false }}
|
||||||
|
{{- if hasKey $configProtocol "tls" }}
|
||||||
|
{{- $tlsEnabled = $configProtocol.tls.enabled }}
|
||||||
|
{{- end }}
|
||||||
|
{{- $appProtocol := or (eq $protocol "websocket") (eq $protocol "monitor") | ternary ($tlsEnabled | ternary "https" "http") ($tlsEnabled | ternary "tls" "tcp") }}
|
||||||
|
- {{ dict "name" $protocol "port" $configProtocol.port "targetPort" $protocol "appProtocol" $appProtocol | toYaml | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,34 @@
|
||||||
|
{{- with .Values.config.websocket.ingress }}
|
||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .name }}
|
||||||
|
labels:
|
||||||
|
{{- include "nats.labels" $ | nindent 4 }}
|
||||||
|
spec:
|
||||||
|
{{- with .className }}
|
||||||
|
ingressClassName: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
rules:
|
||||||
|
{{- $path := .path }}
|
||||||
|
{{- $pathType := .pathType }}
|
||||||
|
{{- range .hosts }}
|
||||||
|
- host: {{ . | quote }}
|
||||||
|
http:
|
||||||
|
paths:
|
||||||
|
- path: {{ $path | quote }}
|
||||||
|
pathType: {{ $pathType | quote }}
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: {{ $.Values.service.name }}
|
||||||
|
port:
|
||||||
|
name: websocket
|
||||||
|
{{- end }}
|
||||||
|
{{- if .tlsSecretName }}
|
||||||
|
tls:
|
||||||
|
- secretName: {{ .tlsSecretName | quote }}
|
||||||
|
hosts:
|
||||||
|
{{- toYaml .hosts | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,17 @@
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.natsBox.contentsSecret.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "natsBox.labels" $ | nindent 4 }}
|
||||||
|
type: Opaque
|
||||||
|
stringData:
|
||||||
|
{{- range $ctxKey, $ctxVal := .Values.natsBox.contexts }}
|
||||||
|
{{- range $secretKey, $secretVal := dict "creds" "creds" "nkey" "nk" }}
|
||||||
|
{{- $secret := get $ctxVal $secretKey }}
|
||||||
|
{{- if and $secret $secret.contents }}
|
||||||
|
"{{ $ctxKey }}.{{ $secretVal }}": {{ $secret.contents | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,51 @@
|
||||||
|
{{- $contextName := .contextName }}
|
||||||
|
|
||||||
|
# url
|
||||||
|
{{- if .Values.service.enabled }}
|
||||||
|
url: nats://{{ .Values.service.name }}
|
||||||
|
{{- else }}
|
||||||
|
url: nats://{{ .Values.headlessService.name }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- with .context }}
|
||||||
|
|
||||||
|
# creds
|
||||||
|
{{- with .creds}}
|
||||||
|
{{- if .contents }}
|
||||||
|
creds: /etc/nats-contents/{{ $contextName }}.creds
|
||||||
|
{{- else if .secretName }}
|
||||||
|
{{- $dir := trimSuffix "/" .dir }}
|
||||||
|
creds: {{ printf "%s/%s" $dir (.key | default "nats.creds") | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
# nkey
|
||||||
|
{{- with .nkey}}
|
||||||
|
{{- if .contents }}
|
||||||
|
nkey: /etc/nats-contents/{{ $contextName }}.nk
|
||||||
|
{{- else if .secretName }}
|
||||||
|
{{- $dir := trimSuffix "/" .dir }}
|
||||||
|
nkey: {{ printf "%s/%s" $dir (.key | default "nats.nk") | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
# tls
|
||||||
|
{{- with .tls }}
|
||||||
|
{{- if .secretName }}
|
||||||
|
{{- $dir := trimSuffix "/" .dir }}
|
||||||
|
cert: {{ printf "%s/%s" $dir (.cert | default "tls.crt") | quote }}
|
||||||
|
key: {{ printf "%s/%s" $dir (.key | default "tls.key") | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
# tlsCA
|
||||||
|
{{- if $.Values.config.nats.tls.enabled }}
|
||||||
|
{{- with $.Values.tlsCA }}
|
||||||
|
{{- if and .enabled (or .configMapName .secretName) }}
|
||||||
|
{{- $dir := trimSuffix "/" .dir }}
|
||||||
|
ca: {{ printf "%s/%s" $dir (.key | default "ca.crt") | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,13 @@
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.natsBox.contextsSecret.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "natsBox.labels" $ | nindent 4 }}
|
||||||
|
type: Opaque
|
||||||
|
stringData:
|
||||||
|
{{- range $ctxKey, $ctxVal := .Values.natsBox.contexts }}
|
||||||
|
"{{ $ctxKey }}.json": |
|
||||||
|
{{- include "toPrettyRawJson" (include "nats.loadMergePatch" (dict "file" "nats-box/contexts-secret/context.yaml" "merge" (.merge | default dict) "patch" (.patch | default list) "ctx" (merge (dict "contextName" $ctxKey "context" $ctxVal) $)) | fromYaml) | nindent 4 }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,46 @@
|
||||||
|
name: nats-box
|
||||||
|
{{ include "nats.image" (merge (pick $.Values "global") .Values.natsBox.container.image) }}
|
||||||
|
|
||||||
|
{{- with .Values.natsBox.container.env }}
|
||||||
|
env:
|
||||||
|
{{- include "nats.env" . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
work_dir="$(pwd)"
|
||||||
|
mkdir -p "$XDG_CONFIG_HOME/nats"
|
||||||
|
cd "$XDG_CONFIG_HOME/nats"
|
||||||
|
if ! [ -s context ]; then
|
||||||
|
ln -s /etc/nats-contexts context
|
||||||
|
fi
|
||||||
|
{{- if .Values.natsBox.defaultContextName }}
|
||||||
|
if ! [ -f context.txt ]; then
|
||||||
|
echo -n {{ .Values.natsBox.defaultContextName | quote }} > context.txt
|
||||||
|
fi
|
||||||
|
{{- end }}
|
||||||
|
cd "$work_dir"
|
||||||
|
exec /entrypoint.sh "$@"
|
||||||
|
- --
|
||||||
|
args:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- trap true INT TERM; sleep infinity & wait
|
||||||
|
volumeMounts:
|
||||||
|
# contexts secret
|
||||||
|
- name: contexts
|
||||||
|
mountPath: /etc/nats-contexts
|
||||||
|
# contents secret
|
||||||
|
{{- if .hasContentsSecret }}
|
||||||
|
- name: contents
|
||||||
|
mountPath: /etc/nats-contents
|
||||||
|
{{- end }}
|
||||||
|
# tlsCA
|
||||||
|
{{- include "nats.tlsCAVolumeMount" $ }}
|
||||||
|
# secrets
|
||||||
|
{{- range (include "natsBox.secretNames" $ | fromJson).secretNames }}
|
||||||
|
- name: {{ .name | quote }}
|
||||||
|
mountPath: {{ .dir | quote }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,16 @@
|
||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.natsBox.deployment.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "natsBox.labels" $ | nindent 4 }}
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
{{- include "natsBox.selectorLabels" $ | nindent 6 }}
|
||||||
|
replicas: 1
|
||||||
|
template:
|
||||||
|
{{- with .Values.natsBox.podTemplate }}
|
||||||
|
{{ include "nats.loadMergePatch" (merge (dict "file" "nats-box/deployment/pod-template.yaml" "ctx" $) .) | nindent 4 }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,44 @@
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
{{- include "natsBox.labels" $ | nindent 4 }}
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
{{- with .Values.natsBox.container }}
|
||||||
|
- {{ include "nats.loadMergePatch" (merge (dict "file" "nats-box/deployment/container.yaml" "ctx" $) .) | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
# service discovery uses DNS; don't need service env vars
|
||||||
|
enableServiceLinks: false
|
||||||
|
|
||||||
|
{{- with .Values.global.image.pullSecretNames }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{- range . }}
|
||||||
|
- name: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- with .Values.natsBox.serviceAccount }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
serviceAccountName: {{ .name | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
# contexts secret
|
||||||
|
- name: contexts
|
||||||
|
secret:
|
||||||
|
secretName: {{ .Values.natsBox.contextsSecret.name }}
|
||||||
|
# contents secret
|
||||||
|
{{- if .hasContentsSecret }}
|
||||||
|
- name: contents
|
||||||
|
secret:
|
||||||
|
secretName: {{ .Values.natsBox.contentsSecret.name }}
|
||||||
|
{{- end }}
|
||||||
|
# tlsCA
|
||||||
|
{{- include "nats.tlsCAVolume" $ | nindent 2 }}
|
||||||
|
# secrets
|
||||||
|
{{- range (include "natsBox.secretNames" $ | fromJson).secretNames }}
|
||||||
|
- name: {{ .name | quote }}
|
||||||
|
secret:
|
||||||
|
secretName: {{ .secretName | quote }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,7 @@
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ServiceAccount
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.natsBox.serviceAccount.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "natsBox.labels" $ | nindent 4 }}
|
|
@ -0,0 +1,12 @@
|
||||||
|
apiVersion: policy/v1
|
||||||
|
kind: PodDisruptionBudget
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.podDisruptionBudget.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "nats.labels" $ | nindent 4 }}
|
||||||
|
spec:
|
||||||
|
maxUnavailable: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
{{- include "nats.selectorLabels" $ | nindent 6 }}
|
|
@ -0,0 +1,13 @@
|
||||||
|
apiVersion: monitoring.coreos.com/v1
|
||||||
|
kind: PodMonitor
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.promExporter.podMonitor.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "nats.labels" $ | nindent 4 }}
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
{{- include "nats.selectorLabels" $ | nindent 6 }}
|
||||||
|
podMetricsEndpoints:
|
||||||
|
- port: prom-metrics
|
|
@ -0,0 +1,7 @@
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ServiceAccount
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.serviceAccount.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "nats.labels" $ | nindent 4 }}
|
|
@ -0,0 +1,23 @@
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.service.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "nats.labels" $ | nindent 4 }}
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
{{- include "nats.selectorLabels" $ | nindent 4 }}
|
||||||
|
ports:
|
||||||
|
{{- range $protocol := list "nats" "leafnodes" "websocket" "mqtt" "cluster" "gateway" "monitor" "profiling" }}
|
||||||
|
{{- $configProtocol := get $.Values.config $protocol }}
|
||||||
|
{{- $servicePort := get $.Values.service.ports $protocol }}
|
||||||
|
{{- if and (or (eq $protocol "nats") $configProtocol.enabled) $servicePort.enabled }}
|
||||||
|
{{- $tlsEnabled := false }}
|
||||||
|
{{- if hasKey $configProtocol "tls" }}
|
||||||
|
{{- $tlsEnabled = $configProtocol.tls.enabled }}
|
||||||
|
{{- end }}
|
||||||
|
{{- $appProtocol := or (eq $protocol "websocket") (eq $protocol "monitor") | ternary ($tlsEnabled | ternary "https" "http") ($tlsEnabled | ternary "tls" "tcp") }}
|
||||||
|
- {{ merge (dict "name" $protocol "targetPort" $protocol "appProtocol" $appProtocol) (omit $servicePort "enabled") (dict "port" $configProtocol.port) | toYaml | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,13 @@
|
||||||
|
{{- with .Values.config.jetstream.fileStore.pvc }}
|
||||||
|
metadata:
|
||||||
|
name: {{ .name }}
|
||||||
|
spec:
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: {{ .size | quote }}
|
||||||
|
{{- with .storageClassName }}
|
||||||
|
storageClassName: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,106 @@
|
||||||
|
name: nats
|
||||||
|
{{ include "nats.image" (merge (pick $.Values "global") .Values.container.image) }}
|
||||||
|
|
||||||
|
ports:
|
||||||
|
{{- range $protocol := list "nats" "leafnodes" "websocket" "mqtt" "cluster" "gateway" "monitor" "profiling" }}
|
||||||
|
{{- $configProtocol := get $.Values.config $protocol }}
|
||||||
|
{{- $containerPort := get $.Values.container.ports $protocol }}
|
||||||
|
{{- if or (eq $protocol "nats") $configProtocol.enabled }}
|
||||||
|
- {{ merge (dict "name" $protocol "containerPort" $configProtocol.port) $containerPort | toYaml | nindent 2 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
args:
|
||||||
|
- --config
|
||||||
|
- /etc/nats-config/nats.conf
|
||||||
|
|
||||||
|
env:
|
||||||
|
- name: POD_NAME
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
fieldPath: metadata.name
|
||||||
|
- name: SERVER_NAME
|
||||||
|
value: {{ printf "%s$(POD_NAME)" .Values.config.serverNamePrefix | quote }}
|
||||||
|
{{- with .Values.container.env }}
|
||||||
|
{{- include "nats.env" . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
lifecycle:
|
||||||
|
preStop:
|
||||||
|
exec:
|
||||||
|
# send the lame duck shutdown signal to trigger a graceful shutdown
|
||||||
|
command:
|
||||||
|
- nats-server
|
||||||
|
- -sl=ldm=/var/run/nats/nats.pid
|
||||||
|
|
||||||
|
{{- with .Values.config.monitor }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
startupProbe:
|
||||||
|
httpGet:
|
||||||
|
path: /healthz
|
||||||
|
port: monitor
|
||||||
|
{{- if .tls.enabled }}
|
||||||
|
scheme: HTTPS
|
||||||
|
{{- end}}
|
||||||
|
initialDelaySeconds: 10
|
||||||
|
timeoutSeconds: 5
|
||||||
|
periodSeconds: 10
|
||||||
|
successThreshold: 1
|
||||||
|
failureThreshold: 90
|
||||||
|
readinessProbe:
|
||||||
|
httpGet:
|
||||||
|
path: /healthz?js-server-only=true
|
||||||
|
port: monitor
|
||||||
|
{{- if .tls.enabled }}
|
||||||
|
scheme: HTTPS
|
||||||
|
{{- end}}
|
||||||
|
initialDelaySeconds: 10
|
||||||
|
timeoutSeconds: 5
|
||||||
|
periodSeconds: 10
|
||||||
|
successThreshold: 1
|
||||||
|
failureThreshold: 3
|
||||||
|
livenessProbe:
|
||||||
|
httpGet:
|
||||||
|
path: /healthz?js-enabled-only=true
|
||||||
|
port: monitor
|
||||||
|
{{- if .tls.enabled }}
|
||||||
|
scheme: HTTPS
|
||||||
|
{{- end}}
|
||||||
|
initialDelaySeconds: 10
|
||||||
|
timeoutSeconds: 5
|
||||||
|
periodSeconds: 30
|
||||||
|
successThreshold: 1
|
||||||
|
failureThreshold: 3
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
volumeMounts:
|
||||||
|
# nats config
|
||||||
|
- name: config
|
||||||
|
mountPath: /etc/nats-config
|
||||||
|
# PID volume
|
||||||
|
- name: pid
|
||||||
|
mountPath: /var/run/nats
|
||||||
|
# JetStream PVC
|
||||||
|
{{- with .Values.config.jetstream }}
|
||||||
|
{{- if and .enabled .fileStore.enabled .fileStore.pvc.enabled }}
|
||||||
|
{{- with .fileStore }}
|
||||||
|
- name: {{ .pvc.name }}
|
||||||
|
mountPath: {{ .dir | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
# resolver PVC
|
||||||
|
{{- with .Values.config.resolver }}
|
||||||
|
{{- if and .enabled .pvc.enabled }}
|
||||||
|
- name: {{ .pvc.name }}
|
||||||
|
mountPath: {{ .dir | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
# tlsCA
|
||||||
|
{{- include "nats.tlsCAVolumeMount" $ }}
|
||||||
|
# secrets
|
||||||
|
{{- range (include "nats.secretNames" $ | fromJson).secretNames }}
|
||||||
|
- name: {{ .name | quote }}
|
||||||
|
mountPath: {{ .dir | quote }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,71 @@
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
{{- include "nats.labels" $ | nindent 4 }}
|
||||||
|
annotations:
|
||||||
|
{{- if .Values.podTemplate.configChecksumAnnotation }}
|
||||||
|
{{- $configMap := include "nats.loadMergePatch" (merge (dict "file" "config-map.yaml" "ctx" $) $.Values.configMap) }}
|
||||||
|
checksum/config: {{ sha256sum $configMap }}
|
||||||
|
{{- end }}
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
# nats
|
||||||
|
{{- $nats := dict }}
|
||||||
|
{{- with .Values.container }}
|
||||||
|
{{- $nats = include "nats.loadMergePatch" (merge (dict "file" "stateful-set/nats-container.yaml" "ctx" $) .) | fromYaml }}
|
||||||
|
- {{ toYaml $nats | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
# reloader
|
||||||
|
{{- with .Values.reloader }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
- {{ include "nats.loadMergePatch" (merge (dict "file" "stateful-set/reloader-container.yaml" "ctx" (merge (dict "natsVolumeMounts" $nats.volumeMounts) $)) .) | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with .Values.promExporter }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
- {{ include "nats.loadMergePatch" (merge (dict "file" "stateful-set/prom-exporter-container.yaml" "ctx" $) .) | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
# service discovery uses DNS; don't need service env vars
|
||||||
|
enableServiceLinks: false
|
||||||
|
|
||||||
|
{{- with .Values.global.image.pullSecretNames }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{- range . }}
|
||||||
|
- name: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- with .Values.serviceAccount }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
serviceAccountName: {{ .name | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- if .Values.reloader.enabled }}
|
||||||
|
shareProcessNamespace: true
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
# nats config
|
||||||
|
- name: config
|
||||||
|
configMap:
|
||||||
|
name: {{ .Values.configMap.name }}
|
||||||
|
# PID volume
|
||||||
|
- name: pid
|
||||||
|
emptyDir: {}
|
||||||
|
# tlsCA
|
||||||
|
{{- include "nats.tlsCAVolume" $ | nindent 2 }}
|
||||||
|
# secrets
|
||||||
|
{{- range (include "nats.secretNames" $ | fromJson).secretNames }}
|
||||||
|
- name: {{ .name | quote }}
|
||||||
|
secret:
|
||||||
|
secretName: {{ .secretName | quote }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- with .Values.podTemplate.topologySpreadConstraints }}
|
||||||
|
topologySpreadConstraints:
|
||||||
|
{{- range $k, $v := . }}
|
||||||
|
- {{ merge (dict "topologyKey" $k "labelSelector" (dict "matchLabels" (include "nats.selectorLabels" $ | fromYaml))) $v | toYaml | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end}}
|
|
@ -0,0 +1,30 @@
|
||||||
|
name: prom-exporter
|
||||||
|
{{ include "nats.image" (merge (pick $.Values "global") .Values.promExporter.image) }}
|
||||||
|
|
||||||
|
ports:
|
||||||
|
- name: prom-metrics
|
||||||
|
containerPort: {{ .Values.promExporter.port }}
|
||||||
|
|
||||||
|
{{- with .Values.promExporter.env }}
|
||||||
|
env:
|
||||||
|
{{- include "nats.env" . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
args:
|
||||||
|
- -port={{ .Values.promExporter.port }}
|
||||||
|
- -connz
|
||||||
|
- -routez
|
||||||
|
- -subz
|
||||||
|
- -varz
|
||||||
|
- -prefix=nats
|
||||||
|
- -use_internal_server_id
|
||||||
|
{{- if .Values.config.jetstream.enabled }}
|
||||||
|
- -jsz=all
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.config.leafnodes.enabled }}
|
||||||
|
- -leafz
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.config.gateway.enabled }}
|
||||||
|
- -gatewayz
|
||||||
|
{{- end }}
|
||||||
|
- http://localhost:{{ .Values.config.monitor.port }}/
|
|
@ -0,0 +1,27 @@
|
||||||
|
name: reloader
|
||||||
|
{{ include "nats.image" (merge (pick $.Values "global") .Values.reloader.image) }}
|
||||||
|
|
||||||
|
{{- with .Values.reloader.env }}
|
||||||
|
env:
|
||||||
|
{{- include "nats.env" . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
args:
|
||||||
|
- -pid
|
||||||
|
- /var/run/nats/nats.pid
|
||||||
|
- -config
|
||||||
|
- /etc/nats-config/nats.conf
|
||||||
|
{{ include "nats.reloaderConfig" (dict "config" .config "dir" "/etc/nats-config") }}
|
||||||
|
|
||||||
|
volumeMounts:
|
||||||
|
- name: pid
|
||||||
|
mountPath: /var/run/nats
|
||||||
|
{{- range $mnt := .natsVolumeMounts }}
|
||||||
|
{{- $found := false }}
|
||||||
|
{{- range $.Values.reloader.natsVolumeMountPrefixes }}
|
||||||
|
{{- if and (not $found) (hasPrefix . $mnt.mountPath) }}
|
||||||
|
{{- $found = true }}
|
||||||
|
- {{ toYaml $mnt | nindent 2}}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,13 @@
|
||||||
|
{{- with .Values.config.resolver.pvc }}
|
||||||
|
metadata:
|
||||||
|
name: {{ .name }}
|
||||||
|
spec:
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: {{ .size | quote }}
|
||||||
|
{{- with .storageClassName }}
|
||||||
|
storageClassName: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,37 @@
|
||||||
|
apiVersion: apps/v1
|
||||||
|
kind: StatefulSet
|
||||||
|
metadata:
|
||||||
|
{{- include "nats.metadataNamespace" $ | nindent 2 }}
|
||||||
|
name: {{ .Values.statefulSet.name }}
|
||||||
|
labels:
|
||||||
|
{{- include "nats.labels" $ | nindent 4 }}
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
{{- include "nats.selectorLabels" $ | nindent 6 }}
|
||||||
|
{{- if .Values.config.cluster.enabled }}
|
||||||
|
replicas: {{ .Values.config.cluster.replicas }}
|
||||||
|
{{- else }}
|
||||||
|
replicas: 1
|
||||||
|
{{- end }}
|
||||||
|
serviceName: {{ .Values.headlessService.name }}
|
||||||
|
podManagementPolicy: Parallel
|
||||||
|
template:
|
||||||
|
{{- with .Values.podTemplate }}
|
||||||
|
{{ include "nats.loadMergePatch" (merge (dict "file" "stateful-set/pod-template.yaml" "ctx" $) .) | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
volumeClaimTemplates:
|
||||||
|
{{- with .Values.config.jetstream }}
|
||||||
|
{{- if and .enabled .fileStore.enabled .fileStore.pvc.enabled }}
|
||||||
|
{{- with .fileStore.pvc }}
|
||||||
|
- {{ include "nats.loadMergePatch" (merge (dict "file" "stateful-set/jetstream-pvc.yaml" "ctx" $) .) | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with .Values.config.resolver }}
|
||||||
|
{{- if and .enabled .pvc.enabled }}
|
||||||
|
{{- with .pvc }}
|
||||||
|
- {{ include "nats.loadMergePatch" (merge (dict "file" "stateful-set/resolver-pvc.yaml" "ctx" $) .) | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,12 @@
|
||||||
|
questions:
|
||||||
|
- variable: cluster.enabled
|
||||||
|
default: false
|
||||||
|
type: boolean
|
||||||
|
label: Enable Cluster
|
||||||
|
group: "Cluster Settings"
|
||||||
|
show_subquestion_if: "true"
|
||||||
|
subquestions:
|
||||||
|
- variable: cluster.replicas
|
||||||
|
default: 3
|
||||||
|
type: int
|
||||||
|
label: Replicas
|
|
@ -0,0 +1,281 @@
|
||||||
|
{{/*
|
||||||
|
Expand the name of the chart.
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.name" -}}
|
||||||
|
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
Create a default fully qualified app name.
|
||||||
|
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
|
||||||
|
If release name contains chart name it will be used as a full name.
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.fullname" -}}
|
||||||
|
{{- if .Values.fullnameOverride }}
|
||||||
|
{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }}
|
||||||
|
{{- else }}
|
||||||
|
{{- $name := default .Chart.Name .Values.nameOverride }}
|
||||||
|
{{- if contains $name .Release.Name }}
|
||||||
|
{{- .Release.Name | trunc 63 | trimSuffix "-" }}
|
||||||
|
{{- else }}
|
||||||
|
{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
Create chart name and version as used by the chart label.
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.chart" -}}
|
||||||
|
{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
Print the namespace
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.namespace" -}}
|
||||||
|
{{- default .Release.Namespace .Values.namespaceOverride }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
Print the namespace for the metadata section
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.metadataNamespace" -}}
|
||||||
|
{{- with .Values.namespaceOverride }}
|
||||||
|
namespace: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
Set default values.
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.defaultValues" }}
|
||||||
|
{{- if not .defaultValuesSet }}
|
||||||
|
{{- $name := include "nats.fullname" . }}
|
||||||
|
{{- with .Values }}
|
||||||
|
{{- $_ := set .config.jetstream.fileStore.pvc "name" (.config.jetstream.fileStore.pvc.name | default (printf "%s-js" $name)) }}
|
||||||
|
{{- $_ := set .config.resolver.pvc "name" (.config.resolver.pvc.name | default (printf "%s-resolver" $name)) }}
|
||||||
|
{{- $_ := set .config.websocket.ingress "name" (.config.websocket.ingress.name | default (printf "%s-ws" $name)) }}
|
||||||
|
{{- $_ := set .configMap "name" (.configMap.name | default (printf "%s-config" $name)) }}
|
||||||
|
{{- $_ := set .headlessService "name" (.headlessService.name | default (printf "%s-headless" $name)) }}
|
||||||
|
{{- $_ := set .natsBox.contentsSecret "name" (.natsBox.contentsSecret.name | default (printf "%s-box-contents" $name)) }}
|
||||||
|
{{- $_ := set .natsBox.contextsSecret "name" (.natsBox.contextsSecret.name | default (printf "%s-box-contexts" $name)) }}
|
||||||
|
{{- $_ := set .natsBox.deployment "name" (.natsBox.deployment.name | default (printf "%s-box" $name)) }}
|
||||||
|
{{- $_ := set .natsBox.serviceAccount "name" (.natsBox.serviceAccount.name | default (printf "%s-box" $name)) }}
|
||||||
|
{{- $_ := set .podDisruptionBudget "name" (.podDisruptionBudget.name | default $name) }}
|
||||||
|
{{- $_ := set .service "name" (.service.name | default $name) }}
|
||||||
|
{{- $_ := set .serviceAccount "name" (.serviceAccount.name | default $name) }}
|
||||||
|
{{- $_ := set .statefulSet "name" (.statefulSet.name | default $name) }}
|
||||||
|
{{- $_ := set .promExporter.podMonitor "name" (.promExporter.podMonitor.name | default $name) }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- $values := get (include "tplYaml" (dict "doc" .Values "ctx" $) | fromJson) "doc" }}
|
||||||
|
{{- $_ := set . "Values" $values }}
|
||||||
|
|
||||||
|
{{- $hasContentsSecret := false }}
|
||||||
|
{{- range $ctxKey, $ctxVal := .Values.natsBox.contexts }}
|
||||||
|
{{- range $secretKey, $secretVal := dict "creds" "nats-creds" "nkey" "nats-nkeys" "tls" "nats-certs" }}
|
||||||
|
{{- $secret := get $ctxVal $secretKey }}
|
||||||
|
{{- if $secret }}
|
||||||
|
{{- $_ := set $secret "dir" ($secret.dir | default (printf "/etc/%s/%s" $secretVal $ctxKey)) }}
|
||||||
|
{{- if and (ne $secretKey "tls") $secret.contents }}
|
||||||
|
{{- $hasContentsSecret = true }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- $_ := set $ "hasContentsSecret" $hasContentsSecret }}
|
||||||
|
|
||||||
|
{{- with .Values.config }}
|
||||||
|
{{- $config := include "nats.loadMergePatch" (merge (dict "file" "config/config.yaml" "ctx" $) .) | fromYaml }}
|
||||||
|
{{- $_ := set $ "config" $config }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- $_ := set . "defaultValuesSet" true }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
NATS labels
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.labels" -}}
|
||||||
|
{{- with .Values.global.labels -}}
|
||||||
|
{{ toYaml . }}
|
||||||
|
{{ end -}}
|
||||||
|
helm.sh/chart: {{ include "nats.chart" . }}
|
||||||
|
{{ include "nats.selectorLabels" . }}
|
||||||
|
{{- if .Chart.AppVersion }}
|
||||||
|
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
|
||||||
|
{{- end }}
|
||||||
|
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
NATS selector labels
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.selectorLabels" -}}
|
||||||
|
app.kubernetes.io/name: {{ include "nats.name" . }}
|
||||||
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||||
|
app.kubernetes.io/component: nats
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
NATS Box labels
|
||||||
|
*/}}
|
||||||
|
{{- define "natsBox.labels" -}}
|
||||||
|
{{- with .Values.global.labels -}}
|
||||||
|
{{ toYaml . }}
|
||||||
|
{{ end -}}
|
||||||
|
helm.sh/chart: {{ include "nats.chart" . }}
|
||||||
|
{{ include "natsBox.selectorLabels" . }}
|
||||||
|
{{- if .Chart.AppVersion }}
|
||||||
|
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
|
||||||
|
{{- end }}
|
||||||
|
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
NATS Box selector labels
|
||||||
|
*/}}
|
||||||
|
{{- define "natsBox.selectorLabels" -}}
|
||||||
|
app.kubernetes.io/name: {{ include "nats.name" . }}
|
||||||
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||||
|
app.kubernetes.io/component: nats-box
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
Print the image
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.image" }}
|
||||||
|
{{- $image := printf "%s:%s" .repository .tag }}
|
||||||
|
{{- if or .registry .global.image.registry }}
|
||||||
|
{{- $image = printf "%s/%s" (.registry | default .global.image.registry) $image }}
|
||||||
|
{{- end -}}
|
||||||
|
image: {{ $image }}
|
||||||
|
{{- if or .pullPolicy .global.image.pullPolicy }}
|
||||||
|
imagePullPolicy: {{ .pullPolicy | default .global.image.pullPolicy }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- define "nats.secretNames" -}}
|
||||||
|
{{- $secrets := list }}
|
||||||
|
{{- range $protocol := list "nats" "leafnodes" "websocket" "mqtt" "cluster" "gateway" }}
|
||||||
|
{{- $configProtocol := get $.Values.config $protocol }}
|
||||||
|
{{- if and (or (eq $protocol "nats") $configProtocol.enabled) $configProtocol.tls.enabled $configProtocol.tls.secretName }}
|
||||||
|
{{- $secrets = append $secrets (merge (dict "name" (printf "%s-tls" $protocol)) $configProtocol.tls) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- toJson (dict "secretNames" $secrets) }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- define "natsBox.secretNames" -}}
|
||||||
|
{{- $secrets := list }}
|
||||||
|
{{- range $ctxKey, $ctxVal := .Values.natsBox.contexts }}
|
||||||
|
{{- range $secretKey, $secretVal := dict "creds" "nats-creds" "nkey" "nats-nkeys" "tls" "nats-certs" }}
|
||||||
|
{{- $secret := get $ctxVal $secretKey }}
|
||||||
|
{{- if and $secret $secret.secretName }}
|
||||||
|
{{- $secrets = append $secrets (merge (dict "name" (printf "ctx-%s-%s" $ctxKey $secretKey)) $secret) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- toJson (dict "secretNames" $secrets) }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- define "nats.tlsCAVolume" -}}
|
||||||
|
{{- with .Values.tlsCA }}
|
||||||
|
{{- if and .enabled (or .configMapName .secretName) }}
|
||||||
|
- name: tls-ca
|
||||||
|
{{- if .configMapName }}
|
||||||
|
configMap:
|
||||||
|
name: {{ .configMapName | quote }}
|
||||||
|
{{- else if .secretName }}
|
||||||
|
secret:
|
||||||
|
secretName: {{ .secretName | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- define "nats.tlsCAVolumeMount" -}}
|
||||||
|
{{- with .Values.tlsCA }}
|
||||||
|
{{- if and .enabled (or .configMapName .secretName) }}
|
||||||
|
- name: tls-ca
|
||||||
|
mountPath: {{ .dir | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{/*
|
||||||
|
translates env var map to list
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.env" -}}
|
||||||
|
{{- range $k, $v := . }}
|
||||||
|
{{- if kindIs "string" $v }}
|
||||||
|
- name: {{ $k | quote }}
|
||||||
|
value: {{ $v | quote }}
|
||||||
|
{{- else if kindIs "map" $v }}
|
||||||
|
- {{ merge (dict "name" $k) $v | toYaml | nindent 2 }}
|
||||||
|
{{- else }}
|
||||||
|
{{- fail (cat "env var" $k "must be string or map, got" (kindOf $v)) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
{{- /*
|
||||||
|
nats.loadMergePatch
|
||||||
|
input: map with 4 keys:
|
||||||
|
- file: name of file to load
|
||||||
|
- ctx: context to pass to tpl
|
||||||
|
- merge: interface{} to merge
|
||||||
|
- patch: []interface{} valid JSON Patch document
|
||||||
|
output: JSON encoded map with 1 key:
|
||||||
|
- doc: interface{} patched json result
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.loadMergePatch" -}}
|
||||||
|
{{- $doc := tpl (.ctx.Files.Get (printf "files/%s" .file)) .ctx | fromYaml | default dict -}}
|
||||||
|
{{- $doc = mergeOverwrite $doc (deepCopy (.merge | default dict)) -}}
|
||||||
|
{{- get (include "jsonpatch" (dict "doc" $doc "patch" (.patch | default list)) | fromJson ) "doc" | toYaml -}}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
|
||||||
|
{{- /*
|
||||||
|
nats.reloaderConfig
|
||||||
|
input: map with 2 keys:
|
||||||
|
- config: interface{} nats config
|
||||||
|
- dir: dir config file is in
|
||||||
|
output: YAML list of reloader config files
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.reloaderConfig" -}}
|
||||||
|
{{- $dir := trimSuffix "/" .dir -}}
|
||||||
|
{{- with .config -}}
|
||||||
|
{{- if kindIs "map" . -}}
|
||||||
|
{{- range $k, $v := . -}}
|
||||||
|
{{- if or (eq $k "cert_file") (eq $k "key_file") (eq $k "ca_file") }}
|
||||||
|
- -config
|
||||||
|
- {{ $v }}
|
||||||
|
{{- else if hasSuffix "$include" $k }}
|
||||||
|
- -config
|
||||||
|
- {{ clean (printf "%s/%s" $dir $v) }}
|
||||||
|
{{- else }}
|
||||||
|
{{- include "nats.reloaderConfig" (dict "config" $v "dir" $dir) }}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
|
||||||
|
{{- /*
|
||||||
|
nats.formatConfig
|
||||||
|
input: map[string]interface{}
|
||||||
|
output: string with following format rules
|
||||||
|
1. keys ending in $natsRaw are unquoted
|
||||||
|
2. keys ending in $natsInclude are converted to include directives
|
||||||
|
*/}}
|
||||||
|
{{- define "nats.formatConfig" -}}
|
||||||
|
{{-
|
||||||
|
(regexReplaceAll "\"<<\\s+(.*)\\s+>>\""
|
||||||
|
(regexReplaceAll "\".*\\$include\": \"(.*)\",?" (include "toPrettyRawJson" .) "include ${1};")
|
||||||
|
"${1}")
|
||||||
|
-}}
|
||||||
|
{{- end -}}
|
|
@ -0,0 +1,219 @@
|
||||||
|
{{- /*
|
||||||
|
jsonpatch
|
||||||
|
input: map with 2 keys:
|
||||||
|
- doc: interface{} valid JSON document
|
||||||
|
- patch: []interface{} valid JSON Patch document
|
||||||
|
output: JSON encoded map with 1 key:
|
||||||
|
- doc: interface{} patched json result
|
||||||
|
*/}}
|
||||||
|
{{- define "jsonpatch" -}}
|
||||||
|
{{- $params := fromJson (toJson .) -}}
|
||||||
|
{{- $patches := $params.patch -}}
|
||||||
|
{{- $docContainer := pick $params "doc" -}}
|
||||||
|
|
||||||
|
{{- range $patch := $patches -}}
|
||||||
|
{{- if not (hasKey $patch "op") -}}
|
||||||
|
{{- fail "patch is missing op key" -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- if and (ne $patch.op "add") (ne $patch.op "remove") (ne $patch.op "replace") (ne $patch.op "copy") (ne $patch.op "move") (ne $patch.op "test") -}}
|
||||||
|
{{- fail (cat "patch has invalid op" $patch.op) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- if not (hasKey $patch "path") -}}
|
||||||
|
{{- fail "patch is missing path key" -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- if and (or (eq $patch.op "add") (eq $patch.op "replace") (eq $patch.op "test")) (not (hasKey $patch "value")) -}}
|
||||||
|
{{- fail (cat "patch with op" $patch.op "is missing value key") -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- if and (or (eq $patch.op "copy") (eq $patch.op "move")) (not (hasKey $patch "from")) -}}
|
||||||
|
{{- fail (cat "patch with op" $patch.op "is missing from key") -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- $opPathKeys := list "path" -}}
|
||||||
|
{{- if or (eq $patch.op "copy") (eq $patch.op "move") -}}
|
||||||
|
{{- $opPathKeys = append $opPathKeys "from" -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $reSlice := list -}}
|
||||||
|
|
||||||
|
{{- range $opPathKey := $opPathKeys -}}
|
||||||
|
{{- $obj := $docContainer -}}
|
||||||
|
{{- if and (eq $patch.op "copy") (eq $opPathKey "from") -}}
|
||||||
|
{{- $obj = (fromJson (toJson $docContainer)) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $key := "doc" -}}
|
||||||
|
{{- $lastMap := dict "root" $obj -}}
|
||||||
|
{{- $lastKey := "root" -}}
|
||||||
|
{{- $paths := (splitList "/" (get $patch $opPathKey)) -}}
|
||||||
|
{{- $firstPath := index $paths 0 -}}
|
||||||
|
{{- if ne (index $paths 0) "" -}}
|
||||||
|
{{- fail (cat "invalid" $opPathKey (get $patch $opPathKey) "must be empty string or start with /") -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $paths = slice $paths 1 -}}
|
||||||
|
|
||||||
|
{{- range $path := $paths -}}
|
||||||
|
{{- $path = replace "~1" "/" $path -}}
|
||||||
|
{{- $path = replace "~0" "~" $path -}}
|
||||||
|
|
||||||
|
{{- if kindIs "slice" $obj -}}
|
||||||
|
{{- $mapObj := dict -}}
|
||||||
|
{{- range $i, $v := $obj -}}
|
||||||
|
{{- $_ := set $mapObj (toString $i) $v -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $obj = $mapObj -}}
|
||||||
|
{{- $_ := set $lastMap $lastKey $obj -}}
|
||||||
|
{{- $reSlice = prepend $reSlice (dict "lastMap" $lastMap "lastKey" $lastKey "mapObj" $obj) -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- if kindIs "map" $obj -}}
|
||||||
|
{{- if not (hasKey $obj $key) -}}
|
||||||
|
{{- fail (cat "key" $key "does not exist") -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $lastKey = $key -}}
|
||||||
|
{{- $lastMap = $obj -}}
|
||||||
|
{{- $obj = index $obj $key -}}
|
||||||
|
{{- $key = $path -}}
|
||||||
|
{{- else -}}
|
||||||
|
{{- fail (cat "cannot iterate into path" $key "on type" (kindOf $obj)) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- $_ := set $patch (printf "%sKey" $opPathKey) $key -}}
|
||||||
|
{{- $_ := set $patch (printf "%sLastKey" $opPathKey) $lastKey -}}
|
||||||
|
{{- $_ = set $patch (printf "%sLastMap" $opPathKey) $lastMap -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- if eq $patch.op "move" }}
|
||||||
|
{{- if and (ne $patch.path $patch.from) (hasPrefix (printf "%s/" $patch.path) (printf "%s/" $patch.from)) -}}
|
||||||
|
{{- fail (cat "from" $patch.from "may not be a child of path" $patch.path) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- if or (eq $patch.op "move") (eq $patch.op "copy") (eq $patch.op "test") }}
|
||||||
|
{{- $key := $patch.fromKey -}}
|
||||||
|
{{- $lastMap := $patch.fromLastMap -}}
|
||||||
|
{{- $lastKey := $patch.fromLastKey -}}
|
||||||
|
{{- $setKey := "value" -}}
|
||||||
|
{{- if eq $patch.op "test" }}
|
||||||
|
{{- $key = $patch.pathKey -}}
|
||||||
|
{{- $lastMap = $patch.pathLastMap -}}
|
||||||
|
{{- $lastKey = $patch.pathLastKey -}}
|
||||||
|
{{- $setKey = "testValue" -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $obj := index $lastMap $lastKey -}}
|
||||||
|
|
||||||
|
{{- if kindIs "map" $obj -}}
|
||||||
|
{{- if not (hasKey $obj $key) -}}
|
||||||
|
{{- fail (cat $key "does not exist") -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $_ := set $patch $setKey (index $obj $key) -}}
|
||||||
|
|
||||||
|
{{- else if kindIs "slice" $obj -}}
|
||||||
|
{{- $i := atoi $key -}}
|
||||||
|
{{- if ne $key (toString $i) -}}
|
||||||
|
{{- fail (cat "cannot convert" $key "to int") -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- if lt $i 0 -}}
|
||||||
|
{{- fail "slice index <0" -}}
|
||||||
|
{{- else if lt $i (len $obj) -}}
|
||||||
|
{{- $_ := set $patch $setKey (index $obj $i) -}}
|
||||||
|
{{- else -}}
|
||||||
|
{{- fail "slice index >= slice length" -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- else -}}
|
||||||
|
{{- fail (cat "cannot" $patch.op $key "on type" (kindOf $obj)) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- if or (eq $patch.op "remove") (eq $patch.op "replace") (eq $patch.op "move") }}
|
||||||
|
{{- $key := $patch.pathKey -}}
|
||||||
|
{{- $lastMap := $patch.pathLastMap -}}
|
||||||
|
{{- $lastKey := $patch.pathLastKey -}}
|
||||||
|
{{- if eq $patch.op "move" }}
|
||||||
|
{{- $key = $patch.fromKey -}}
|
||||||
|
{{- $lastMap = $patch.fromLastMap -}}
|
||||||
|
{{- $lastKey = $patch.fromLastKey -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $obj := index $lastMap $lastKey -}}
|
||||||
|
|
||||||
|
{{- if kindIs "map" $obj -}}
|
||||||
|
{{- if not (hasKey $obj $key) -}}
|
||||||
|
{{- fail (cat $key "does not exist") -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $_ := unset $obj $key -}}
|
||||||
|
|
||||||
|
{{- else if kindIs "slice" $obj -}}
|
||||||
|
{{- $i := atoi $key -}}
|
||||||
|
{{- if ne $key (toString $i) -}}
|
||||||
|
{{- fail (cat "cannot convert" $key "to int") -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- if lt $i 0 -}}
|
||||||
|
{{- fail "slice index <0" -}}
|
||||||
|
{{- else if eq $i 0 -}}
|
||||||
|
{{- $_ := set $lastMap $lastKey (slice $obj 1) -}}
|
||||||
|
{{- else if lt $i (sub (len $obj) 1) -}}
|
||||||
|
{{- $_ := set $lastMap $lastKey (concat (slice $obj 0 $i) (slice $obj (add $i 1) (len $obj))) -}}
|
||||||
|
{{- else if eq $i (sub (len $obj) 1) -}}
|
||||||
|
{{- $_ := set $lastMap $lastKey (slice $obj 0 (sub (len $obj) 1)) -}}
|
||||||
|
{{- else -}}
|
||||||
|
{{- fail "slice index >= slice length" -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- else -}}
|
||||||
|
{{- fail (cat "cannot" $patch.op $key "on type" (kindOf $obj)) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- if or (eq $patch.op "add") (eq $patch.op "replace") (eq $patch.op "move") (eq $patch.op "copy") }}
|
||||||
|
{{- $key := $patch.pathKey -}}
|
||||||
|
{{- $lastMap := $patch.pathLastMap -}}
|
||||||
|
{{- $lastKey := $patch.pathLastKey -}}
|
||||||
|
{{- $value := $patch.value -}}
|
||||||
|
{{- $obj := index $lastMap $lastKey -}}
|
||||||
|
|
||||||
|
{{- if kindIs "map" $obj -}}
|
||||||
|
{{- $_ := set $obj $key $value -}}
|
||||||
|
|
||||||
|
{{- else if kindIs "slice" $obj -}}
|
||||||
|
{{- $i := 0 -}}
|
||||||
|
{{- if eq $key "-" -}}
|
||||||
|
{{- $i = len $obj -}}
|
||||||
|
{{- else -}}
|
||||||
|
{{- $i = atoi $key -}}
|
||||||
|
{{- if ne $key (toString $i) -}}
|
||||||
|
{{- fail (cat "cannot convert" $key "to int") -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- if lt $i 0 -}}
|
||||||
|
{{- fail "slice index <0" -}}
|
||||||
|
{{- else if eq $i 0 -}}
|
||||||
|
{{- $_ := set $lastMap $lastKey (prepend $obj $value) -}}
|
||||||
|
{{- else if lt $i (len $obj) -}}
|
||||||
|
{{- $_ := set $lastMap $lastKey (concat (append (slice $obj 0 $i) $value) (slice $obj $i)) -}}
|
||||||
|
{{- else if eq $i (len $obj) -}}
|
||||||
|
{{- $_ := set $lastMap $lastKey (append $obj $value) -}}
|
||||||
|
{{- else -}}
|
||||||
|
{{- fail "slice index > slice length" -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- else -}}
|
||||||
|
{{- fail (cat "cannot" $patch.op $key "on type" (kindOf $obj)) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- if eq $patch.op "test" }}
|
||||||
|
{{- if not (deepEqual $patch.value $patch.testValue) }}
|
||||||
|
{{- fail (cat "test failed, expected" (toJson $patch.value) "but got" (toJson $patch.testValue)) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- range $reSliceOp := $reSlice -}}
|
||||||
|
{{- $sliceObj := list -}}
|
||||||
|
{{- range $i := until (len $reSliceOp.mapObj) -}}
|
||||||
|
{{- $sliceObj = append $sliceObj (index $reSliceOp.mapObj (toString $i)) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $_ := set $reSliceOp.lastMap $reSliceOp.lastKey $sliceObj -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- end -}}
|
||||||
|
{{- toJson $docContainer -}}
|
||||||
|
{{- end -}}
|
|
@ -0,0 +1,28 @@
|
||||||
|
{{- /*
|
||||||
|
toPrettyRawJson
|
||||||
|
input: interface{} valid JSON document
|
||||||
|
output: pretty raw JSON string
|
||||||
|
*/}}
|
||||||
|
{{- define "toPrettyRawJson" -}}
|
||||||
|
{{- include "toPrettyRawJsonStr" (toPrettyJson .) -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- /*
|
||||||
|
toPrettyRawJsonStr
|
||||||
|
input: pretty JSON string
|
||||||
|
output: pretty raw JSON string
|
||||||
|
*/}}
|
||||||
|
{{- define "toPrettyRawJsonStr" -}}
|
||||||
|
{{- $s :=
|
||||||
|
(regexReplaceAll "([^\\\\](?:\\\\\\\\)*)\\\\u003e"
|
||||||
|
(regexReplaceAll "([^\\\\](?:\\\\\\\\)*)\\\\u003c"
|
||||||
|
(regexReplaceAll "([^\\\\](?:\\\\\\\\)*)\\\\u0026" . "${1}&")
|
||||||
|
"${1}<")
|
||||||
|
"${1}>")
|
||||||
|
-}}
|
||||||
|
{{- if regexMatch "([^\\\\](?:\\\\\\\\)*)\\\\u00(26|3c|3e)" $s -}}
|
||||||
|
{{- include "toPrettyRawJsonStr" $s -}}
|
||||||
|
{{- else -}}
|
||||||
|
{{- $s -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
|
@ -0,0 +1,114 @@
|
||||||
|
{{- /*
|
||||||
|
tplYaml
|
||||||
|
input: map with 2 keys:
|
||||||
|
- doc: interface{}
|
||||||
|
- ctx: context to pass to tpl function
|
||||||
|
output: JSON encoded map with 1 key:
|
||||||
|
- doc: interface{} with any keys called tpl or tplSpread values templated and replaced
|
||||||
|
|
||||||
|
maps matching the following syntax will be templated and parsed as YAML
|
||||||
|
{
|
||||||
|
$tplYaml: string
|
||||||
|
}
|
||||||
|
|
||||||
|
maps matching the follow syntax will be templated, parsed as YAML, and spread into the parent map/slice
|
||||||
|
{
|
||||||
|
$tplYamlSpread: string
|
||||||
|
}
|
||||||
|
*/}}
|
||||||
|
{{- define "tplYaml" -}}
|
||||||
|
{{- $patch := get (include "tplYamlItr" (dict "ctx" .ctx "parentKind" "" "parentPath" "" "path" "/" "value" .doc) | fromJson) "patch" -}}
|
||||||
|
{{- include "jsonpatch" (dict "doc" .doc "patch" $patch) -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- /*
|
||||||
|
tplYamlItr
|
||||||
|
input: map with 4 keys:
|
||||||
|
- path: string JSONPath to current element
|
||||||
|
- parentKind: string kind of parent element
|
||||||
|
- parentPath: string JSONPath to parent element
|
||||||
|
- value: interface{}
|
||||||
|
- ctx: context to pass to tpl function
|
||||||
|
output: JSON encoded map with 1 key:
|
||||||
|
- patch: list of patches to apply in order to template
|
||||||
|
*/}}
|
||||||
|
{{- define "tplYamlItr" -}}
|
||||||
|
{{- $params := . -}}
|
||||||
|
{{- $kind := kindOf $params.value -}}
|
||||||
|
{{- $patch := list -}}
|
||||||
|
{{- $joinPath := $params.path -}}
|
||||||
|
{{- if eq $params.path "/" -}}
|
||||||
|
{{- $joinPath = "" -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $joinParentPath := $params.parentPath -}}
|
||||||
|
{{- if eq $params.parentPath "/" -}}
|
||||||
|
{{- $joinParentPath = "" -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- if eq $kind "slice" -}}
|
||||||
|
{{- $iAdj := 0 -}}
|
||||||
|
{{- range $i, $v := $params.value -}}
|
||||||
|
{{- $iPath := printf "%s/%d" $joinPath (add $i $iAdj) -}}
|
||||||
|
{{- $itrPatch := get (include "tplYamlItr" (dict "ctx" $params.ctx "parentKind" $kind "parentPath" $params.path "path" $iPath "value" $v) | fromJson) "patch" -}}
|
||||||
|
{{- $itrLen := len $itrPatch -}}
|
||||||
|
{{- if gt $itrLen 0 -}}
|
||||||
|
{{- $patch = concat $patch $itrPatch -}}
|
||||||
|
{{- if eq (get (index $itrPatch 0) "op") "remove" -}}
|
||||||
|
{{- $iAdj = add $iAdj (sub $itrLen 2) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- else if eq $kind "map" -}}
|
||||||
|
{{- if and (eq (len $params.value) 1) (or (hasKey $params.value "$tplYaml") (hasKey $params.value "$tplYamlSpread")) -}}
|
||||||
|
{{- $tpl := get $params.value "$tplYaml" -}}
|
||||||
|
{{- $spread := false -}}
|
||||||
|
{{- if hasKey $params.value "$tplYamlSpread" -}}
|
||||||
|
{{- if eq $params.path "/" -}}
|
||||||
|
{{- fail "cannot $tplYamlSpread on root object" -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $tpl = get $params.value "$tplYamlSpread" -}}
|
||||||
|
{{- $spread = true -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- $res := tpl $tpl $params.ctx -}}
|
||||||
|
{{- $res = get (fromYaml (tpl "tpl: {{ nindent 2 .res }}" (merge (dict "res" $res) $params.ctx))) "tpl" -}}
|
||||||
|
|
||||||
|
{{- if eq $spread false -}}
|
||||||
|
{{- $patch = append $patch (dict "op" "replace" "path" $params.path "value" $res) -}}
|
||||||
|
{{- else -}}
|
||||||
|
{{- $resKind := kindOf $res -}}
|
||||||
|
{{- if and (ne $resKind "invalid") (ne $resKind $params.parentKind) -}}
|
||||||
|
{{- fail (cat "can only $tplYamlSpread slice onto a slice or map onto a map; attempted to spread" $resKind "on" $params.parentKind "at path" $params.path) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $patch = append $patch (dict "op" "remove" "path" $params.path) -}}
|
||||||
|
{{- if eq $resKind "invalid" -}}
|
||||||
|
{{- /* no-op */ -}}
|
||||||
|
{{- else if eq $resKind "slice" -}}
|
||||||
|
{{- range $v := reverse $res -}}
|
||||||
|
{{- $patch = append $patch (dict "op" "add" "path" $params.path "value" $v) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- else -}}
|
||||||
|
{{- range $k, $v := $res -}}
|
||||||
|
{{- $kPath := replace "~" "~0" $k -}}
|
||||||
|
{{- $kPath = replace "/" "~1" $kPath -}}
|
||||||
|
{{- $kPath = printf "%s/%s" $joinParentPath $kPath -}}
|
||||||
|
{{- $patch = append $patch (dict "op" "add" "path" $kPath "value" $v) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- else -}}
|
||||||
|
{{- range $k, $v := $params.value -}}
|
||||||
|
{{- $kPath := replace "~" "~0" $k -}}
|
||||||
|
{{- $kPath = replace "/" "~1" $kPath -}}
|
||||||
|
{{- $kPath = printf "%s/%s" $joinPath $kPath -}}
|
||||||
|
{{- $itrPatch := get (include "tplYamlItr" (dict "ctx" $params.ctx "parentKind" $kind "parentPath" $params.path "path" $kPath "value" $v) | fromJson) "patch" -}}
|
||||||
|
{{- if gt (len $itrPatch) 0 -}}
|
||||||
|
{{- $patch = concat $patch $itrPatch -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- toJson (dict "patch" $patch) -}}
|
||||||
|
{{- end -}}
|
|
@ -0,0 +1,4 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.configMap }}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "config-map.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,5 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- range .Values.extraResources }}
|
||||||
|
---
|
||||||
|
{{ . | toYaml }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,4 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.headlessService }}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "headless-service.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,6 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.config.websocket.ingress }}
|
||||||
|
{{- if and .enabled .hosts $.Values.config.websocket.enabled $.Values.service.enabled $.Values.service.ports.websocket.enabled }}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "ingress.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,10 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- if .hasContentsSecret }}
|
||||||
|
{{- with .Values.natsBox }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
{{- with .contentsSecret}}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "nats-box/contents-secret.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,8 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.natsBox }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
{{- with .contextsSecret}}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "nats-box/contexts-secret/contexts-secret.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,8 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.natsBox }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
{{- with .deployment }}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "nats-box/deployment/deployment.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,8 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- if .Values.natsBox.enabled }}
|
||||||
|
{{- with .Values.natsBox.serviceAccount }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "nats-box/service-account.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,6 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.podDisruptionBudget }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "pod-disruption-budget.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,8 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.promExporter }}
|
||||||
|
{{- if and .enabled .podMonitor.enabled }}
|
||||||
|
{{- with .podMonitor }}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "pod-monitor.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,6 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.serviceAccount }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "service-account.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,6 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.service }}
|
||||||
|
{{- if .enabled }}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "service.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,4 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.statefulSet }}
|
||||||
|
{{- include "nats.loadMergePatch" (merge (dict "file" "stateful-set/stateful-set.yaml" "ctx" $) .) }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,37 @@
|
||||||
|
{{- include "nats.defaultValues" . }}
|
||||||
|
{{- with .Values.natsBox | deepCopy }}
|
||||||
|
{{- $natsBox := . }}
|
||||||
|
{{- if .enabled -}}
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Pod
|
||||||
|
{{- with .container }}
|
||||||
|
{{- $_ := set . "merge" (dict
|
||||||
|
"args" (list
|
||||||
|
"sh"
|
||||||
|
"-ec"
|
||||||
|
"nats reply --echo echo & pid=\"$!\"; sleep 1; nats request echo hi > /tmp/resp; kill \"$pid\"; wait; grep -qF hi /tmp/resp"
|
||||||
|
)
|
||||||
|
) }}
|
||||||
|
{{- $_ := set . "patch" list }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with .podTemplate }}
|
||||||
|
{{- $_ := set . "merge" (dict
|
||||||
|
"metadata" (dict
|
||||||
|
"name" (printf "%s-test-request-reply" $.Values.statefulSet.name)
|
||||||
|
"labels" (dict
|
||||||
|
"app.kubernetes.io/component" "test-request-reply"
|
||||||
|
)
|
||||||
|
"annotations" (dict
|
||||||
|
"helm.sh/hook" "test"
|
||||||
|
"helm.sh/hook-delete-policy" "before-hook-creation,hook-succeeded"
|
||||||
|
)
|
||||||
|
)
|
||||||
|
"spec" (dict
|
||||||
|
"restartPolicy" "Never"
|
||||||
|
)
|
||||||
|
) }}
|
||||||
|
{{- $_ := set . "patch" list }}
|
||||||
|
{{ include "nats.loadMergePatch" (merge (dict "file" "nats-box/deployment/pod-template.yaml" "ctx" (merge (dict "Values" (dict "natsBox" $natsBox)) $)) .) }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,669 @@
|
||||||
|
################################################################################
|
||||||
|
# Global options
|
||||||
|
################################################################################
|
||||||
|
global:
|
||||||
|
image:
|
||||||
|
# global image pull policy to use for all container images in the chart
|
||||||
|
# can be overridden by individual image pullPolicy
|
||||||
|
pullPolicy:
|
||||||
|
# global list of secret names to use as image pull secrets for all pod specs in the chart
|
||||||
|
# secrets must exist in the same namespace
|
||||||
|
# https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||||
|
pullSecretNames: []
|
||||||
|
# global registry to use for all container images in the chart
|
||||||
|
# can be overridden by individual image registry
|
||||||
|
registry:
|
||||||
|
|
||||||
|
# global labels will be applied to all resources deployed by the chart
|
||||||
|
labels: {}
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
# Common options
|
||||||
|
################################################################################
|
||||||
|
# override name of the chart
|
||||||
|
nameOverride:
|
||||||
|
# override full name of the chart+release
|
||||||
|
fullnameOverride:
|
||||||
|
# override the namespace that resources are installed into
|
||||||
|
namespaceOverride:
|
||||||
|
|
||||||
|
# reference a common CA Certificate or Bundle in all nats config `tls` blocks and nats-box contexts
|
||||||
|
# note: `tls.verify` still must be set in the appropriate nats config `tls` blocks to require mTLS
|
||||||
|
tlsCA:
|
||||||
|
enabled: false
|
||||||
|
# set configMapName in order to mount an existing configMap to dir
|
||||||
|
configMapName:
|
||||||
|
# set secretName in order to mount an existing secretName to dir
|
||||||
|
secretName:
|
||||||
|
# directory to mount the configMap or secret to
|
||||||
|
dir: /etc/nats-ca-cert
|
||||||
|
# key in the configMap or secret that contains the CA Certificate or Bundle
|
||||||
|
key: ca.crt
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
# NATS Stateful Set and associated resources
|
||||||
|
################################################################################
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# NATS config
|
||||||
|
############################################################
|
||||||
|
config:
|
||||||
|
cluster:
|
||||||
|
enabled: false
|
||||||
|
port: 6222
|
||||||
|
# must be 2 or higher when jetstream is enabled
|
||||||
|
replicas: 3
|
||||||
|
|
||||||
|
# apply to generated route URLs that connect to other pods in the StatefulSet
|
||||||
|
routeURLs:
|
||||||
|
# if both user and password are set, they will be added to route URLs
|
||||||
|
# and the cluster authorization block
|
||||||
|
user:
|
||||||
|
password:
|
||||||
|
# set to true to use FQDN in route URLs
|
||||||
|
useFQDN: false
|
||||||
|
k8sClusterDomain: cluster.local
|
||||||
|
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
# set secretName in order to mount an existing secret to dir
|
||||||
|
secretName:
|
||||||
|
dir: /etc/nats-certs/cluster
|
||||||
|
cert: tls.crt
|
||||||
|
key: tls.key
|
||||||
|
# merge or patch the tls config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
# merge or patch the cluster config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/clustering/cluster_config
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
jetstream:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
fileStore:
|
||||||
|
enabled: true
|
||||||
|
dir: /data
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# stateful set -> volume claim templates -> jetstream pvc
|
||||||
|
############################################################
|
||||||
|
pvc:
|
||||||
|
enabled: true
|
||||||
|
size: 10Gi
|
||||||
|
storageClassName:
|
||||||
|
|
||||||
|
# merge or patch the jetstream pvc
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#persistentvolumeclaim-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}-js"
|
||||||
|
name:
|
||||||
|
|
||||||
|
# defaults to the PVC size
|
||||||
|
maxSize:
|
||||||
|
|
||||||
|
memoryStore:
|
||||||
|
enabled: false
|
||||||
|
# ensure that container has a sufficient memory limit greater than maxSize
|
||||||
|
maxSize: 1Gi
|
||||||
|
|
||||||
|
# merge or patch the jetstream config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration#jetstream
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
nats:
|
||||||
|
port: 4222
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
# set secretName in order to mount an existing secret to dir
|
||||||
|
secretName:
|
||||||
|
dir: /etc/nats-certs/nats
|
||||||
|
cert: tls.crt
|
||||||
|
key: tls.key
|
||||||
|
# merge or patch the tls config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
leafnodes:
|
||||||
|
enabled: false
|
||||||
|
port: 7422
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
# set secretName in order to mount an existing secret to dir
|
||||||
|
secretName:
|
||||||
|
dir: /etc/nats-certs/leafnodes
|
||||||
|
cert: tls.crt
|
||||||
|
key: tls.key
|
||||||
|
# merge or patch the tls config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
# merge or patch the leafnodes config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/leafnodes/leafnode_conf
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
websocket:
|
||||||
|
enabled: false
|
||||||
|
port: 8080
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
# set secretName in order to mount an existing secret to dir
|
||||||
|
secretName:
|
||||||
|
dir: /etc/nats-certs/websocket
|
||||||
|
cert: tls.crt
|
||||||
|
key: tls.key
|
||||||
|
# merge or patch the tls config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# ingress
|
||||||
|
############################################################
|
||||||
|
# service must be enabled also
|
||||||
|
ingress:
|
||||||
|
enabled: false
|
||||||
|
# must contain at least 1 host otherwise ingress will not be created
|
||||||
|
hosts: []
|
||||||
|
path: /
|
||||||
|
pathType: Exact
|
||||||
|
# sets to the ingress class name
|
||||||
|
className:
|
||||||
|
# set to an existing secret name to enable TLS on the ingress; applies to all hosts
|
||||||
|
tlsSecretName:
|
||||||
|
|
||||||
|
# merge or patch the ingress
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#ingress-v1-networking-k8s-io
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}-ws"
|
||||||
|
name:
|
||||||
|
|
||||||
|
# merge or patch the websocket config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/websocket/websocket_conf
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
mqtt:
|
||||||
|
enabled: false
|
||||||
|
port: 1883
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
# set secretName in order to mount an existing secret to dir
|
||||||
|
secretName:
|
||||||
|
dir: /etc/nats-certs/mqtt
|
||||||
|
cert: tls.crt
|
||||||
|
key: tls.key
|
||||||
|
# merge or patch the tls config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
# merge or patch the mqtt config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/mqtt/mqtt_config
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
gateway:
|
||||||
|
enabled: false
|
||||||
|
port: 7222
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
# set secretName in order to mount an existing secret to dir
|
||||||
|
secretName:
|
||||||
|
dir: /etc/nats-certs/gateway
|
||||||
|
cert: tls.crt
|
||||||
|
key: tls.key
|
||||||
|
# merge or patch the tls config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/tls
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
# merge or patch the gateway config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/gateways/gateway#gateway-configuration-block
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
monitor:
|
||||||
|
enabled: true
|
||||||
|
port: 8222
|
||||||
|
tls:
|
||||||
|
# config.nats.tls must be enabled also
|
||||||
|
# when enabled, monitoring port will use HTTPS with the options from config.nats.tls
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
profiling:
|
||||||
|
enabled: false
|
||||||
|
port: 65432
|
||||||
|
|
||||||
|
resolver:
|
||||||
|
enabled: false
|
||||||
|
dir: /data/resolver
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# stateful set -> volume claim templates -> resolver pvc
|
||||||
|
############################################################
|
||||||
|
pvc:
|
||||||
|
enabled: true
|
||||||
|
size: 1Gi
|
||||||
|
storageClassName:
|
||||||
|
|
||||||
|
# merge or patch the pvc
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#persistentvolumeclaim-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}-resolver"
|
||||||
|
name:
|
||||||
|
|
||||||
|
# merge or patch the resolver
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration/securing_nats/auth_intro/jwt/resolver
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
# adds a prefix to the server name, which defaults to the pod name
|
||||||
|
# helpful for ensuring server name is unique in a super cluster
|
||||||
|
serverNamePrefix: ""
|
||||||
|
|
||||||
|
# merge or patch the nats config
|
||||||
|
# https://docs.nats.io/running-a-nats-service/configuration
|
||||||
|
# following special rules apply
|
||||||
|
# 1. strings that start with << and end with >> will be unquoted
|
||||||
|
# use this for variables and numbers with units
|
||||||
|
# 2. keys ending in $include will be switched to include directives
|
||||||
|
# keys are sorted alphabetically, use prefix before $includes to control includes ordering
|
||||||
|
# paths should be relative to /etc/nats-config/nats.conf
|
||||||
|
# example:
|
||||||
|
#
|
||||||
|
# merge:
|
||||||
|
# $include: ./my-config.conf
|
||||||
|
# zzz$include: ./my-config-last.conf
|
||||||
|
# server_name: nats
|
||||||
|
# authorization:
|
||||||
|
# token: << $TOKEN >>
|
||||||
|
# jetstream:
|
||||||
|
# max_memory_store: << 1GB >>
|
||||||
|
#
|
||||||
|
# will yield the config:
|
||||||
|
# {
|
||||||
|
# include ./my-config.conf;
|
||||||
|
# "authorization": {
|
||||||
|
# "token": $TOKEN
|
||||||
|
# },
|
||||||
|
# "jetstream": {
|
||||||
|
# "max_memory_store": 1GB
|
||||||
|
# },
|
||||||
|
# "server_name": "nats",
|
||||||
|
# include ./my-config-last.conf;
|
||||||
|
# }
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# stateful set -> pod template -> nats container
|
||||||
|
############################################################
|
||||||
|
container:
|
||||||
|
image:
|
||||||
|
repository: nats
|
||||||
|
tag: 2.10.25-alpine
|
||||||
|
pullPolicy:
|
||||||
|
registry:
|
||||||
|
|
||||||
|
# container port options
|
||||||
|
# must be enabled in the config section also
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#containerport-v1-core
|
||||||
|
ports:
|
||||||
|
nats: {}
|
||||||
|
leafnodes: {}
|
||||||
|
websocket: {}
|
||||||
|
mqtt: {}
|
||||||
|
cluster: {}
|
||||||
|
gateway: {}
|
||||||
|
monitor: {}
|
||||||
|
profiling: {}
|
||||||
|
|
||||||
|
# map with key as env var name, value can be string or map
|
||||||
|
# example:
|
||||||
|
#
|
||||||
|
# env:
|
||||||
|
# GOMEMLIMIT: 7GiB
|
||||||
|
# TOKEN:
|
||||||
|
# valueFrom:
|
||||||
|
# secretKeyRef:
|
||||||
|
# name: nats-auth
|
||||||
|
# key: token
|
||||||
|
env: {}
|
||||||
|
|
||||||
|
# merge or patch the container
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# stateful set -> pod template -> reloader container
|
||||||
|
############################################################
|
||||||
|
reloader:
|
||||||
|
enabled: true
|
||||||
|
image:
|
||||||
|
repository: natsio/nats-server-config-reloader
|
||||||
|
tag: 0.16.1
|
||||||
|
pullPolicy:
|
||||||
|
registry:
|
||||||
|
|
||||||
|
# env var map, see nats.env for an example
|
||||||
|
env: {}
|
||||||
|
|
||||||
|
# all nats container volume mounts with the following prefixes
|
||||||
|
# will be mounted into the reloader container
|
||||||
|
natsVolumeMountPrefixes:
|
||||||
|
- /etc/
|
||||||
|
|
||||||
|
# merge or patch the container
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# stateful set -> pod template -> prom-exporter container
|
||||||
|
############################################################
|
||||||
|
# config.monitor must be enabled
|
||||||
|
promExporter:
|
||||||
|
enabled: false
|
||||||
|
image:
|
||||||
|
repository: natsio/prometheus-nats-exporter
|
||||||
|
tag: 0.16.0
|
||||||
|
pullPolicy:
|
||||||
|
registry:
|
||||||
|
|
||||||
|
port: 7777
|
||||||
|
# env var map, see nats.env for an example
|
||||||
|
env: {}
|
||||||
|
|
||||||
|
# merge or patch the container
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# prometheus pod monitor
|
||||||
|
############################################################
|
||||||
|
podMonitor:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
# merge or patch the pod monitor
|
||||||
|
# https://prometheus-operator.dev/docs/operator/api/#monitoring.coreos.com/v1.PodMonitor
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}"
|
||||||
|
name:
|
||||||
|
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# service
|
||||||
|
############################################################
|
||||||
|
service:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
# service port options
|
||||||
|
# additional boolean field enable to control whether port is exposed in the service
|
||||||
|
# must be enabled in the config section also
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#serviceport-v1-core
|
||||||
|
ports:
|
||||||
|
nats:
|
||||||
|
enabled: true
|
||||||
|
leafnodes:
|
||||||
|
enabled: true
|
||||||
|
websocket:
|
||||||
|
enabled: true
|
||||||
|
mqtt:
|
||||||
|
enabled: true
|
||||||
|
cluster:
|
||||||
|
enabled: false
|
||||||
|
gateway:
|
||||||
|
enabled: false
|
||||||
|
monitor:
|
||||||
|
enabled: false
|
||||||
|
profiling:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
# merge or patch the service
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#service-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}"
|
||||||
|
name:
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# other nats extension points
|
||||||
|
############################################################
|
||||||
|
|
||||||
|
# stateful set
|
||||||
|
statefulSet:
|
||||||
|
# merge or patch the stateful set
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#statefulset-v1-apps
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}"
|
||||||
|
name:
|
||||||
|
|
||||||
|
# stateful set -> pod template
|
||||||
|
podTemplate:
|
||||||
|
# adds a hash of the ConfigMap as a pod annotation
|
||||||
|
# this will cause the StatefulSet to roll when the ConfigMap is updated
|
||||||
|
configChecksumAnnotation: true
|
||||||
|
|
||||||
|
# map of topologyKey: topologySpreadConstraint
|
||||||
|
# labelSelector will be added to match StatefulSet pods
|
||||||
|
#
|
||||||
|
# topologySpreadConstraints:
|
||||||
|
# kubernetes.io/hostname:
|
||||||
|
# maxSkew: 1
|
||||||
|
#
|
||||||
|
topologySpreadConstraints: {}
|
||||||
|
|
||||||
|
# merge or patch the pod template
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#pod-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
# headless service
|
||||||
|
headlessService:
|
||||||
|
# merge or patch the headless service
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#service-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}-headless"
|
||||||
|
name:
|
||||||
|
|
||||||
|
# config map
|
||||||
|
configMap:
|
||||||
|
# merge or patch the config map
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#configmap-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}-config"
|
||||||
|
name:
|
||||||
|
|
||||||
|
# pod disruption budget
|
||||||
|
podDisruptionBudget:
|
||||||
|
enabled: true
|
||||||
|
# merge or patch the pod disruption budget
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#poddisruptionbudget-v1-policy
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}"
|
||||||
|
name:
|
||||||
|
|
||||||
|
# service account
|
||||||
|
serviceAccount:
|
||||||
|
enabled: false
|
||||||
|
# merge or patch the service account
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#serviceaccount-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}"
|
||||||
|
name:
|
||||||
|
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# natsBox
|
||||||
|
#
|
||||||
|
# NATS Box Deployment and associated resources
|
||||||
|
############################################################
|
||||||
|
natsBox:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# NATS contexts
|
||||||
|
############################################################
|
||||||
|
contexts:
|
||||||
|
default:
|
||||||
|
creds:
|
||||||
|
# set contents in order to create a secret with the creds file contents
|
||||||
|
contents:
|
||||||
|
# set secretName in order to mount an existing secret to dir
|
||||||
|
secretName:
|
||||||
|
# defaults to /etc/nats-creds/<context-name>
|
||||||
|
dir:
|
||||||
|
key: nats.creds
|
||||||
|
nkey:
|
||||||
|
# set contents in order to create a secret with the nkey file contents
|
||||||
|
contents:
|
||||||
|
# set secretName in order to mount an existing secret to dir
|
||||||
|
secretName:
|
||||||
|
# defaults to /etc/nats-nkeys/<context-name>
|
||||||
|
dir:
|
||||||
|
key: nats.nk
|
||||||
|
# used to connect with client certificates
|
||||||
|
tls:
|
||||||
|
# set secretName in order to mount an existing secret to dir
|
||||||
|
secretName:
|
||||||
|
# defaults to /etc/nats-certs/<context-name>
|
||||||
|
dir:
|
||||||
|
cert: tls.crt
|
||||||
|
key: tls.key
|
||||||
|
|
||||||
|
# merge or patch the context
|
||||||
|
# https://docs.nats.io/using-nats/nats-tools/nats_cli#nats-contexts
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
# name of context to select by default
|
||||||
|
defaultContextName: default
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# deployment -> pod template -> nats-box container
|
||||||
|
############################################################
|
||||||
|
container:
|
||||||
|
image:
|
||||||
|
repository: natsio/nats-box
|
||||||
|
tag: 0.16.0
|
||||||
|
pullPolicy:
|
||||||
|
registry:
|
||||||
|
|
||||||
|
# env var map, see nats.env for an example
|
||||||
|
env: {}
|
||||||
|
|
||||||
|
# merge or patch the container
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#container-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
############################################################
|
||||||
|
# other nats-box extension points
|
||||||
|
############################################################
|
||||||
|
|
||||||
|
# deployment
|
||||||
|
deployment:
|
||||||
|
# merge or patch the deployment
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#deployment-v1-apps
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}-box"
|
||||||
|
name:
|
||||||
|
|
||||||
|
# deployment -> pod template
|
||||||
|
podTemplate:
|
||||||
|
# merge or patch the pod template
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#pod-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
|
||||||
|
# contexts secret
|
||||||
|
contextsSecret:
|
||||||
|
# merge or patch the context secret
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#secret-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}-box-contexts"
|
||||||
|
name:
|
||||||
|
|
||||||
|
# contents secret
|
||||||
|
contentsSecret:
|
||||||
|
# merge or patch the contents secret
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#secret-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}-box-contents"
|
||||||
|
name:
|
||||||
|
|
||||||
|
# service account
|
||||||
|
serviceAccount:
|
||||||
|
enabled: false
|
||||||
|
# merge or patch the service account
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#serviceaccount-v1-core
|
||||||
|
merge: {}
|
||||||
|
patch: []
|
||||||
|
# defaults to "{{ include "nats.fullname" $ }}-box"
|
||||||
|
name:
|
||||||
|
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
# Extra user-defined resources
|
||||||
|
################################################################################
|
||||||
|
#
|
||||||
|
# add arbitrary user-generated resources
|
||||||
|
# example:
|
||||||
|
#
|
||||||
|
# config:
|
||||||
|
# websocket:
|
||||||
|
# enabled: true
|
||||||
|
# extraResources:
|
||||||
|
# - apiVersion: networking.istio.io/v1beta1
|
||||||
|
# kind: VirtualService
|
||||||
|
# metadata:
|
||||||
|
# name:
|
||||||
|
# $tplYaml: >
|
||||||
|
# {{ include "nats.fullname" $ | quote }}
|
||||||
|
# labels:
|
||||||
|
# $tplYaml: |
|
||||||
|
# {{ include "nats.labels" $ }}
|
||||||
|
# spec:
|
||||||
|
# hosts:
|
||||||
|
# - demo.nats.io
|
||||||
|
# gateways:
|
||||||
|
# - my-gateway
|
||||||
|
# http:
|
||||||
|
# - name: default
|
||||||
|
# match:
|
||||||
|
# - name: root
|
||||||
|
# uri:
|
||||||
|
# exact: /
|
||||||
|
# route:
|
||||||
|
# - destination:
|
||||||
|
# host:
|
||||||
|
# $tplYaml: >
|
||||||
|
# {{ .Values.service.name | quote }}
|
||||||
|
# port:
|
||||||
|
# number:
|
||||||
|
# $tplYaml: >
|
||||||
|
# {{ .Values.config.websocket.port }}
|
||||||
|
#
|
||||||
|
extraResources: []
|
|
@ -1,7 +1,6 @@
|
||||||
annotations:
|
annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: NATS Server
|
catalog.cattle.io/display-name: NATS Server
|
||||||
catalog.cattle.io/featured: "5"
|
|
||||||
catalog.cattle.io/kube-version: '>=1.16-0'
|
catalog.cattle.io/kube-version: '>=1.16-0'
|
||||||
catalog.cattle.io/release-name: nats
|
catalog.cattle.io/release-name: nats
|
||||||
apiVersion: v2
|
apiVersion: v2
|
||||||
|
|
|
@ -0,0 +1,23 @@
|
||||||
|
# Patterns to ignore when building packages.
|
||||||
|
# This supports shell glob matching, relative path matching, and
|
||||||
|
# negation (prefixed with !). Only one pattern per line.
|
||||||
|
.DS_Store
|
||||||
|
# Common VCS dirs
|
||||||
|
.git/
|
||||||
|
.gitignore
|
||||||
|
.bzr/
|
||||||
|
.bzrignore
|
||||||
|
.hg/
|
||||||
|
.hgignore
|
||||||
|
.svn/
|
||||||
|
# Common backup files
|
||||||
|
*.swp
|
||||||
|
*.bak
|
||||||
|
*.tmp
|
||||||
|
*.orig
|
||||||
|
*~
|
||||||
|
# Various IDEs
|
||||||
|
.project
|
||||||
|
.idea/
|
||||||
|
*.tmproj
|
||||||
|
.vscode/
|
|
@ -0,0 +1,27 @@
|
||||||
|
annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: Speedscale Operator
|
||||||
|
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
||||||
|
catalog.cattle.io/release-name: speedscale-operator
|
||||||
|
apiVersion: v1
|
||||||
|
appVersion: 2.3.149
|
||||||
|
description: Stress test your APIs with real world scenarios. Collect and replay
|
||||||
|
traffic without scripting.
|
||||||
|
home: https://speedscale.com
|
||||||
|
icon: file://assets/icons/speedscale-operator.png
|
||||||
|
keywords:
|
||||||
|
- speedscale
|
||||||
|
- test
|
||||||
|
- testing
|
||||||
|
- regression
|
||||||
|
- reliability
|
||||||
|
- load
|
||||||
|
- replay
|
||||||
|
- network
|
||||||
|
- traffic
|
||||||
|
kubeVersion: '>= 1.17.0-0'
|
||||||
|
maintainers:
|
||||||
|
- email: support@speedscale.com
|
||||||
|
name: Speedscale Support
|
||||||
|
name: speedscale-operator
|
||||||
|
version: 2.3.149
|
|
@ -0,0 +1,201 @@
|
||||||
|
Apache License
|
||||||
|
Version 2.0, January 2004
|
||||||
|
http://www.apache.org/licenses/
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||||
|
|
||||||
|
1. Definitions.
|
||||||
|
|
||||||
|
"License" shall mean the terms and conditions for use, reproduction,
|
||||||
|
and distribution as defined by Sections 1 through 9 of this document.
|
||||||
|
|
||||||
|
"Licensor" shall mean the copyright owner or entity authorized by
|
||||||
|
the copyright owner that is granting the License.
|
||||||
|
|
||||||
|
"Legal Entity" shall mean the union of the acting entity and all
|
||||||
|
other entities that control, are controlled by, or are under common
|
||||||
|
control with that entity. For the purposes of this definition,
|
||||||
|
"control" means (i) the power, direct or indirect, to cause the
|
||||||
|
direction or management of such entity, whether by contract or
|
||||||
|
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
||||||
|
outstanding shares, or (iii) beneficial ownership of such entity.
|
||||||
|
|
||||||
|
"You" (or "Your") shall mean an individual or Legal Entity
|
||||||
|
exercising permissions granted by this License.
|
||||||
|
|
||||||
|
"Source" form shall mean the preferred form for making modifications,
|
||||||
|
including but not limited to software source code, documentation
|
||||||
|
source, and configuration files.
|
||||||
|
|
||||||
|
"Object" form shall mean any form resulting from mechanical
|
||||||
|
transformation or translation of a Source form, including but
|
||||||
|
not limited to compiled object code, generated documentation,
|
||||||
|
and conversions to other media types.
|
||||||
|
|
||||||
|
"Work" shall mean the work of authorship, whether in Source or
|
||||||
|
Object form, made available under the License, as indicated by a
|
||||||
|
copyright notice that is included in or attached to the work
|
||||||
|
(an example is provided in the Appendix below).
|
||||||
|
|
||||||
|
"Derivative Works" shall mean any work, whether in Source or Object
|
||||||
|
form, that is based on (or derived from) the Work and for which the
|
||||||
|
editorial revisions, annotations, elaborations, or other modifications
|
||||||
|
represent, as a whole, an original work of authorship. For the purposes
|
||||||
|
of this License, Derivative Works shall not include works that remain
|
||||||
|
separable from, or merely link (or bind by name) to the interfaces of,
|
||||||
|
the Work and Derivative Works thereof.
|
||||||
|
|
||||||
|
"Contribution" shall mean any work of authorship, including
|
||||||
|
the original version of the Work and any modifications or additions
|
||||||
|
to that Work or Derivative Works thereof, that is intentionally
|
||||||
|
submitted to Licensor for inclusion in the Work by the copyright owner
|
||||||
|
or by an individual or Legal Entity authorized to submit on behalf of
|
||||||
|
the copyright owner. For the purposes of this definition, "submitted"
|
||||||
|
means any form of electronic, verbal, or written communication sent
|
||||||
|
to the Licensor or its representatives, including but not limited to
|
||||||
|
communication on electronic mailing lists, source code control systems,
|
||||||
|
and issue tracking systems that are managed by, or on behalf of, the
|
||||||
|
Licensor for the purpose of discussing and improving the Work, but
|
||||||
|
excluding communication that is conspicuously marked or otherwise
|
||||||
|
designated in writing by the copyright owner as "Not a Contribution."
|
||||||
|
|
||||||
|
"Contributor" shall mean Licensor and any individual or Legal Entity
|
||||||
|
on behalf of whom a Contribution has been received by Licensor and
|
||||||
|
subsequently incorporated within the Work.
|
||||||
|
|
||||||
|
2. Grant of Copyright License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
copyright license to reproduce, prepare Derivative Works of,
|
||||||
|
publicly display, publicly perform, sublicense, and distribute the
|
||||||
|
Work and such Derivative Works in Source or Object form.
|
||||||
|
|
||||||
|
3. Grant of Patent License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
(except as stated in this section) patent license to make, have made,
|
||||||
|
use, offer to sell, sell, import, and otherwise transfer the Work,
|
||||||
|
where such license applies only to those patent claims licensable
|
||||||
|
by such Contributor that are necessarily infringed by their
|
||||||
|
Contribution(s) alone or by combination of their Contribution(s)
|
||||||
|
with the Work to which such Contribution(s) was submitted. If You
|
||||||
|
institute patent litigation against any entity (including a
|
||||||
|
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
||||||
|
or a Contribution incorporated within the Work constitutes direct
|
||||||
|
or contributory patent infringement, then any patent licenses
|
||||||
|
granted to You under this License for that Work shall terminate
|
||||||
|
as of the date such litigation is filed.
|
||||||
|
|
||||||
|
4. Redistribution. You may reproduce and distribute copies of the
|
||||||
|
Work or Derivative Works thereof in any medium, with or without
|
||||||
|
modifications, and in Source or Object form, provided that You
|
||||||
|
meet the following conditions:
|
||||||
|
|
||||||
|
(a) You must give any other recipients of the Work or
|
||||||
|
Derivative Works a copy of this License; and
|
||||||
|
|
||||||
|
(b) You must cause any modified files to carry prominent notices
|
||||||
|
stating that You changed the files; and
|
||||||
|
|
||||||
|
(c) You must retain, in the Source form of any Derivative Works
|
||||||
|
that You distribute, all copyright, patent, trademark, and
|
||||||
|
attribution notices from the Source form of the Work,
|
||||||
|
excluding those notices that do not pertain to any part of
|
||||||
|
the Derivative Works; and
|
||||||
|
|
||||||
|
(d) If the Work includes a "NOTICE" text file as part of its
|
||||||
|
distribution, then any Derivative Works that You distribute must
|
||||||
|
include a readable copy of the attribution notices contained
|
||||||
|
within such NOTICE file, excluding those notices that do not
|
||||||
|
pertain to any part of the Derivative Works, in at least one
|
||||||
|
of the following places: within a NOTICE text file distributed
|
||||||
|
as part of the Derivative Works; within the Source form or
|
||||||
|
documentation, if provided along with the Derivative Works; or,
|
||||||
|
within a display generated by the Derivative Works, if and
|
||||||
|
wherever such third-party notices normally appear. The contents
|
||||||
|
of the NOTICE file are for informational purposes only and
|
||||||
|
do not modify the License. You may add Your own attribution
|
||||||
|
notices within Derivative Works that You distribute, alongside
|
||||||
|
or as an addendum to the NOTICE text from the Work, provided
|
||||||
|
that such additional attribution notices cannot be construed
|
||||||
|
as modifying the License.
|
||||||
|
|
||||||
|
You may add Your own copyright statement to Your modifications and
|
||||||
|
may provide additional or different license terms and conditions
|
||||||
|
for use, reproduction, or distribution of Your modifications, or
|
||||||
|
for any such Derivative Works as a whole, provided Your use,
|
||||||
|
reproduction, and distribution of the Work otherwise complies with
|
||||||
|
the conditions stated in this License.
|
||||||
|
|
||||||
|
5. Submission of Contributions. Unless You explicitly state otherwise,
|
||||||
|
any Contribution intentionally submitted for inclusion in the Work
|
||||||
|
by You to the Licensor shall be under the terms and conditions of
|
||||||
|
this License, without any additional terms or conditions.
|
||||||
|
Notwithstanding the above, nothing herein shall supersede or modify
|
||||||
|
the terms of any separate license agreement you may have executed
|
||||||
|
with Licensor regarding such Contributions.
|
||||||
|
|
||||||
|
6. Trademarks. This License does not grant permission to use the trade
|
||||||
|
names, trademarks, service marks, or product names of the Licensor,
|
||||||
|
except as required for reasonable and customary use in describing the
|
||||||
|
origin of the Work and reproducing the content of the NOTICE file.
|
||||||
|
|
||||||
|
7. Disclaimer of Warranty. Unless required by applicable law or
|
||||||
|
agreed to in writing, Licensor provides the Work (and each
|
||||||
|
Contributor provides its Contributions) on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
||||||
|
implied, including, without limitation, any warranties or conditions
|
||||||
|
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
||||||
|
PARTICULAR PURPOSE. You are solely responsible for determining the
|
||||||
|
appropriateness of using or redistributing the Work and assume any
|
||||||
|
risks associated with Your exercise of permissions under this License.
|
||||||
|
|
||||||
|
8. Limitation of Liability. In no event and under no legal theory,
|
||||||
|
whether in tort (including negligence), contract, or otherwise,
|
||||||
|
unless required by applicable law (such as deliberate and grossly
|
||||||
|
negligent acts) or agreed to in writing, shall any Contributor be
|
||||||
|
liable to You for damages, including any direct, indirect, special,
|
||||||
|
incidental, or consequential damages of any character arising as a
|
||||||
|
result of this License or out of the use or inability to use the
|
||||||
|
Work (including but not limited to damages for loss of goodwill,
|
||||||
|
work stoppage, computer failure or malfunction, or any and all
|
||||||
|
other commercial damages or losses), even if such Contributor
|
||||||
|
has been advised of the possibility of such damages.
|
||||||
|
|
||||||
|
9. Accepting Warranty or Additional Liability. While redistributing
|
||||||
|
the Work or Derivative Works thereof, You may choose to offer,
|
||||||
|
and charge a fee for, acceptance of support, warranty, indemnity,
|
||||||
|
or other liability obligations and/or rights consistent with this
|
||||||
|
License. However, in accepting such obligations, You may act only
|
||||||
|
on Your own behalf and on Your sole responsibility, not on behalf
|
||||||
|
of any other Contributor, and only if You agree to indemnify,
|
||||||
|
defend, and hold each Contributor harmless for any liability
|
||||||
|
incurred by, or claims asserted against, such Contributor by reason
|
||||||
|
of your accepting any such warranty or additional liability.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
APPENDIX: How to apply the Apache License to your work.
|
||||||
|
|
||||||
|
To apply the Apache License to your work, attach the following
|
||||||
|
boilerplate notice, with the fields enclosed by brackets "[]"
|
||||||
|
replaced with your own identifying information. (Don't include
|
||||||
|
the brackets!) The text should be enclosed in the appropriate
|
||||||
|
comment syntax for the file format. We also recommend that a
|
||||||
|
file or class name and description of purpose be included on the
|
||||||
|
same "printed page" as the copyright notice for easier
|
||||||
|
identification within third-party archives.
|
||||||
|
|
||||||
|
Copyright 2021 Speedscale
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
|
@ -0,0 +1,111 @@
|
||||||
|
![GitHub Tag](https://img.shields.io/github/v/tag/speedscale/operator-helm)
|
||||||
|
|
||||||
|
|
||||||
|
# Speedscale Operator
|
||||||
|
|
||||||
|
The [Speedscale](https://www.speedscale.com) Operator is a [Kubernetes operator](https://kubernetes.io/docs/concepts/extend-kubernetes/operator/)
|
||||||
|
that watches for deployments to be applied to the cluster and takes action based on annotations. The operator
|
||||||
|
can inject a proxy to capture traffic into or out of applications, or setup an isolation test environment around
|
||||||
|
a deployment for testing. The operator itself is a deployment that will be always present on the cluster once
|
||||||
|
the helm chart is installed.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
- Kubernetes 1.20+
|
||||||
|
- Helm 3+
|
||||||
|
- Appropriate [network and firewall configuration](https://docs.speedscale.com/reference/networking) for Speedscale cloud and webhook traffic
|
||||||
|
|
||||||
|
## Get Repo Info
|
||||||
|
|
||||||
|
```bash
|
||||||
|
helm repo add speedscale https://speedscale.github.io/operator-helm/
|
||||||
|
helm repo update
|
||||||
|
```
|
||||||
|
|
||||||
|
_See [helm repo](https://helm.sh/docs/helm/helm_repo/) for command documentation._
|
||||||
|
|
||||||
|
## Install Chart
|
||||||
|
|
||||||
|
An API key is required. Sign up for a [free Speedscale trial](https://speedscale.com/free-trial/) if you do not have one.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
helm install speedscale-operator speedscale/speedscale-operator \
|
||||||
|
-n speedscale \
|
||||||
|
--create-namespace \
|
||||||
|
--set apiKey=<YOUR-SPEEDSCALE-API-KEY> \
|
||||||
|
--set clusterName=<YOUR-CLUSTER-NAME>
|
||||||
|
```
|
||||||
|
|
||||||
|
_See [helm install](https://helm.sh/docs/helm/helm_install/) for command documentation._
|
||||||
|
|
||||||
|
### Pre-install job failure
|
||||||
|
|
||||||
|
We use pre-install job to check provided API key and provision some of the required resources.
|
||||||
|
|
||||||
|
If the job failed during the installation, you'll see the following error during install:
|
||||||
|
|
||||||
|
```
|
||||||
|
Error: INSTALLATION FAILED: failed pre-install: job failed: BackoffLimitExceeded
|
||||||
|
```
|
||||||
|
|
||||||
|
You can inspect the logs using this command:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
kubectl -n speedscale logs job/speedscale-operator-pre-install
|
||||||
|
```
|
||||||
|
|
||||||
|
After fixing the error, uninstall the helm release, delete the failed job
|
||||||
|
and try installing again:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
helm -n speedscale uninstall speedscale-operator
|
||||||
|
kubectl -n speedscale delete job speedscale-operator-pre-install
|
||||||
|
```
|
||||||
|
|
||||||
|
## Uninstall Chart
|
||||||
|
|
||||||
|
```bash
|
||||||
|
helm -n speedscale uninstall speedscale-operator
|
||||||
|
```
|
||||||
|
|
||||||
|
This removes all the Kubernetes components associated with the chart and deletes the release.
|
||||||
|
|
||||||
|
_See [helm uninstall](https://helm.sh/docs/helm/helm_uninstall/) for command documentation._
|
||||||
|
|
||||||
|
CRDs created by this chart are not removed by default and should be manually cleaned up:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
kubectl delete crd trafficreplays.speedscale.com
|
||||||
|
```
|
||||||
|
|
||||||
|
## Upgrading Chart
|
||||||
|
|
||||||
|
```bash
|
||||||
|
helm repo update
|
||||||
|
helm -n speedscale upgrade speedscale-operator speedscale/speedscale-operator
|
||||||
|
```
|
||||||
|
|
||||||
|
Resources capturing traffic will need to be rolled to pick up the latest
|
||||||
|
Speedscale sidecar. Use the rollout restart command for each namespace and
|
||||||
|
resource type:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
kubectl -n <namespace> rollout restart deployment
|
||||||
|
```
|
||||||
|
|
||||||
|
With Helm v3, CRDs created by this chart are not updated by default
|
||||||
|
and should be manually updated.
|
||||||
|
Consult also the [Helm Documentation on CRDs](https://helm.sh/docs/chart_best_practices/custom_resource_definitions).
|
||||||
|
|
||||||
|
_See [helm upgrade](https://helm.sh/docs/helm/helm_upgrade/) for command documentation._
|
||||||
|
|
||||||
|
### Upgrading an existing Release to a new version
|
||||||
|
|
||||||
|
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
||||||
|
incompatible breaking change needing manual actions.
|
||||||
|
|
||||||
|
|
||||||
|
## Help
|
||||||
|
|
||||||
|
Speedscale docs information available at [docs.speedscale.com](https://docs.speedscale.com) or join us
|
||||||
|
on the [Speedscale community Slack](https://join.slack.com/t/speedscalecommunity/shared_invite/zt-x5rcrzn4-XHG1QqcHNXIM~4yozRrz8A)!
|
|
@ -0,0 +1,111 @@
|
||||||
|
![GitHub Tag](https://img.shields.io/github/v/tag/speedscale/operator-helm)
|
||||||
|
|
||||||
|
|
||||||
|
# Speedscale Operator
|
||||||
|
|
||||||
|
The [Speedscale](https://www.speedscale.com) Operator is a [Kubernetes operator](https://kubernetes.io/docs/concepts/extend-kubernetes/operator/)
|
||||||
|
that watches for deployments to be applied to the cluster and takes action based on annotations. The operator
|
||||||
|
can inject a proxy to capture traffic into or out of applications, or setup an isolation test environment around
|
||||||
|
a deployment for testing. The operator itself is a deployment that will be always present on the cluster once
|
||||||
|
the helm chart is installed.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
- Kubernetes 1.20+
|
||||||
|
- Helm 3+
|
||||||
|
- Appropriate [network and firewall configuration](https://docs.speedscale.com/reference/networking) for Speedscale cloud and webhook traffic
|
||||||
|
|
||||||
|
## Get Repo Info
|
||||||
|
|
||||||
|
```bash
|
||||||
|
helm repo add speedscale https://speedscale.github.io/operator-helm/
|
||||||
|
helm repo update
|
||||||
|
```
|
||||||
|
|
||||||
|
_See [helm repo](https://helm.sh/docs/helm/helm_repo/) for command documentation._
|
||||||
|
|
||||||
|
## Install Chart
|
||||||
|
|
||||||
|
An API key is required. Sign up for a [free Speedscale trial](https://speedscale.com/free-trial/) if you do not have one.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
helm install speedscale-operator speedscale/speedscale-operator \
|
||||||
|
-n speedscale \
|
||||||
|
--create-namespace \
|
||||||
|
--set apiKey=<YOUR-SPEEDSCALE-API-KEY> \
|
||||||
|
--set clusterName=<YOUR-CLUSTER-NAME>
|
||||||
|
```
|
||||||
|
|
||||||
|
_See [helm install](https://helm.sh/docs/helm/helm_install/) for command documentation._
|
||||||
|
|
||||||
|
### Pre-install job failure
|
||||||
|
|
||||||
|
We use pre-install job to check provided API key and provision some of the required resources.
|
||||||
|
|
||||||
|
If the job failed during the installation, you'll see the following error during install:
|
||||||
|
|
||||||
|
```
|
||||||
|
Error: INSTALLATION FAILED: failed pre-install: job failed: BackoffLimitExceeded
|
||||||
|
```
|
||||||
|
|
||||||
|
You can inspect the logs using this command:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
kubectl -n speedscale logs job/speedscale-operator-pre-install
|
||||||
|
```
|
||||||
|
|
||||||
|
After fixing the error, uninstall the helm release, delete the failed job
|
||||||
|
and try installing again:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
helm -n speedscale uninstall speedscale-operator
|
||||||
|
kubectl -n speedscale delete job speedscale-operator-pre-install
|
||||||
|
```
|
||||||
|
|
||||||
|
## Uninstall Chart
|
||||||
|
|
||||||
|
```bash
|
||||||
|
helm -n speedscale uninstall speedscale-operator
|
||||||
|
```
|
||||||
|
|
||||||
|
This removes all the Kubernetes components associated with the chart and deletes the release.
|
||||||
|
|
||||||
|
_See [helm uninstall](https://helm.sh/docs/helm/helm_uninstall/) for command documentation._
|
||||||
|
|
||||||
|
CRDs created by this chart are not removed by default and should be manually cleaned up:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
kubectl delete crd trafficreplays.speedscale.com
|
||||||
|
```
|
||||||
|
|
||||||
|
## Upgrading Chart
|
||||||
|
|
||||||
|
```bash
|
||||||
|
helm repo update
|
||||||
|
helm -n speedscale upgrade speedscale-operator speedscale/speedscale-operator
|
||||||
|
```
|
||||||
|
|
||||||
|
Resources capturing traffic will need to be rolled to pick up the latest
|
||||||
|
Speedscale sidecar. Use the rollout restart command for each namespace and
|
||||||
|
resource type:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
kubectl -n <namespace> rollout restart deployment
|
||||||
|
```
|
||||||
|
|
||||||
|
With Helm v3, CRDs created by this chart are not updated by default
|
||||||
|
and should be manually updated.
|
||||||
|
Consult also the [Helm Documentation on CRDs](https://helm.sh/docs/chart_best_practices/custom_resource_definitions).
|
||||||
|
|
||||||
|
_See [helm upgrade](https://helm.sh/docs/helm/helm_upgrade/) for command documentation._
|
||||||
|
|
||||||
|
### Upgrading an existing Release to a new version
|
||||||
|
|
||||||
|
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
||||||
|
incompatible breaking change needing manual actions.
|
||||||
|
|
||||||
|
|
||||||
|
## Help
|
||||||
|
|
||||||
|
Speedscale docs information available at [docs.speedscale.com](https://docs.speedscale.com) or join us
|
||||||
|
on the [Speedscale community Slack](https://join.slack.com/t/speedscalecommunity/shared_invite/zt-x5rcrzn4-XHG1QqcHNXIM~4yozRrz8A)!
|
|
@ -0,0 +1,9 @@
|
||||||
|
questions:
|
||||||
|
- variable: apiKey
|
||||||
|
default: "fffffffffffffffffffffffffffffffffffffffffffff"
|
||||||
|
description: "An API key is required to connect to the Speedscale cloud."
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
label: API Key
|
||||||
|
group: Authentication
|
||||||
|
|
|
@ -0,0 +1,12 @@
|
||||||
|
Thank you for installing the Speedscale Operator!
|
||||||
|
|
||||||
|
Next you'll need to add the Speedscale Proxy Sidecar to your deployments.
|
||||||
|
See https://docs.speedscale.com/setup/sidecar/install/
|
||||||
|
|
||||||
|
If upgrading use the rollout restart command for each namespace and resource
|
||||||
|
type to ensure Speedscale sidecars are updated:
|
||||||
|
|
||||||
|
kubectl -n <namespace> rollout restart deployment
|
||||||
|
|
||||||
|
Once your deployment is running the sidecar your service will show up on
|
||||||
|
https://app.speedscale.com/.
|
|
@ -0,0 +1,209 @@
|
||||||
|
{{- $cacrt := "" -}}
|
||||||
|
{{- $crt := "" -}}
|
||||||
|
{{- $key := "" -}}
|
||||||
|
{{- $s := (lookup "v1" "Secret" .Release.Namespace "speedscale-webhook-certs") -}}
|
||||||
|
{{- if $s -}}
|
||||||
|
{{- $cacrt = index $s.data "ca.crt" | default (index $s.data "tls.crt") | b64dec -}}
|
||||||
|
{{- $crt = index $s.data "tls.crt" | b64dec -}}
|
||||||
|
{{- $key = index $s.data "tls.key" | b64dec -}}
|
||||||
|
{{ else }}
|
||||||
|
{{- $altNames := list ( printf "speedscale-operator.%s" .Release.Namespace ) ( printf "speedscale-operator.%s.svc" .Release.Namespace ) -}}
|
||||||
|
{{- $ca := genCA "speedscale-operator" 3650 -}}
|
||||||
|
{{- $cert := genSignedCert "speedscale-operator" nil $altNames 3650 $ca -}}
|
||||||
|
{{- $cacrt = $ca.Cert -}}
|
||||||
|
{{- $crt = $cert.Cert -}}
|
||||||
|
{{- $key = $cert.Key -}}
|
||||||
|
{{- end -}}
|
||||||
|
---
|
||||||
|
apiVersion: admissionregistration.k8s.io/v1
|
||||||
|
kind: MutatingWebhookConfiguration
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: speedscale-operator
|
||||||
|
annotations:
|
||||||
|
argocd.argoproj.io/hook: PreSync
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
webhooks:
|
||||||
|
- admissionReviewVersions:
|
||||||
|
- v1
|
||||||
|
clientConfig:
|
||||||
|
caBundle: {{ $cacrt | b64enc }}
|
||||||
|
service:
|
||||||
|
name: speedscale-operator
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
path: /mutate
|
||||||
|
failurePolicy: Ignore
|
||||||
|
name: sidecar.speedscale.com
|
||||||
|
namespaceSelector:
|
||||||
|
matchExpressions:
|
||||||
|
- key: kubernetes.io/metadata.name
|
||||||
|
operator: "NotIn"
|
||||||
|
values:
|
||||||
|
- kube-system
|
||||||
|
- kube-node-lease
|
||||||
|
{{- if .Values.namespaceSelector }}
|
||||||
|
- key: kubernetes.io/metadata.name
|
||||||
|
operator: "In"
|
||||||
|
values:
|
||||||
|
{{- range .Values.namespaceSelector }}
|
||||||
|
- {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
reinvocationPolicy: IfNeeded
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- apps
|
||||||
|
- batch
|
||||||
|
apiVersions:
|
||||||
|
- v1
|
||||||
|
operations:
|
||||||
|
- CREATE
|
||||||
|
- UPDATE
|
||||||
|
- DELETE
|
||||||
|
resources:
|
||||||
|
- deployments
|
||||||
|
- statefulsets
|
||||||
|
- daemonsets
|
||||||
|
- jobs
|
||||||
|
- replicasets
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
apiVersions:
|
||||||
|
- v1
|
||||||
|
operations:
|
||||||
|
- CREATE
|
||||||
|
- UPDATE
|
||||||
|
- DELETE
|
||||||
|
resources:
|
||||||
|
- pods
|
||||||
|
- apiGroups:
|
||||||
|
- argoproj.io
|
||||||
|
apiVersions:
|
||||||
|
- "*"
|
||||||
|
operations:
|
||||||
|
- CREATE
|
||||||
|
- UPDATE
|
||||||
|
- DELETE
|
||||||
|
resources:
|
||||||
|
- rollouts
|
||||||
|
sideEffects: None
|
||||||
|
timeoutSeconds: 10
|
||||||
|
---
|
||||||
|
apiVersion: admissionregistration.k8s.io/v1
|
||||||
|
kind: MutatingWebhookConfiguration
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: speedscale-operator-replay
|
||||||
|
annotations:
|
||||||
|
argocd.argoproj.io/hook: PreSync
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
webhooks:
|
||||||
|
- admissionReviewVersions:
|
||||||
|
- v1
|
||||||
|
clientConfig:
|
||||||
|
caBundle: {{ $cacrt | b64enc }}
|
||||||
|
service:
|
||||||
|
name: speedscale-operator
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
path: /mutate-speedscale-com-v1-trafficreplay
|
||||||
|
failurePolicy: Fail
|
||||||
|
name: replay.speedscale.com
|
||||||
|
namespaceSelector:
|
||||||
|
matchExpressions:
|
||||||
|
- key: kubernetes.io/metadata.name
|
||||||
|
operator: "NotIn"
|
||||||
|
values:
|
||||||
|
- kube-system
|
||||||
|
- kube-node-lease
|
||||||
|
{{- if .Values.namespaceSelector }}
|
||||||
|
- key: kubernetes.io/metadata.name
|
||||||
|
operator: "In"
|
||||||
|
values:
|
||||||
|
{{- range .Values.namespaceSelector }}
|
||||||
|
- {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- speedscale.com
|
||||||
|
apiVersions:
|
||||||
|
- v1
|
||||||
|
operations:
|
||||||
|
- CREATE
|
||||||
|
- UPDATE
|
||||||
|
resources:
|
||||||
|
- trafficreplays
|
||||||
|
sideEffects: None
|
||||||
|
timeoutSeconds: 10
|
||||||
|
---
|
||||||
|
apiVersion: admissionregistration.k8s.io/v1
|
||||||
|
kind: ValidatingWebhookConfiguration
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: speedscale-operator-replay
|
||||||
|
annotations:
|
||||||
|
argocd.argoproj.io/hook: PreSync
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
webhooks:
|
||||||
|
- admissionReviewVersions:
|
||||||
|
- v1
|
||||||
|
clientConfig:
|
||||||
|
caBundle: {{ $cacrt | b64enc }}
|
||||||
|
service:
|
||||||
|
name: speedscale-operator
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
path: /validate-speedscale-com-v1-trafficreplay
|
||||||
|
failurePolicy: Fail
|
||||||
|
name: replay.speedscale.com
|
||||||
|
namespaceSelector:
|
||||||
|
matchExpressions:
|
||||||
|
- key: kubernetes.io/metadata.name
|
||||||
|
operator: "NotIn"
|
||||||
|
values:
|
||||||
|
- kube-system
|
||||||
|
- kube-node-lease
|
||||||
|
{{- if .Values.namespaceSelector }}
|
||||||
|
- key: kubernetes.io/metadata.name
|
||||||
|
operator: "In"
|
||||||
|
values:
|
||||||
|
{{- range .Values.namespaceSelector }}
|
||||||
|
- {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- speedscale.com
|
||||||
|
apiVersions:
|
||||||
|
- v1
|
||||||
|
operations:
|
||||||
|
- CREATE
|
||||||
|
- UPDATE
|
||||||
|
- DELETE
|
||||||
|
resources:
|
||||||
|
- trafficreplays
|
||||||
|
sideEffects: None
|
||||||
|
timeoutSeconds: 10
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
helm.sh/hook: pre-install
|
||||||
|
helm.sh/hook-delete-policy: before-hook-creation
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
creationTimestamp: null
|
||||||
|
name: speedscale-webhook-certs
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
type: kubernetes.io/tls
|
||||||
|
data:
|
||||||
|
ca.crt: {{ $cacrt | b64enc }}
|
||||||
|
tls.crt: {{ $crt | b64enc }}
|
||||||
|
tls.key: {{ $key | b64enc }}
|
|
@ -0,0 +1,43 @@
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
metadata:
|
||||||
|
name: speedscale-operator
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
annotations:
|
||||||
|
argocd.argoproj.io/hook: PreSync
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
data:
|
||||||
|
CLUSTER_NAME: {{ .Values.clusterName }}
|
||||||
|
IMAGE_PULL_POLICY: {{ .Values.image.pullPolicy }}
|
||||||
|
IMAGE_PULL_SECRETS: ""
|
||||||
|
IMAGE_REGISTRY: {{ .Values.image.registry }}
|
||||||
|
IMAGE_TAG: {{ .Values.image.tag }}
|
||||||
|
INSTANCE_ID: '{{- $cm := (lookup "v1" "ConfigMap" .Release.Namespace "speedscale-operator") -}}{{ if $cm }}{{ $cm.data.INSTANCE_ID }}{{ else }}{{ ( printf "%s-%s" .Values.clusterName uuidv4 ) }}{{ end }}'
|
||||||
|
LOG_LEVEL: {{ .Values.logLevel }}
|
||||||
|
SPEEDSCALE_DLP_CONFIG: {{ .Values.dlp.config }}
|
||||||
|
SPEEDSCALE_FILTER_RULE: {{ .Values.filterRule }}
|
||||||
|
TELEMETRY_INTERVAL: 60s
|
||||||
|
WITH_DLP: {{ .Values.dlp.enabled | quote }}
|
||||||
|
WITH_INSPECTOR: {{ .Values.dashboardAccess | quote }}
|
||||||
|
API_KEY_SECRET_NAME: {{ .Values.apiKeySecret | quote }}
|
||||||
|
DEPLOY_DEMO: {{ .Values.deployDemo | quote }}
|
||||||
|
GLOBAL_ANNOTATIONS: {{ .Values.globalAnnotations | toJson | quote }}
|
||||||
|
GLOBAL_LABELS: {{ .Values.globalLabels | toJson | quote }}
|
||||||
|
{{- if .Values.http_proxy }}
|
||||||
|
HTTP_PROXY: {{ .Values.http_proxy }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.https_proxy }}
|
||||||
|
HTTPS_PROXY: {{ .Values.https_proxy }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.no_proxy }}
|
||||||
|
NO_PROXY: {{ .Values.no_proxy }}
|
||||||
|
{{- end }}
|
||||||
|
PRIVILEGED_SIDECARS: {{ .Values.privilegedSidecars | quote }}
|
||||||
|
DISABLE_SMARTDNS: {{ .Values.disableSidecarSmartReverseDNS | quote }}
|
||||||
|
SIDECAR_CONFIG: {{ .Values.sidecar | toJson | quote }}
|
||||||
|
FORWARDER_CONFIG: {{ .Values.forwarder | toJson | quote }}
|
||||||
|
TEST_PREP_TIMEOUT: {{ .Values.operator.test_prep_timeout }}
|
||||||
|
CONTROL_PLANE_TIMEOUT: {{ .Values.operator.control_plane_timeout }}
|
|
@ -0,0 +1,161 @@
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.15.0
|
||||||
|
creationTimestamp: null
|
||||||
|
name: agenttasks.speedscale.com
|
||||||
|
spec:
|
||||||
|
group: speedscale.com
|
||||||
|
names:
|
||||||
|
kind: AgentTask
|
||||||
|
listKind: AgentTaskList
|
||||||
|
plural: agenttasks
|
||||||
|
shortNames:
|
||||||
|
- sat
|
||||||
|
singular: agenttask
|
||||||
|
scope: Namespaced
|
||||||
|
versions:
|
||||||
|
- additionalPrinterColumns:
|
||||||
|
- jsonPath: .status.active
|
||||||
|
name: Active
|
||||||
|
type: boolean
|
||||||
|
- jsonPath: .spec.mode
|
||||||
|
name: Mode
|
||||||
|
type: string
|
||||||
|
- jsonPath: .status.conditions[-1:].message
|
||||||
|
name: Status
|
||||||
|
type: string
|
||||||
|
- jsonPath: .metadata.creationTimestamp
|
||||||
|
name: Age
|
||||||
|
type: date
|
||||||
|
name: v1
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
description: AgentTask is the Schema for the agenttasks API.
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: |-
|
||||||
|
APIVersion defines the versioned schema of this representation of an object.
|
||||||
|
Servers should convert recognized schemas to the latest internal value, and
|
||||||
|
may reject unrecognized values.
|
||||||
|
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: |-
|
||||||
|
Kind is a string value representing the REST resource this object represents.
|
||||||
|
Servers may infer this from the endpoint the client submits requests to.
|
||||||
|
Cannot be updated.
|
||||||
|
In CamelCase.
|
||||||
|
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: Spec is the desired state of the AgentTask.
|
||||||
|
type: object
|
||||||
|
status:
|
||||||
|
default:
|
||||||
|
observedGeneration: -1
|
||||||
|
description: Status is the current state of the AgentTask.
|
||||||
|
properties:
|
||||||
|
active:
|
||||||
|
description: Active indicates whether this agent task is currently
|
||||||
|
underway or not.
|
||||||
|
type: boolean
|
||||||
|
conditions:
|
||||||
|
items:
|
||||||
|
description: "Condition contains details for one aspect of the current
|
||||||
|
state of this API Resource.\n---\nThis struct is intended for
|
||||||
|
direct use as an array at the field path .status.conditions. For
|
||||||
|
example,\n\n\n\ttype FooStatus struct{\n\t // Represents the
|
||||||
|
observations of a foo's current state.\n\t // Known .status.conditions.type
|
||||||
|
are: \"Available\", \"Progressing\", and \"Degraded\"\n\t //
|
||||||
|
+patchMergeKey=type\n\t // +patchStrategy=merge\n\t // +listType=map\n\t
|
||||||
|
\ // +listMapKey=type\n\t Conditions []metav1.Condition `json:\"conditions,omitempty\"
|
||||||
|
patchStrategy:\"merge\" patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"`\n\n\n\t
|
||||||
|
\ // other fields\n\t}"
|
||||||
|
properties:
|
||||||
|
lastTransitionTime:
|
||||||
|
description: |-
|
||||||
|
lastTransitionTime is the last time the condition transitioned from one status to another.
|
||||||
|
This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
message:
|
||||||
|
description: |-
|
||||||
|
message is a human readable message indicating details about the transition.
|
||||||
|
This may be an empty string.
|
||||||
|
maxLength: 32768
|
||||||
|
type: string
|
||||||
|
observedGeneration:
|
||||||
|
description: |-
|
||||||
|
observedGeneration represents the .metadata.generation that the condition was set based upon.
|
||||||
|
For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
|
||||||
|
with respect to the current state of the instance.
|
||||||
|
format: int64
|
||||||
|
minimum: 0
|
||||||
|
type: integer
|
||||||
|
reason:
|
||||||
|
description: |-
|
||||||
|
reason contains a programmatic identifier indicating the reason for the condition's last transition.
|
||||||
|
Producers of specific condition types may define expected values and meanings for this field,
|
||||||
|
and whether the values are considered a guaranteed API.
|
||||||
|
The value should be a CamelCase string.
|
||||||
|
This field may not be empty.
|
||||||
|
maxLength: 1024
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
description: status of the condition, one of True, False, Unknown.
|
||||||
|
enum:
|
||||||
|
- "True"
|
||||||
|
- "False"
|
||||||
|
- Unknown
|
||||||
|
type: string
|
||||||
|
type:
|
||||||
|
description: |-
|
||||||
|
type of condition in CamelCase or in foo.example.com/CamelCase.
|
||||||
|
---
|
||||||
|
Many .condition.type values are consistent across resources like Available, but because arbitrary conditions can be
|
||||||
|
useful (see .node.status.conditions), the ability to deconflict is important.
|
||||||
|
The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
|
||||||
|
maxLength: 316
|
||||||
|
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- lastTransitionTime
|
||||||
|
- message
|
||||||
|
- reason
|
||||||
|
- status
|
||||||
|
- type
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
observedGeneration:
|
||||||
|
description: ObservedGeneration is the last observed generation.
|
||||||
|
format: int64
|
||||||
|
type: integer
|
||||||
|
reconcileFailures:
|
||||||
|
description: |-
|
||||||
|
ReconcileFailures is the number of times the agent task controller
|
||||||
|
experienced an error during the reconciliation process. The agent
|
||||||
|
task will be deleted if too many errors occur.
|
||||||
|
format: int64
|
||||||
|
type: integer
|
||||||
|
reportID:
|
||||||
|
description: The ID of the agent report associated with this agent
|
||||||
|
task.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
subresources:
|
||||||
|
status: {}
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: null
|
||||||
|
storedVersions: null
|
|
@ -0,0 +1,522 @@
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.15.0
|
||||||
|
creationTimestamp: null
|
||||||
|
name: trafficreplays.speedscale.com
|
||||||
|
spec:
|
||||||
|
group: speedscale.com
|
||||||
|
names:
|
||||||
|
kind: TrafficReplay
|
||||||
|
listKind: TrafficReplayList
|
||||||
|
plural: trafficreplays
|
||||||
|
shortNames:
|
||||||
|
- replay
|
||||||
|
singular: trafficreplay
|
||||||
|
scope: Namespaced
|
||||||
|
versions:
|
||||||
|
- additionalPrinterColumns:
|
||||||
|
- jsonPath: .status.active
|
||||||
|
name: Active
|
||||||
|
type: boolean
|
||||||
|
- jsonPath: .spec.mode
|
||||||
|
name: Mode
|
||||||
|
type: string
|
||||||
|
- jsonPath: .status.conditions[-1:].message
|
||||||
|
name: Status
|
||||||
|
type: string
|
||||||
|
- jsonPath: .metadata.creationTimestamp
|
||||||
|
name: Age
|
||||||
|
type: date
|
||||||
|
name: v1
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
description: TrafficReplay is the Schema for the trafficreplays API.
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: |-
|
||||||
|
APIVersion defines the versioned schema of this representation of an object.
|
||||||
|
Servers should convert recognized schemas to the latest internal value, and
|
||||||
|
may reject unrecognized values.
|
||||||
|
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: |-
|
||||||
|
Kind is a string value representing the REST resource this object represents.
|
||||||
|
Servers may infer this from the endpoint the client submits requests to.
|
||||||
|
Cannot be updated.
|
||||||
|
In CamelCase.
|
||||||
|
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: Spec defines the desired state of TrafficReplay.
|
||||||
|
properties:
|
||||||
|
buildTag:
|
||||||
|
description: |-
|
||||||
|
BuildTag links a unique tag, build hash, etc. to the generated
|
||||||
|
traffic replay report. That way you can connect the report results to the
|
||||||
|
version of the code that was tested.
|
||||||
|
type: string
|
||||||
|
cleanup:
|
||||||
|
description: |-
|
||||||
|
Cleanup is the name of cleanup mode used for this TrafficReplay. Set to
|
||||||
|
"none" to leave resources in the state they were during the replay. The
|
||||||
|
default mode "inventory" will revert the environment to the state it was
|
||||||
|
before the replay.
|
||||||
|
enum:
|
||||||
|
- inventory
|
||||||
|
- all
|
||||||
|
- none
|
||||||
|
type: string
|
||||||
|
collectLogs:
|
||||||
|
description: 'DEPRECATED: use TestReport.ActualConfig.Cluster.CollectLogs'
|
||||||
|
type: boolean
|
||||||
|
configChecksum:
|
||||||
|
description: |-
|
||||||
|
ConfigChecksum, managed my the operator, is the SHA1 checksum of the
|
||||||
|
configuration.
|
||||||
|
type: string
|
||||||
|
customURL:
|
||||||
|
description: |-
|
||||||
|
CustomURL specifies a custom URL to send *ALL* traffic to. Use
|
||||||
|
Workload.CustomURI to send traffic to a specific URL for only that
|
||||||
|
workload.
|
||||||
|
type: string
|
||||||
|
generatorLowData:
|
||||||
|
description: |-
|
||||||
|
GeneratorLowData forces the generator into a high
|
||||||
|
efficiency/low data output mode. This is ideal for high volume
|
||||||
|
performance tests. Defaults to false.
|
||||||
|
DEPRECATED
|
||||||
|
type: boolean
|
||||||
|
mode:
|
||||||
|
description: Mode is the name of replay mode used for this TrafficReplay.
|
||||||
|
enum:
|
||||||
|
- full-replay
|
||||||
|
- responder-only
|
||||||
|
- generator-only
|
||||||
|
type: string
|
||||||
|
needsReport:
|
||||||
|
description: 'DEPRECATED: replays always create reports'
|
||||||
|
type: boolean
|
||||||
|
proxyMode:
|
||||||
|
description: |-
|
||||||
|
ProxyMode defines proxy operational mode used with injected sidecar.
|
||||||
|
DEPRECATED
|
||||||
|
type: string
|
||||||
|
responderLowData:
|
||||||
|
description: |-
|
||||||
|
ResponderLowData forces the responder into a high
|
||||||
|
efficiency/low data output mode. This is ideal for high volume
|
||||||
|
performance tests. Defaults to false.
|
||||||
|
DEPRECATED
|
||||||
|
type: boolean
|
||||||
|
secretRefs:
|
||||||
|
description: |-
|
||||||
|
SecretRefs hold the references to the secrets which contain
|
||||||
|
various secrets like (e.g. short-lived JWTs to be used by the generator
|
||||||
|
for authorization with HTTP calls).
|
||||||
|
items:
|
||||||
|
description: |-
|
||||||
|
LocalObjectReference contains enough information to locate the referenced
|
||||||
|
Kubernetes resource object.
|
||||||
|
properties:
|
||||||
|
name:
|
||||||
|
description: Name of the referent.
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- name
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
sidecar:
|
||||||
|
description: |-
|
||||||
|
Sidecar defines sidecar specific configuration.
|
||||||
|
DEPRECATED: use Workloads
|
||||||
|
properties:
|
||||||
|
inject:
|
||||||
|
description: 'DEPRECATED: do not use'
|
||||||
|
type: boolean
|
||||||
|
patch:
|
||||||
|
description: Patch is .yaml file patch for the Workload
|
||||||
|
format: byte
|
||||||
|
type: string
|
||||||
|
tls:
|
||||||
|
properties:
|
||||||
|
in:
|
||||||
|
description: In provides configuration for sidecar inbound
|
||||||
|
TLS.
|
||||||
|
properties:
|
||||||
|
private:
|
||||||
|
description: Private is the filename of the TLS inbound
|
||||||
|
private key.
|
||||||
|
type: string
|
||||||
|
public:
|
||||||
|
description: Public is the filename of the TLS inbound
|
||||||
|
public key.
|
||||||
|
type: string
|
||||||
|
secret:
|
||||||
|
description: Secret is a secret with the TLS keys to use
|
||||||
|
for inbound traffic.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
mutual:
|
||||||
|
description: Mutual provides configuration for sidecar mutual
|
||||||
|
TLS.
|
||||||
|
properties:
|
||||||
|
private:
|
||||||
|
description: Private is the filename of the mutual TLS
|
||||||
|
private key.
|
||||||
|
type: string
|
||||||
|
public:
|
||||||
|
description: Public is the filename of the mutual TLS
|
||||||
|
public key.
|
||||||
|
type: string
|
||||||
|
secret:
|
||||||
|
description: Secret is a secret with the mutual TLS keys.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
out:
|
||||||
|
description: |-
|
||||||
|
Out enables or disables TLS out on the
|
||||||
|
sidecar during replay.
|
||||||
|
type: boolean
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
snapshotID:
|
||||||
|
description: |-
|
||||||
|
SnapshotID is the id of the traffic snapshot for this
|
||||||
|
TrafficReplay.
|
||||||
|
type: string
|
||||||
|
testConfigID:
|
||||||
|
description: |-
|
||||||
|
TestConfigID is the id of the replay configuration to be used
|
||||||
|
by the generator and responder for the TrafficReplay.
|
||||||
|
type: string
|
||||||
|
timeout:
|
||||||
|
description: |-
|
||||||
|
Timeout is the time to wait for replay test to finish. Defaults
|
||||||
|
to value of the `TIMEOUT` setting of the operator.
|
||||||
|
type: string
|
||||||
|
ttlAfterReady:
|
||||||
|
description: |-
|
||||||
|
TTLAfterReady provides a TTL (time to live) mechanism to limit
|
||||||
|
the lifetime of TrafficReplay object that have finished the execution and
|
||||||
|
reached its final state (either complete or failed).
|
||||||
|
type: string
|
||||||
|
workloadRef:
|
||||||
|
description: |-
|
||||||
|
WorkloadRef is the reference to the target workload (SUT) for
|
||||||
|
TrafficReplay. The operations will be performed in the namespace of the
|
||||||
|
target object.
|
||||||
|
DEPRECATED: use Workloads
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: API version of the referenced object.
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: Kind of the referenced object. Defaults to "Deployment".
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: |-
|
||||||
|
Name of the referenced object. Required when defining for a test unless a
|
||||||
|
custom URI is provided. Always required when defining mocks.
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: Namespace of the referenced object. Defaults to the
|
||||||
|
TrafficReplay namespace.
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- name
|
||||||
|
type: object
|
||||||
|
workloads:
|
||||||
|
description: |-
|
||||||
|
Workloads define target workloads (SUT) for a TrafficReplay. Many
|
||||||
|
workloads may be provided, or none. Workloads may be modified and
|
||||||
|
restarted during replay to configure communication with a responder.
|
||||||
|
items:
|
||||||
|
description: |-
|
||||||
|
Workload represents a Kubernetes workload to be targeted during replay and
|
||||||
|
associated settings.
|
||||||
|
properties:
|
||||||
|
customURI:
|
||||||
|
description: |-
|
||||||
|
CustomURI will be target of the traffic instead of directly targeting
|
||||||
|
workload. This is required if a Ref is not specified.
|
||||||
|
type: string
|
||||||
|
inTrafficKey:
|
||||||
|
description: 'DEPRECATED: use Tests'
|
||||||
|
type: string
|
||||||
|
inTrafficKeys:
|
||||||
|
description: 'DEPRECATED: use Tests'
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
|
mocks:
|
||||||
|
description: |-
|
||||||
|
Mocks are strings used to identify slices of outbound snapshot traffic to
|
||||||
|
mock for this workload and maps directly to a snapshot's `OutTraffic`
|
||||||
|
field. Snapshot egress traffic can be split across multiple slices where
|
||||||
|
each slice contains part of the traffic. A workload may specify multiple
|
||||||
|
keys and multiple workloads may specify the same key.
|
||||||
|
|
||||||
|
|
||||||
|
Only the traffic slices defined here will be mocked. A workload with no
|
||||||
|
keys defined will not mock any traffic. Pass '*' to mock all traffic.
|
||||||
|
|
||||||
|
|
||||||
|
Mock strings may only match part of the snapshot's `OutTraffic` key if the
|
||||||
|
string matches exactly one key. For example, the test string
|
||||||
|
`foo.example.com` would match the `OutTraffic` key of
|
||||||
|
my-service:foo.example.com:8080, as long as no other keys would match
|
||||||
|
`foo.example.com`. Multiple mocks must be specified for multiple keys
|
||||||
|
unless using '*'.
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
|
outTrafficKeys:
|
||||||
|
description: 'DEPRECATED: use Mocks'
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
|
ref:
|
||||||
|
description: |-
|
||||||
|
Ref is a reference to a cluster workload, like a service, deployment or
|
||||||
|
statefulset. This is required unless a CustomURI is specified.
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: API version of the referenced object.
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: Kind of the referenced object. Defaults to
|
||||||
|
"Deployment".
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: |-
|
||||||
|
Name of the referenced object. Required when defining for a test unless a
|
||||||
|
custom URI is provided. Always required when defining mocks.
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: Namespace of the referenced object. Defaults
|
||||||
|
to the TrafficReplay namespace.
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- name
|
||||||
|
type: object
|
||||||
|
routing:
|
||||||
|
description: Routing configures how workloads route egress traffic
|
||||||
|
to responders
|
||||||
|
enum:
|
||||||
|
- hostalias
|
||||||
|
- nat
|
||||||
|
type: string
|
||||||
|
sidecar:
|
||||||
|
description: |-
|
||||||
|
TODO: this is not implemented, come back and replace deprecated Sidecar with workload specific settings
|
||||||
|
Sidecar defines sidecar specific configuration.
|
||||||
|
properties:
|
||||||
|
inject:
|
||||||
|
description: 'DEPRECATED: do not use'
|
||||||
|
type: boolean
|
||||||
|
patch:
|
||||||
|
description: Patch is .yaml file patch for the Workload
|
||||||
|
format: byte
|
||||||
|
type: string
|
||||||
|
tls:
|
||||||
|
properties:
|
||||||
|
in:
|
||||||
|
description: In provides configuration for sidecar inbound
|
||||||
|
TLS.
|
||||||
|
properties:
|
||||||
|
private:
|
||||||
|
description: Private is the filename of the TLS
|
||||||
|
inbound private key.
|
||||||
|
type: string
|
||||||
|
public:
|
||||||
|
description: Public is the filename of the TLS inbound
|
||||||
|
public key.
|
||||||
|
type: string
|
||||||
|
secret:
|
||||||
|
description: Secret is a secret with the TLS keys
|
||||||
|
to use for inbound traffic.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
mutual:
|
||||||
|
description: Mutual provides configuration for sidecar
|
||||||
|
mutual TLS.
|
||||||
|
properties:
|
||||||
|
private:
|
||||||
|
description: Private is the filename of the mutual
|
||||||
|
TLS private key.
|
||||||
|
type: string
|
||||||
|
public:
|
||||||
|
description: Public is the filename of the mutual
|
||||||
|
TLS public key.
|
||||||
|
type: string
|
||||||
|
secret:
|
||||||
|
description: Secret is a secret with the mutual
|
||||||
|
TLS keys.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
out:
|
||||||
|
description: |-
|
||||||
|
Out enables or disables TLS out on the
|
||||||
|
sidecar during replay.
|
||||||
|
type: boolean
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
tests:
|
||||||
|
description: |-
|
||||||
|
Tests are strings used to identify slices of inbound snapshot traffic this
|
||||||
|
workload is targeting and maps directly to a snapshot's `InTraffic` field.
|
||||||
|
Snapshot ingress traffic can be split across multiple slices where each
|
||||||
|
slice contains part of the traffic. A key must only be specified once
|
||||||
|
across all workloads, but a workload may specify multiple keys. Pass '*'
|
||||||
|
to match all keys.
|
||||||
|
|
||||||
|
|
||||||
|
Test strings may only match part of the snapshot's `InTraffic` key if the
|
||||||
|
string matches exactly one key. For example, the test string
|
||||||
|
`foo.example.com` would match the `InTraffic` key of
|
||||||
|
my-service:foo.example.com:8080, as long as no other keys would match
|
||||||
|
`foo.example.com`
|
||||||
|
|
||||||
|
|
||||||
|
This field is optional in the spec to provide support for single-workload
|
||||||
|
and legacy replays, but must be specified for multi-workload replays in
|
||||||
|
order to provide deterministic replay configuration.
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
required:
|
||||||
|
- snapshotID
|
||||||
|
- testConfigID
|
||||||
|
type: object
|
||||||
|
status:
|
||||||
|
default:
|
||||||
|
observedGeneration: -1
|
||||||
|
description: Status defines the observed state of TrafficReplay.
|
||||||
|
properties:
|
||||||
|
active:
|
||||||
|
description: Active indicates whether this traffic replay is currently
|
||||||
|
underway or not.
|
||||||
|
type: boolean
|
||||||
|
conditions:
|
||||||
|
items:
|
||||||
|
description: "Condition contains details for one aspect of the current
|
||||||
|
state of this API Resource.\n---\nThis struct is intended for
|
||||||
|
direct use as an array at the field path .status.conditions. For
|
||||||
|
example,\n\n\n\ttype FooStatus struct{\n\t // Represents the
|
||||||
|
observations of a foo's current state.\n\t // Known .status.conditions.type
|
||||||
|
are: \"Available\", \"Progressing\", and \"Degraded\"\n\t //
|
||||||
|
+patchMergeKey=type\n\t // +patchStrategy=merge\n\t // +listType=map\n\t
|
||||||
|
\ // +listMapKey=type\n\t Conditions []metav1.Condition `json:\"conditions,omitempty\"
|
||||||
|
patchStrategy:\"merge\" patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"`\n\n\n\t
|
||||||
|
\ // other fields\n\t}"
|
||||||
|
properties:
|
||||||
|
lastTransitionTime:
|
||||||
|
description: |-
|
||||||
|
lastTransitionTime is the last time the condition transitioned from one status to another.
|
||||||
|
This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
message:
|
||||||
|
description: |-
|
||||||
|
message is a human readable message indicating details about the transition.
|
||||||
|
This may be an empty string.
|
||||||
|
maxLength: 32768
|
||||||
|
type: string
|
||||||
|
observedGeneration:
|
||||||
|
description: |-
|
||||||
|
observedGeneration represents the .metadata.generation that the condition was set based upon.
|
||||||
|
For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
|
||||||
|
with respect to the current state of the instance.
|
||||||
|
format: int64
|
||||||
|
minimum: 0
|
||||||
|
type: integer
|
||||||
|
reason:
|
||||||
|
description: |-
|
||||||
|
reason contains a programmatic identifier indicating the reason for the condition's last transition.
|
||||||
|
Producers of specific condition types may define expected values and meanings for this field,
|
||||||
|
and whether the values are considered a guaranteed API.
|
||||||
|
The value should be a CamelCase string.
|
||||||
|
This field may not be empty.
|
||||||
|
maxLength: 1024
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
description: status of the condition, one of True, False, Unknown.
|
||||||
|
enum:
|
||||||
|
- "True"
|
||||||
|
- "False"
|
||||||
|
- Unknown
|
||||||
|
type: string
|
||||||
|
type:
|
||||||
|
description: |-
|
||||||
|
type of condition in CamelCase or in foo.example.com/CamelCase.
|
||||||
|
---
|
||||||
|
Many .condition.type values are consistent across resources like Available, but because arbitrary conditions can be
|
||||||
|
useful (see .node.status.conditions), the ability to deconflict is important.
|
||||||
|
The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
|
||||||
|
maxLength: 316
|
||||||
|
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- lastTransitionTime
|
||||||
|
- message
|
||||||
|
- reason
|
||||||
|
- status
|
||||||
|
- type
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
finishedTime:
|
||||||
|
description: Information when the traffic replay has finished.
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
initializedTime:
|
||||||
|
description: Information when the test environment was successfully
|
||||||
|
prepared.
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
lastHeartbeatTime:
|
||||||
|
description: 'DEPRECATED: will not be set'
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
observedGeneration:
|
||||||
|
description: ObservedGeneration is the last observed generation.
|
||||||
|
format: int64
|
||||||
|
type: integer
|
||||||
|
reconcileFailures:
|
||||||
|
description: |-
|
||||||
|
ReconcileFailures is the number of times the traffic replay controller
|
||||||
|
experienced an error during the reconciliation process. The traffic
|
||||||
|
replay will be deleted if too many errors occur.
|
||||||
|
format: int64
|
||||||
|
type: integer
|
||||||
|
reportID:
|
||||||
|
description: The ID of the traffic replay report created.
|
||||||
|
type: string
|
||||||
|
reportURL:
|
||||||
|
description: The URL to the traffic replay report.
|
||||||
|
type: string
|
||||||
|
startedTime:
|
||||||
|
description: Information when the traffic replay has started.
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
subresources:
|
||||||
|
status: {}
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: null
|
||||||
|
storedVersions: null
|
|
@ -0,0 +1,132 @@
|
||||||
|
---
|
||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
operator.speedscale.com/ignore: "true"
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
labels:
|
||||||
|
app: speedscale-operator
|
||||||
|
controlplane.speedscale.com/component: operator
|
||||||
|
{{- if .Values.globalLabels }}
|
||||||
|
{{ toYaml .Values.globalLabels | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
name: speedscale-operator
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: speedscale-operator
|
||||||
|
controlplane.speedscale.com/component: operator
|
||||||
|
strategy:
|
||||||
|
type: Recreate
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 8}}
|
||||||
|
{{- end }}
|
||||||
|
labels:
|
||||||
|
app: speedscale-operator
|
||||||
|
controlplane.speedscale.com/component: operator
|
||||||
|
{{- if .Values.globalLabels }}
|
||||||
|
{{ toYaml .Values.globalLabels | indent 8}}
|
||||||
|
{{- end }}
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- command:
|
||||||
|
- /operator
|
||||||
|
env:
|
||||||
|
- name: POD_NAME
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.name
|
||||||
|
- name: POD_NAMESPACE
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
envFrom:
|
||||||
|
- configMapRef:
|
||||||
|
name: speedscale-operator
|
||||||
|
# https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.23/#container-v1-core
|
||||||
|
# When a key exists in multiple sources, the value associated with the last source will take precedence.
|
||||||
|
# Values defined by an Env with a duplicate key will take precedence.
|
||||||
|
- configMapRef:
|
||||||
|
name: speedscale-operator-override
|
||||||
|
optional: true
|
||||||
|
- secretRef:
|
||||||
|
name: '{{ ne .Values.apiKeySecret "" | ternary .Values.apiKeySecret "speedscale-apikey" }}'
|
||||||
|
optional: false
|
||||||
|
image: '{{ .Values.image.registry }}/operator:{{ .Values.image.tag }}'
|
||||||
|
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||||
|
livenessProbe:
|
||||||
|
failureThreshold: 5
|
||||||
|
httpGet:
|
||||||
|
path: /healthz
|
||||||
|
port: health-check
|
||||||
|
scheme: HTTP
|
||||||
|
initialDelaySeconds: 30
|
||||||
|
periodSeconds: 30
|
||||||
|
successThreshold: 1
|
||||||
|
timeoutSeconds: 5
|
||||||
|
name: operator
|
||||||
|
ports:
|
||||||
|
- containerPort: 443
|
||||||
|
name: webhook-server
|
||||||
|
- containerPort: 8081
|
||||||
|
name: health-check
|
||||||
|
readinessProbe:
|
||||||
|
failureThreshold: 10
|
||||||
|
httpGet:
|
||||||
|
path: /readyz
|
||||||
|
port: health-check
|
||||||
|
scheme: HTTP
|
||||||
|
initialDelaySeconds: 5
|
||||||
|
periodSeconds: 5
|
||||||
|
successThreshold: 1
|
||||||
|
timeoutSeconds: 5
|
||||||
|
resources: {{- toYaml .Values.operator.resources | nindent 10 }}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: false
|
||||||
|
# Run as root to bind 443 https://github.com/kubernetes/kubernetes/issues/56374
|
||||||
|
runAsUser: 0
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
|
- mountPath: /tmp/k8s-webhook-server/serving-certs
|
||||||
|
name: webhook-certs
|
||||||
|
readOnly: true
|
||||||
|
- mountPath: /etc/ssl/speedscale
|
||||||
|
name: speedscale-tls-out
|
||||||
|
readOnly: true
|
||||||
|
hostNetwork: {{ .Values.hostNetwork }}
|
||||||
|
securityContext:
|
||||||
|
runAsNonRoot: true
|
||||||
|
serviceAccountName: speedscale-operator
|
||||||
|
terminationGracePeriodSeconds: 10
|
||||||
|
volumes:
|
||||||
|
- emptyDir: {}
|
||||||
|
name: tmp
|
||||||
|
- name: webhook-certs
|
||||||
|
secret:
|
||||||
|
secretName: speedscale-webhook-certs
|
||||||
|
- name: speedscale-tls-out
|
||||||
|
secret:
|
||||||
|
secretName: speedscale-certs
|
||||||
|
{{- if .Values.affinity }}
|
||||||
|
affinity: {{ toYaml .Values.affinity | nindent 8 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.tolerations }}
|
||||||
|
tolerations: {{ toYaml .Values.tolerations | nindent 8 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.nodeSelector }}
|
||||||
|
nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,79 @@
|
||||||
|
---
|
||||||
|
apiVersion: batch/v1
|
||||||
|
kind: Job
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
helm.sh/hook: pre-install
|
||||||
|
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
|
||||||
|
helm.sh/hook-weight: "4"
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
creationTimestamp: null
|
||||||
|
name: speedscale-operator-pre-install
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
labels:
|
||||||
|
{{- if .Values.globalLabels }}
|
||||||
|
{{ toYaml .Values.globalLabels | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
spec:
|
||||||
|
backoffLimit: 0
|
||||||
|
ttlSecondsAfterFinished: 30
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 8}}
|
||||||
|
{{- end }}
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
{{- if .Values.globalLabels }}
|
||||||
|
{{ toYaml .Values.globalLabels | indent 8}}
|
||||||
|
{{- end }}
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- args:
|
||||||
|
- |-
|
||||||
|
# ensure valid settings before the chart reports a successfull install
|
||||||
|
{{- if .Values.http_proxy }}
|
||||||
|
HTTP_PROXY={{ .Values.http_proxy | quote }} \
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.https_proxy }}
|
||||||
|
HTTPS_PROXY={{ .Values.https_proxy | quote }} \
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.no_proxy }}
|
||||||
|
NO_PROXY={{ .Values.no_proxy | quote }} \
|
||||||
|
{{- end }}
|
||||||
|
speedctl init --overwrite --no-rcfile-update \
|
||||||
|
--api-key $SPEEDSCALE_API_KEY \
|
||||||
|
--app-url $SPEEDSCALE_APP_URL
|
||||||
|
|
||||||
|
# in case we're in istio
|
||||||
|
curl -X POST http://127.0.0.1:15000/quitquitquit || true
|
||||||
|
command:
|
||||||
|
- sh
|
||||||
|
- -c
|
||||||
|
envFrom:
|
||||||
|
- secretRef:
|
||||||
|
name: '{{ ne .Values.apiKeySecret "" | ternary .Values.apiKeySecret "speedscale-apikey" }}'
|
||||||
|
optional: false
|
||||||
|
image: '{{ .Values.image.registry }}/speedscale-cli:{{ .Values.image.tag }}'
|
||||||
|
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||||
|
name: speedscale-cli
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: "128M"
|
||||||
|
cpu: "1"
|
||||||
|
requests:
|
||||||
|
memory: "64M"
|
||||||
|
cpu: "100m"
|
||||||
|
restartPolicy: Never
|
||||||
|
{{- if .Values.affinity }}
|
||||||
|
affinity: {{ toYaml .Values.affinity | nindent 8 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.tolerations }}
|
||||||
|
tolerations: {{ toYaml .Values.tolerations | nindent 8 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.nodeSelector }}
|
||||||
|
nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,246 @@
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRole
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: speedscale-operator
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
annotations: {{ toYaml .Values.globalAnnotations | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- apps
|
||||||
|
resources:
|
||||||
|
- deployments
|
||||||
|
- statefulsets
|
||||||
|
- daemonsets
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- apps
|
||||||
|
resources:
|
||||||
|
- replicasets
|
||||||
|
verbs:
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- batch
|
||||||
|
resources:
|
||||||
|
- jobs
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- apiextensions.k8s.io
|
||||||
|
resources:
|
||||||
|
- customresourcedefinitions
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- apiGroups:
|
||||||
|
- admissionregistration.k8s.io
|
||||||
|
resources:
|
||||||
|
- mutatingwebhookconfigurations
|
||||||
|
- validatingwebhookconfigurations
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- apiGroups:
|
||||||
|
- rbac.authorization.k8s.io
|
||||||
|
resources:
|
||||||
|
- clusterrolebindings
|
||||||
|
- clusterroles
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- namespaces
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- configmaps
|
||||||
|
- secrets
|
||||||
|
- pods
|
||||||
|
- services
|
||||||
|
- serviceaccounts
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- pods/log
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- events
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- metrics.k8s.io
|
||||||
|
resources:
|
||||||
|
- pods
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- rbac.authorization.k8s.io
|
||||||
|
resources:
|
||||||
|
- rolebindings
|
||||||
|
- roles
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- networking.istio.io
|
||||||
|
resources:
|
||||||
|
- envoyfilters
|
||||||
|
- sidecars
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- security.istio.io
|
||||||
|
resources:
|
||||||
|
- peerauthentications
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- coordination.k8s.io
|
||||||
|
resources:
|
||||||
|
- leases
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- speedscale.com
|
||||||
|
resources:
|
||||||
|
- trafficreplays
|
||||||
|
- agenttasks
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- speedscale.com
|
||||||
|
resources:
|
||||||
|
- trafficreplays/status
|
||||||
|
- agenttasks/status
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- update
|
||||||
|
- patch
|
||||||
|
- apiGroups:
|
||||||
|
- argoproj.io
|
||||||
|
resources:
|
||||||
|
- rollouts
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: speedscale-operator
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
annotations: {{ toYaml .Values.globalAnnotations | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: speedscale-operator
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: speedscale-operator
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
automountServiceAccountToken: true
|
||||||
|
kind: ServiceAccount
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
app: speedscale-operator
|
||||||
|
controlplane.speedscale.com/component: operator
|
||||||
|
name: speedscale-operator
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
annotations: {{ toYaml .Values.globalAnnotations | nindent 4 }}
|
||||||
|
{{- end }}
|
|
@ -0,0 +1,18 @@
|
||||||
|
---
|
||||||
|
{{ if .Values.apiKey }}
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
name: speedscale-apikey
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
annotations:
|
||||||
|
helm.sh/hook: pre-install
|
||||||
|
helm.sh/hook-weight: "3"
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
type: Opaque
|
||||||
|
data:
|
||||||
|
SPEEDSCALE_API_KEY: {{ .Values.apiKey | b64enc }}
|
||||||
|
SPEEDSCALE_APP_URL: {{ .Values.appUrl | b64enc }}
|
||||||
|
{{ end }}
|
|
@ -0,0 +1,22 @@
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
app: speedscale-operator
|
||||||
|
controlplane.speedscale.com/component: operator
|
||||||
|
name: speedscale-operator
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
annotations: {{ toYaml .Values.globalAnnotations | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- port: 443
|
||||||
|
protocol: TCP
|
||||||
|
selector:
|
||||||
|
app: speedscale-operator
|
||||||
|
controlplane.speedscale.com/component: operator
|
||||||
|
status:
|
||||||
|
loadBalancer: {}
|
|
@ -0,0 +1,189 @@
|
||||||
|
{{- $crt := "" -}}
|
||||||
|
{{- $key := "" -}}
|
||||||
|
{{- $s := (lookup "v1" "Secret" .Release.Namespace "speedscale-certs") -}}
|
||||||
|
{{- if $s -}}
|
||||||
|
{{- $crt = index $s.data "tls.crt" | b64dec -}}
|
||||||
|
{{- $key = index $s.data "tls.key" | b64dec -}}
|
||||||
|
{{ else }}
|
||||||
|
{{- $cert := genCA "Speedscale" 3650 -}}
|
||||||
|
{{- $crt = $cert.Cert -}}
|
||||||
|
{{- $key = $cert.Key -}}
|
||||||
|
{{- end -}}
|
||||||
|
---
|
||||||
|
apiVersion: batch/v1
|
||||||
|
kind: Job
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
helm.sh/hook: pre-install
|
||||||
|
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
|
||||||
|
helm.sh/hook-weight: "5"
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
creationTimestamp: null
|
||||||
|
name: speedscale-operator-create-jks
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
labels:
|
||||||
|
{{- if .Values.globalLabels }}
|
||||||
|
{{ toYaml .Values.globalLabels | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
spec:
|
||||||
|
backoffLimit: 0
|
||||||
|
ttlSecondsAfterFinished: 30
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 8}}
|
||||||
|
{{- end }}
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 8}}
|
||||||
|
{{- end }}
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- args:
|
||||||
|
- |-
|
||||||
|
keytool -keystore /usr/lib/jvm/jre/lib/security/cacerts -importcert -noprompt -trustcacerts -storepass changeit -alias speedscale -file /etc/ssl/speedscale/tls.crt
|
||||||
|
kubectl -n ${POD_NAMESPACE} delete secret speedscale-jks || true
|
||||||
|
kubectl -n ${POD_NAMESPACE} create secret generic speedscale-jks --from-file=cacerts.jks=/usr/lib/jvm/jre/lib/security/cacerts
|
||||||
|
|
||||||
|
# in case we're in istio
|
||||||
|
curl -X POST http://127.0.0.1:15000/quitquitquit || true
|
||||||
|
command:
|
||||||
|
- sh
|
||||||
|
- -c
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /etc/ssl/speedscale
|
||||||
|
name: speedscale-tls-out
|
||||||
|
readOnly: true
|
||||||
|
env:
|
||||||
|
- name: POD_NAMESPACE
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
envFrom:
|
||||||
|
- secretRef:
|
||||||
|
name: '{{ ne .Values.apiKeySecret "" | ternary .Values.apiKeySecret "speedscale-apikey" }}'
|
||||||
|
optional: false
|
||||||
|
image: '{{ .Values.image.registry }}/amazoncorretto'
|
||||||
|
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||||
|
name: create-jks
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: "256M"
|
||||||
|
cpu: "1"
|
||||||
|
requests:
|
||||||
|
memory: "128M"
|
||||||
|
cpu: "200m"
|
||||||
|
restartPolicy: Never
|
||||||
|
serviceAccountName: speedscale-operator-provisioning
|
||||||
|
volumes:
|
||||||
|
- name: speedscale-tls-out
|
||||||
|
secret:
|
||||||
|
secretName: speedscale-certs
|
||||||
|
{{- if .Values.affinity }}
|
||||||
|
affinity: {{ toYaml .Values.affinity | nindent 8 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.tolerations }}
|
||||||
|
tolerations: {{ toYaml .Values.tolerations | nindent 8 }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.nodeSelector }}
|
||||||
|
nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
|
||||||
|
{{- end }}
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
automountServiceAccountToken: true
|
||||||
|
kind: ServiceAccount
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
helm.sh/hook: pre-install
|
||||||
|
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
|
||||||
|
helm.sh/hook-weight: "1"
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
app: speedscale-operator
|
||||||
|
controlplane.speedscale.com/component: operator
|
||||||
|
name: speedscale-operator-provisioning
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRole
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
helm.sh/hook: pre-install
|
||||||
|
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
|
||||||
|
helm.sh/hook-weight: "2"
|
||||||
|
creationTimestamp: null
|
||||||
|
name: speedscale-operator-provisioning
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- secrets
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- admissionregistration.k8s.io
|
||||||
|
resources:
|
||||||
|
- mutatingwebhookconfigurations
|
||||||
|
- validatingwebhookconfigurations
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- deletecollection
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
helm.sh/hook: pre-install
|
||||||
|
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
|
||||||
|
helm.sh/hook-weight: "3"
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
creationTimestamp: null
|
||||||
|
name: speedscale-operator-provisioning
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: speedscale-operator-provisioning
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: speedscale-operator-provisioning
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
helm.sh/hook: pre-install
|
||||||
|
helm.sh/hook-delete-policy: before-hook-creation
|
||||||
|
{{- if .Values.globalAnnotations }}
|
||||||
|
{{ toYaml .Values.globalAnnotations | indent 4}}
|
||||||
|
{{- end }}
|
||||||
|
creationTimestamp: null
|
||||||
|
name: speedscale-certs
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
type: kubernetes.io/tls
|
||||||
|
data:
|
||||||
|
tls.crt: {{ $crt | b64enc }}
|
||||||
|
tls.key: {{ $key | b64enc }}
|
|
@ -0,0 +1,138 @@
|
||||||
|
# An API key is required to connect to the Speedscale cloud.
|
||||||
|
# If you need a key email support@speedscale.com.
|
||||||
|
apiKey: ""
|
||||||
|
|
||||||
|
# A secret name can be referenced instead of the api key itself.
|
||||||
|
# The secret must be of the format:
|
||||||
|
#
|
||||||
|
# type: Opaque
|
||||||
|
# data:
|
||||||
|
# SPEEDSCALE_API_KEY: <key>
|
||||||
|
# SPEEDSCALE_APP_URL: <appUrl>
|
||||||
|
apiKeySecret: ""
|
||||||
|
|
||||||
|
# Speedscale domain to use.
|
||||||
|
appUrl: "app.speedscale.com"
|
||||||
|
|
||||||
|
# The name of your cluster.
|
||||||
|
clusterName: "my-cluster"
|
||||||
|
|
||||||
|
# Speedscale components image settings.
|
||||||
|
image:
|
||||||
|
registry: gcr.io/speedscale
|
||||||
|
tag: v2.3.149
|
||||||
|
pullPolicy: Always
|
||||||
|
|
||||||
|
# Log level for Speedscale components.
|
||||||
|
logLevel: "info"
|
||||||
|
|
||||||
|
# Namespaces to be watched by Speedscale Operator as a list of names.
|
||||||
|
namespaceSelector: []
|
||||||
|
|
||||||
|
# Instructs operator to deploy resources necessary to interact with your cluster from the Speedscale dashboard.
|
||||||
|
dashboardAccess: true
|
||||||
|
|
||||||
|
# Filter Rule to apply to the Speedscale Forwarder
|
||||||
|
filterRule: "standard"
|
||||||
|
|
||||||
|
# Data Loss Prevention settings.
|
||||||
|
dlp:
|
||||||
|
# Instructs operator to enable data loss prevention features
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
# Configuration for data loss prevention
|
||||||
|
config: "standard"
|
||||||
|
|
||||||
|
# If the operator pod/webhooks need to be on the host network.
|
||||||
|
# This is only needed if the control plane cannot connect directly to a pod
|
||||||
|
# for eg. if Calico is used as EKS's default networking
|
||||||
|
# https://docs.tigera.io/calico/3.25/getting-started/kubernetes/managed-public-cloud/eks#install-eks-with-calico-networking
|
||||||
|
hostNetwork: false
|
||||||
|
|
||||||
|
# A set of annotations to be applied to all Speedscale related deployments,
|
||||||
|
# services, jobs, pods, etc.
|
||||||
|
#
|
||||||
|
# Example:
|
||||||
|
# annotation.first: value
|
||||||
|
# annotation.second: value
|
||||||
|
globalAnnotations: {}
|
||||||
|
|
||||||
|
# A set of labels to be applied to all Speedscale related deployments,
|
||||||
|
# services, jobs, pods, etc.
|
||||||
|
#
|
||||||
|
# Example:
|
||||||
|
# label1: value
|
||||||
|
# label2: value
|
||||||
|
globalLabels: {}
|
||||||
|
|
||||||
|
# A full affinity object as detailed: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity
|
||||||
|
affinity: {}
|
||||||
|
|
||||||
|
# The list of tolerations as detailed: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/
|
||||||
|
tolerations: []
|
||||||
|
|
||||||
|
# A nodeselector object as detailed: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes/
|
||||||
|
nodeSelector: {}
|
||||||
|
|
||||||
|
# Deploy a demo app at startup. Set this to an empty string to not deploy.
|
||||||
|
# Valid values: ["java", ""]
|
||||||
|
deployDemo: "java"
|
||||||
|
|
||||||
|
# Proxy connection settings if required by your network. These translate to standard proxy environment
|
||||||
|
# variables HTTP_PROXY, HTTPS_PROXY, and NO_PROXY
|
||||||
|
http_proxy: ""
|
||||||
|
https_proxy: ""
|
||||||
|
no_proxy: ""
|
||||||
|
|
||||||
|
# control if sidecar init containers should run with privileged set
|
||||||
|
privilegedSidecars: false
|
||||||
|
|
||||||
|
# control if the sidecar should enable/disable use of the smart dns lookup feature (requires NET_ADMIN)
|
||||||
|
disableSidecarSmartReverseDNS: false
|
||||||
|
|
||||||
|
# Operator settings. These limits are recommended unless you have a cluster
|
||||||
|
# with a very large number of workloads (for eg. 10k+ deployments, replicasets, etc.).
|
||||||
|
operator:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpu: 500m
|
||||||
|
memory: 512Mi
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 128Mi
|
||||||
|
# how long to wait for the SUT to become ready
|
||||||
|
test_prep_timeout: 10m
|
||||||
|
# timeout for deploying & upgrading control plane components
|
||||||
|
control_plane_timeout: 5m
|
||||||
|
|
||||||
|
|
||||||
|
# Default sidecar settings. Example:
|
||||||
|
# sidecar:
|
||||||
|
# resources:
|
||||||
|
# limits:
|
||||||
|
# cpu: 500m
|
||||||
|
# memory: 512Mi
|
||||||
|
# ephemeral-storage: 100Mi
|
||||||
|
# requests:
|
||||||
|
# cpu: 10m
|
||||||
|
# memory: 32Mi
|
||||||
|
# ephemeral-storage: 100Mi
|
||||||
|
# ignore_src_hosts: example.com, example.org
|
||||||
|
# ignore_src_ips: 8.8.8.8, 1.1.1.1
|
||||||
|
# ignore_dst_hosts: example.com, example.org
|
||||||
|
# ignore_dst_ips: 8.8.8.8, 1.1.1.1
|
||||||
|
# insert_init_first: false
|
||||||
|
# tls_out: false
|
||||||
|
# reinitialize_iptables: false
|
||||||
|
sidecar: {}
|
||||||
|
|
||||||
|
# Forwarder settings
|
||||||
|
# forwarder:
|
||||||
|
# resources:
|
||||||
|
# limits:
|
||||||
|
# cpu: 500m
|
||||||
|
# memory: 500M
|
||||||
|
# requests:
|
||||||
|
# cpu: 300m
|
||||||
|
# memory: 250M
|
||||||
|
forwarder: {}
|
61
index.yaml
61
index.yaml
|
@ -28497,11 +28497,37 @@ entries:
|
||||||
catalog.cattle.io/kube-version: '>=1.16-0'
|
catalog.cattle.io/kube-version: '>=1.16-0'
|
||||||
catalog.cattle.io/release-name: nats
|
catalog.cattle.io/release-name: nats
|
||||||
apiVersion: v2
|
apiVersion: v2
|
||||||
|
appVersion: 2.10.25
|
||||||
|
created: "2025-01-25T00:02:05.266034289Z"
|
||||||
|
description: A Helm chart for the NATS.io High Speed Cloud Native Distributed
|
||||||
|
Communications Technology.
|
||||||
|
digest: eb4540a9c3074057c9d8253adcdb3b2dbf73387307c9777764ba4d3c44b7cc4e
|
||||||
|
home: http://github.com/nats-io/k8s
|
||||||
|
icon: file://assets/icons/nats.png
|
||||||
|
keywords:
|
||||||
|
- nats
|
||||||
|
- messaging
|
||||||
|
- cncf
|
||||||
|
kubeVersion: '>=1.16-0'
|
||||||
|
maintainers:
|
||||||
|
- email: info@nats.io
|
||||||
|
name: The NATS Authors
|
||||||
|
url: https://github.com/nats-io
|
||||||
|
name: nats
|
||||||
|
urls:
|
||||||
|
- assets/nats/nats-1.2.10.tgz
|
||||||
|
version: 1.2.10
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: NATS Server
|
||||||
|
catalog.cattle.io/kube-version: '>=1.16-0'
|
||||||
|
catalog.cattle.io/release-name: nats
|
||||||
|
apiVersion: v2
|
||||||
appVersion: 2.10.24
|
appVersion: 2.10.24
|
||||||
created: "2025-01-15T00:01:38.507163219Z"
|
created: "2025-01-15T00:01:38.507163219Z"
|
||||||
description: A Helm chart for the NATS.io High Speed Cloud Native Distributed
|
description: A Helm chart for the NATS.io High Speed Cloud Native Distributed
|
||||||
Communications Technology.
|
Communications Technology.
|
||||||
digest: d6a315ab17a2dd7bfa3b2f60e8f9031b3463fb7379d3f7750eec0596a1bf8e4d
|
digest: 6c9d6e74f3b4f02fc727902a5b624586b3e909f08bdc9b11d076d22ea10b9d0f
|
||||||
home: http://github.com/nats-io/k8s
|
home: http://github.com/nats-io/k8s
|
||||||
icon: file://assets/icons/nats.png
|
icon: file://assets/icons/nats.png
|
||||||
keywords:
|
keywords:
|
||||||
|
@ -40746,6 +40772,37 @@ entries:
|
||||||
- assets/redpanda/redpanda-4.0.33.tgz
|
- assets/redpanda/redpanda-4.0.33.tgz
|
||||||
version: 4.0.33
|
version: 4.0.33
|
||||||
speedscale-operator:
|
speedscale-operator:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: Speedscale Operator
|
||||||
|
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
||||||
|
catalog.cattle.io/release-name: speedscale-operator
|
||||||
|
apiVersion: v1
|
||||||
|
appVersion: 2.3.149
|
||||||
|
created: "2025-01-25T00:02:07.018624252Z"
|
||||||
|
description: Stress test your APIs with real world scenarios. Collect and replay
|
||||||
|
traffic without scripting.
|
||||||
|
digest: 8daa193ab55b2319f332c1bbc5880e818f5cf076e4ee7fc5876f834d417a013f
|
||||||
|
home: https://speedscale.com
|
||||||
|
icon: file://assets/icons/speedscale-operator.png
|
||||||
|
keywords:
|
||||||
|
- speedscale
|
||||||
|
- test
|
||||||
|
- testing
|
||||||
|
- regression
|
||||||
|
- reliability
|
||||||
|
- load
|
||||||
|
- replay
|
||||||
|
- network
|
||||||
|
- traffic
|
||||||
|
kubeVersion: '>= 1.17.0-0'
|
||||||
|
maintainers:
|
||||||
|
- email: support@speedscale.com
|
||||||
|
name: Speedscale Support
|
||||||
|
name: speedscale-operator
|
||||||
|
urls:
|
||||||
|
- assets/speedscale/speedscale-operator-2.3.149.tgz
|
||||||
|
version: 2.3.149
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: Speedscale Operator
|
catalog.cattle.io/display-name: Speedscale Operator
|
||||||
|
@ -48474,4 +48531,4 @@ entries:
|
||||||
urls:
|
urls:
|
||||||
- assets/netfoundry/ziti-host-1.5.1.tgz
|
- assets/netfoundry/ziti-host-1.5.1.tgz
|
||||||
version: 1.5.1
|
version: 1.5.1
|
||||||
generated: "2025-01-24T00:01:40.139673015Z"
|
generated: "2025-01-25T00:02:01.352221227Z"
|
||||||
|
|
Loading…
Reference in New Issue