Charts CI
``` Updated: argo/argo-cd: - 5.43.4 asserts/asserts: - 1.55.0 bitnami/mariadb: - 13.0.3 bitnami/mysql: - 9.11.0 bitnami/redis: - 17.15.4 bitnami/tomcat: - 10.9.8 bitnami/wordpress: - 17.0.6 datadog/datadog: - 3.33.9 external-secrets/external-secrets: - 0.9.3 gluu/gluu: - 5.0.21 harbor/harbor: - 1.12.4 kong/kong: - 2.26.2 nats/nats: - 1.0.1 redpanda/redpanda: - 5.1.3 speedscale/speedscale-operator: - 1.3.27 ```pull/859/head
parent
deb5737ce0
commit
76bcfa707d
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -1,7 +1,7 @@
|
|||
annotations:
|
||||
artifacthub.io/changes: |
|
||||
- kind: fixed
|
||||
description: add missing permissions to run actions
|
||||
description: Rename comment of repositoryCredentials to credentialTemplates
|
||||
artifacthub.io/signKey: |
|
||||
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
|
||||
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
|
||||
|
@ -33,4 +33,4 @@ name: argo-cd
|
|||
sources:
|
||||
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
|
||||
- https://github.com/argoproj/argo-cd
|
||||
version: 5.43.3
|
||||
version: 5.43.4
|
||||
|
|
|
@ -476,7 +476,7 @@ configs:
|
|||
|
||||
# -- Repositories list to be used by applications
|
||||
## Creates a secret for each key/value specified below to create repositories
|
||||
## Note: the last example in the list would use a repository credential template, configured under "configs.repositoryCredentials".
|
||||
## Note: the last example in the list would use a repository credential template, configured under "configs.credentialTemplates".
|
||||
repositories: {}
|
||||
# istio-helm-repo:
|
||||
# url: https://storage.googleapis.com/istio-prerelease/daily-build/master-latest-daily/charts
|
||||
|
|
|
@ -58,4 +58,4 @@ maintainers:
|
|||
url: https://github.com/asserts
|
||||
name: asserts
|
||||
type: application
|
||||
version: 1.53.0
|
||||
version: 1.55.0
|
||||
|
|
|
@ -7,7 +7,7 @@ data:
|
|||
default.conf: |
|
||||
server {
|
||||
server_name asserts-ui;
|
||||
listen {{ .Values.ui.service.port }};
|
||||
listen {{ .Values.ui.containerPort }};
|
||||
access_log /var/log/nginx/access.log;
|
||||
error_log /var/log/nginx/error.log debug;
|
||||
location /api-server {
|
||||
|
|
|
@ -46,7 +46,7 @@ spec:
|
|||
|
||||
ports:
|
||||
- name: http
|
||||
containerPort: {{ .Values.ui.service.port }}
|
||||
containerPort: {{ .Values.ui.containerPort }}
|
||||
protocol: TCP
|
||||
{{- with .Values.ui.livenessProbe }}
|
||||
livenessProbe: {{- toYaml . | nindent 12 }}
|
||||
|
|
|
@ -155,7 +155,7 @@ server:
|
|||
repository: asserts/asserts-server
|
||||
pullPolicy: IfNotPresent
|
||||
## Overrides the image tag whose default is the chart appVersion.
|
||||
tag: v0.2.709
|
||||
tag: v0.2.733
|
||||
|
||||
resources:
|
||||
requests:
|
||||
|
@ -266,7 +266,7 @@ authorization:
|
|||
repository: asserts/authorization
|
||||
pullPolicy: IfNotPresent
|
||||
## Overrides the image tag whose default is the chart appVersion.
|
||||
tag: v0.2.709
|
||||
tag: v0.2.733
|
||||
|
||||
resources:
|
||||
requests:
|
||||
|
@ -332,10 +332,12 @@ ui:
|
|||
repository: asserts/asserts-ui
|
||||
pullPolicy: IfNotPresent
|
||||
## Overrides the image tag whose default is the chart appVersion.
|
||||
tag: v0.1.1271
|
||||
tag: v0.1.1278
|
||||
|
||||
imagePullSecrets: []
|
||||
|
||||
containerPort: 8080
|
||||
|
||||
service:
|
||||
type: ClusterIP
|
||||
port: 8080
|
||||
|
|
|
@ -6,14 +6,14 @@ annotations:
|
|||
category: Database
|
||||
images: |
|
||||
- name: mariadb
|
||||
image: docker.io/bitnami/mariadb:11.0.2-debian-11-r15
|
||||
image: docker.io/bitnami/mariadb:11.0.3-debian-11-r0
|
||||
- name: mysqld-exporter
|
||||
image: docker.io/bitnami/mysqld-exporter:0.15.0-debian-11-r14
|
||||
image: docker.io/bitnami/mysqld-exporter:0.15.0-debian-11-r17
|
||||
- name: os-shell
|
||||
image: docker.io/bitnami/os-shell:11-debian-11-r34
|
||||
image: docker.io/bitnami/os-shell:11-debian-11-r37
|
||||
licenses: Apache-2.0
|
||||
apiVersion: v2
|
||||
appVersion: 11.0.2
|
||||
appVersion: 11.0.3
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://./charts/common
|
||||
|
@ -37,4 +37,4 @@ maintainers:
|
|||
name: mariadb
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/mariadb
|
||||
version: 13.0.2
|
||||
version: 13.0.3
|
||||
|
|
|
@ -83,10 +83,10 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
### MariaDB common parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| -------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- |
|
||||
| -------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- |
|
||||
| `image.registry` | MariaDB image registry | `docker.io` |
|
||||
| `image.repository` | MariaDB image repository | `bitnami/mariadb` |
|
||||
| `image.tag` | MariaDB image tag (immutable tags are recommended) | `11.0.2-debian-11-r15` |
|
||||
| `image.tag` | MariaDB image tag (immutable tags are recommended) | `11.0.3-debian-11-r0` |
|
||||
| `image.digest` | MariaDB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `image.pullPolicy` | MariaDB image pull policy | `IfNotPresent` |
|
||||
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
|
@ -308,7 +308,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` |
|
||||
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
|
||||
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` |
|
||||
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r34` |
|
||||
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r37` |
|
||||
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
|
||||
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
|
@ -322,7 +322,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `metrics.enabled` | Start a side-car prometheus exporter | `false` |
|
||||
| `metrics.image.registry` | Exporter image registry | `docker.io` |
|
||||
| `metrics.image.repository` | Exporter image repository | `bitnami/mysqld-exporter` |
|
||||
| `metrics.image.tag` | Exporter image tag (immutable tags are recommended) | `0.15.0-debian-11-r14` |
|
||||
| `metrics.image.tag` | Exporter image tag (immutable tags are recommended) | `0.15.0-debian-11-r17` |
|
||||
| `metrics.image.digest` | Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `metrics.image.pullPolicy` | Exporter image pull policy | `IfNotPresent` |
|
||||
| `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
|
|
|
@ -90,7 +90,7 @@ serviceBindings:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/mariadb
|
||||
tag: 11.0.2-debian-11-r15
|
||||
tag: 11.0.3-debian-11-r0
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
@ -1004,7 +1004,7 @@ volumePermissions:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/os-shell
|
||||
tag: 11-debian-11-r34
|
||||
tag: 11-debian-11-r37
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace)
|
||||
|
@ -1040,7 +1040,7 @@ metrics:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/mysqld-exporter
|
||||
tag: 0.15.0-debian-11-r14
|
||||
tag: 0.15.0-debian-11-r17
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace)
|
||||
|
|
|
@ -29,4 +29,4 @@ maintainers:
|
|||
name: mysql
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/mysql
|
||||
version: 9.10.10
|
||||
version: 9.11.0
|
||||
|
|
|
@ -101,6 +101,8 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `auth.customPasswordFiles` | Use custom password files when `auth.usePasswordFiles` is set to `true`. Define path for keys `root` and `user`, also define `replicator` if `architecture` is set to `replication` | `{}` |
|
||||
| `initdbScripts` | Dictionary of initdb scripts | `{}` |
|
||||
| `initdbScriptsConfigMap` | ConfigMap with the initdb scripts (Note: Overrides `initdbScripts`) | `""` |
|
||||
| `startdbScripts` | Dictionary of startdb scripts | `{}` |
|
||||
| `startdbScriptsConfigMap` | ConfigMap with the startdb scripts (Note: Overrides `startdbScripts`) | `""` |
|
||||
|
||||
### MySQL Primary parameters
|
||||
|
||||
|
|
|
@ -56,6 +56,17 @@ Get the initialization scripts ConfigMap name.
|
|||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Get the startdb scripts ConfigMap name.
|
||||
*/}}
|
||||
{{- define "mysql.startdbScriptsCM" -}}
|
||||
{{- if .Values.startdbScriptsConfigMap -}}
|
||||
{{- printf "%s" (tpl .Values.startdbScriptsConfigMap $) -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s-start-scripts" (include "mysql.primary.fullname" .) -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Returns the proper service account name depending if an explicit service account name is set
|
||||
in the values file. If the name is not set it will default to either mysql.fullname if serviceAccount.create
|
||||
|
|
|
@ -0,0 +1,21 @@
|
|||
{{- /*
|
||||
Copyright VMware, Inc.
|
||||
SPDX-License-Identifier: APACHE-2.0
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.startdbScripts (not .Values.startdbScriptsConfigMap) }}
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ printf "%s-start-scripts" (include "mysql.primary.fullname" .) }}
|
||||
namespace: {{ include "common.names.namespace" . | quote }}
|
||||
labels: {{- include "common.labels.standard" . | nindent 4 }}
|
||||
{{- if .Values.commonLabels }}
|
||||
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- if .Values.commonAnnotations }}
|
||||
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
|
||||
{{- end }}
|
||||
data:
|
||||
{{- include "common.tplvalues.render" (dict "value" .Values.startdbScripts "context" .) | nindent 2 }}
|
||||
{{- end }}
|
|
@ -254,6 +254,10 @@ spec:
|
|||
- name: custom-init-scripts
|
||||
mountPath: /docker-entrypoint-initdb.d
|
||||
{{- end }}
|
||||
{{- if or .Values.startdbScriptsConfigMap .Values.startdbScripts }}
|
||||
- name: custom-start-scripts
|
||||
mountPath: /docker-entrypoint-startdb.d
|
||||
{{- end }}
|
||||
{{- if or .Values.primary.configuration .Values.primary.existingConfigmap }}
|
||||
- name: config
|
||||
mountPath: /opt/bitnami/mysql/conf/my.cnf
|
||||
|
@ -338,6 +342,11 @@ spec:
|
|||
configMap:
|
||||
name: {{ include "mysql.initdbScriptsCM" . }}
|
||||
{{- end }}
|
||||
{{- if or .Values.startdbScriptsConfigMap .Values.startdbScripts }}
|
||||
- name: custom-start-scripts
|
||||
configMap:
|
||||
name: {{ include "mysql.startdbScriptsCM" . }}
|
||||
{{- end }}
|
||||
{{- if and .Values.auth.usePasswordFiles (not .Values.auth.customPasswordFiles) }}
|
||||
- name: mysql-credentials
|
||||
secret:
|
||||
|
|
|
@ -238,6 +238,10 @@ spec:
|
|||
- name: custom-init-scripts
|
||||
mountPath: /docker-entrypoint-initdb.d
|
||||
{{- end }}
|
||||
{{- if or .Values.startdbScriptsConfigMap .Values.startdbScripts }}
|
||||
- name: custom-start-scripts
|
||||
mountPath: /docker-entrypoint-startdb.d
|
||||
{{- end }}
|
||||
{{- if or .Values.secondary.configuration .Values.secondary.existingConfigmap }}
|
||||
- name: config
|
||||
mountPath: /opt/bitnami/mysql/conf/my.cnf
|
||||
|
@ -317,6 +321,11 @@ spec:
|
|||
configMap:
|
||||
name: {{ include "mysql.initdbScriptsCM" . }}
|
||||
{{- end }}
|
||||
{{- if or .Values.startdbScriptsConfigMap .Values.startdbScripts }}
|
||||
- name: custom-start-scripts
|
||||
configMap:
|
||||
name: {{ include "mysql.startdbScriptsCM" . }}
|
||||
{{- end }}
|
||||
{{- if or .Values.secondary.configuration .Values.secondary.existingConfigmap }}
|
||||
- name: config
|
||||
configMap:
|
||||
|
|
|
@ -162,6 +162,18 @@ initdbScripts: {}
|
|||
## @param initdbScriptsConfigMap ConfigMap with the initdb scripts (Note: Overrides `initdbScripts`)
|
||||
##
|
||||
initdbScriptsConfigMap: ""
|
||||
## @param startdbScripts Dictionary of startdb scripts
|
||||
## Specify dictionary of scripts to be run every time the container is started
|
||||
## Example:
|
||||
## startdbScripts:
|
||||
## my_start_script.sh: |
|
||||
## #!/bin/bash
|
||||
## echo "Do something."
|
||||
##
|
||||
startdbScripts: {}
|
||||
## @param startdbScriptsConfigMap ConfigMap with the startdb scripts (Note: Overrides `startdbScripts`)
|
||||
##
|
||||
startdbScriptsConfigMap: ""
|
||||
|
||||
## @section MySQL Primary parameters
|
||||
##
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
dependencies:
|
||||
- name: common
|
||||
repository: oci://registry-1.docker.io/bitnamicharts
|
||||
version: 2.6.0
|
||||
digest: sha256:6ce7c85dcb43ad1fc5ff600850f28820ddc2f1a7c8cb25c5ff542fe1f852165a
|
||||
generated: "2023-07-11T00:07:23.31761598Z"
|
||||
version: 2.8.0
|
||||
digest: sha256:0119fce6b509ebf3eaf5218f87f6ec0af64ec7da15f272115673b0716c4b6919
|
||||
generated: "2023-08-15T14:43:37.28793586Z"
|
||||
|
|
|
@ -4,9 +4,18 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: redis
|
||||
category: Database
|
||||
images: |
|
||||
- name: os-shell
|
||||
image: docker.io/bitnami/os-shell:11-debian-11-r37
|
||||
- name: redis-exporter
|
||||
image: docker.io/bitnami/redis-exporter:1.52.0-debian-11-r17
|
||||
- name: redis-sentinel
|
||||
image: docker.io/bitnami/redis-sentinel:7.2.0-debian-11-r0
|
||||
- name: redis
|
||||
image: docker.io/bitnami/redis:7.2.0-debian-11-r0
|
||||
licenses: Apache-2.0
|
||||
apiVersion: v2
|
||||
appVersion: 7.0.12
|
||||
appVersion: 7.2.0
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://./charts/common
|
||||
|
@ -28,4 +37,4 @@ maintainers:
|
|||
name: redis
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/redis
|
||||
version: 17.15.2
|
||||
version: 17.15.4
|
||||
|
|
|
@ -98,10 +98,10 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
### Redis® Image parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| ------------------- | ---------------------------------------------------------------------------------------------------------- | ---------------------- |
|
||||
| ------------------- | ---------------------------------------------------------------------------------------------------------- | -------------------- |
|
||||
| `image.registry` | Redis® image registry | `docker.io` |
|
||||
| `image.repository` | Redis® image repository | `bitnami/redis` |
|
||||
| `image.tag` | Redis® image tag (immutable tags are recommended) | `7.0.12-debian-11-r19` |
|
||||
| `image.tag` | Redis® image tag (immutable tags are recommended) | `7.2.0-debian-11-r0` |
|
||||
| `image.digest` | Redis® image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `image.pullPolicy` | Redis® image pull policy | `IfNotPresent` |
|
||||
| `image.pullSecrets` | Redis® image pull secrets | `[]` |
|
||||
|
@ -345,7 +345,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `sentinel.enabled` | Use Redis® Sentinel on Redis® pods. | `false` |
|
||||
| `sentinel.image.registry` | Redis® Sentinel image registry | `docker.io` |
|
||||
| `sentinel.image.repository` | Redis® Sentinel image repository | `bitnami/redis-sentinel` |
|
||||
| `sentinel.image.tag` | Redis® Sentinel image tag (immutable tags are recommended) | `7.0.12-debian-11-r18` |
|
||||
| `sentinel.image.tag` | Redis® Sentinel image tag (immutable tags are recommended) | `7.2.0-debian-11-r0` |
|
||||
| `sentinel.image.digest` | Redis® Sentinel image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `sentinel.image.pullPolicy` | Redis® Sentinel image pull policy | `IfNotPresent` |
|
||||
| `sentinel.image.pullSecrets` | Redis® Sentinel image pull secrets | `[]` |
|
||||
|
@ -468,7 +468,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `metrics.enabled` | Start a sidecar prometheus exporter to expose Redis® metrics | `false` |
|
||||
| `metrics.image.registry` | Redis® Exporter image registry | `docker.io` |
|
||||
| `metrics.image.repository` | Redis® Exporter image repository | `bitnami/redis-exporter` |
|
||||
| `metrics.image.tag` | Redis® Exporter image tag (immutable tags are recommended) | `1.52.0-debian-11-r5` |
|
||||
| `metrics.image.tag` | Redis® Exporter image tag (immutable tags are recommended) | `1.52.0-debian-11-r17` |
|
||||
| `metrics.image.digest` | Redis® Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `metrics.image.pullPolicy` | Redis® Exporter image pull policy | `IfNotPresent` |
|
||||
| `metrics.image.pullSecrets` | Redis® Exporter image pull secrets | `[]` |
|
||||
|
@ -541,7 +541,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
|
||||
| `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` |
|
||||
| `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` |
|
||||
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r25` |
|
||||
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r37` |
|
||||
| `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` |
|
||||
| `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` |
|
||||
|
@ -551,7 +551,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `sysctl.enabled` | Enable init container to modify Kernel settings | `false` |
|
||||
| `sysctl.image.registry` | OS Shell + Utility image registry | `docker.io` |
|
||||
| `sysctl.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` |
|
||||
| `sysctl.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r25` |
|
||||
| `sysctl.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r37` |
|
||||
| `sysctl.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `sysctl.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` |
|
||||
| `sysctl.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` |
|
||||
|
|
|
@ -2,7 +2,7 @@ annotations:
|
|||
category: Infrastructure
|
||||
licenses: Apache-2.0
|
||||
apiVersion: v2
|
||||
appVersion: 2.6.0
|
||||
appVersion: 2.8.0
|
||||
description: A Library Helm Chart for grouping common logic between bitnami charts.
|
||||
This chart is not deployable by itself.
|
||||
home: https://bitnami.com
|
||||
|
@ -20,4 +20,4 @@ name: common
|
|||
sources:
|
||||
- https://github.com/bitnami/charts
|
||||
type: library
|
||||
version: 2.6.0
|
||||
version: 2.8.0
|
||||
|
|
|
@ -724,13 +724,13 @@ spec:
|
|||
{{- end }}
|
||||
{{- if not .Values.replica.persistence.enabled }}
|
||||
- name: redis-data
|
||||
{{- if or .Values.sentinel.persistence.medium .Values.sentinel.persistence.sizeLimit }}
|
||||
{{- if or .Values.replica.persistence.medium .Values.replica.persistence.sizeLimit }}
|
||||
emptyDir:
|
||||
{{- if .Values.sentinel.persistence.medium }}
|
||||
medium: {{ .Values.sentinel.persistence.medium | quote }}
|
||||
{{- if .Values.replica.persistence.medium }}
|
||||
medium: {{ .Values.replica.persistence.medium | quote }}
|
||||
{{- end }}
|
||||
{{- if .Values.sentinel.persistence.sizeLimit }}
|
||||
sizeLimit: {{ .Values.sentinel.persistence.sizeLimit | quote }}
|
||||
{{- if .Values.replica.persistence.sizeLimit }}
|
||||
sizeLimit: {{ .Values.replica.persistence.sizeLimit | quote }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
emptyDir: {}
|
||||
|
|
|
@ -91,7 +91,7 @@ diagnosticMode:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/redis
|
||||
tag: 7.0.12-debian-11-r19
|
||||
tag: 7.2.0-debian-11-r0
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
@ -1030,7 +1030,7 @@ sentinel:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/redis-sentinel
|
||||
tag: 7.0.12-debian-11-r18
|
||||
tag: 7.2.0-debian-11-r0
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
@ -1484,7 +1484,7 @@ metrics:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/redis-exporter
|
||||
tag: 1.52.0-debian-11-r5
|
||||
tag: 1.52.0-debian-11-r17
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
@ -1758,7 +1758,7 @@ volumePermissions:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/os-shell
|
||||
tag: 11-debian-11-r25
|
||||
tag: 11-debian-11-r37
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
@ -1806,7 +1806,7 @@ sysctl:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/os-shell
|
||||
tag: 11-debian-11-r25
|
||||
tag: 11-debian-11-r37
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
|
|
@ -6,14 +6,14 @@ annotations:
|
|||
category: ApplicationServer
|
||||
images: |
|
||||
- name: jmx-exporter
|
||||
image: docker.io/bitnami/jmx-exporter:0.19.0-debian-11-r36
|
||||
image: docker.io/bitnami/jmx-exporter:0.19.0-debian-11-r42
|
||||
- name: os-shell
|
||||
image: docker.io/bitnami/os-shell:11-debian-11-r31
|
||||
image: docker.io/bitnami/os-shell:11-debian-11-r37
|
||||
- name: tomcat
|
||||
image: docker.io/bitnami/tomcat:10.1.11-debian-11-r25
|
||||
image: docker.io/bitnami/tomcat:10.1.12-debian-11-r0
|
||||
licenses: Apache-2.0
|
||||
apiVersion: v2
|
||||
appVersion: 10.1.11
|
||||
appVersion: 10.1.12
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://./charts/common
|
||||
|
@ -38,4 +38,4 @@ maintainers:
|
|||
name: tomcat
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/tomcat
|
||||
version: 10.9.7
|
||||
version: 10.9.8
|
||||
|
|
|
@ -78,10 +78,10 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
### Tomcat parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| ----------------------------- | ------------------------------------------------------------------------------------------------------ | ----------------------- |
|
||||
| ----------------------------- | ------------------------------------------------------------------------------------------------------ | ---------------------- |
|
||||
| `image.registry` | Tomcat image registry | `docker.io` |
|
||||
| `image.repository` | Tomcat image repository | `bitnami/tomcat` |
|
||||
| `image.tag` | Tomcat image tag (immutable tags are recommended) | `10.1.11-debian-11-r25` |
|
||||
| `image.tag` | Tomcat image tag (immutable tags are recommended) | `10.1.12-debian-11-r0` |
|
||||
| `image.digest` | Tomcat image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `image.pullPolicy` | Tomcat image pull policy | `IfNotPresent` |
|
||||
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
|
@ -203,7 +203,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory | `false` |
|
||||
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
|
||||
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` |
|
||||
| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r31` |
|
||||
| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r37` |
|
||||
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
|
||||
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
|
@ -218,7 +218,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `metrics.jmx.catalinaOpts` | custom option used to enabled JMX on tomcat jvm evaluated as template | `-Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=5555 -Dcom.sun.management.jmxremote.authenticate=false -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.local.only=true` |
|
||||
| `metrics.jmx.image.registry` | JMX exporter image registry | `docker.io` |
|
||||
| `metrics.jmx.image.repository` | JMX exporter image repository | `bitnami/jmx-exporter` |
|
||||
| `metrics.jmx.image.tag` | JMX exporter image tag (immutable tags are recommended) | `0.19.0-debian-11-r36` |
|
||||
| `metrics.jmx.image.tag` | JMX exporter image tag (immutable tags are recommended) | `0.19.0-debian-11-r42` |
|
||||
| `metrics.jmx.image.digest` | JMX exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `metrics.jmx.image.pullPolicy` | JMX exporter image pull policy | `IfNotPresent` |
|
||||
| `metrics.jmx.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
|
|
|
@ -61,7 +61,7 @@ extraDeploy: []
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/tomcat
|
||||
tag: 10.1.11-debian-11-r25
|
||||
tag: 10.1.12-debian-11-r0
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
@ -585,7 +585,7 @@ volumePermissions:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/os-shell
|
||||
tag: 11-debian-11-r31
|
||||
tag: 11-debian-11-r37
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
@ -645,7 +645,7 @@ metrics:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/jmx-exporter
|
||||
tag: 0.19.0-debian-11-r36
|
||||
tag: 0.19.0-debian-11-r42
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
|
|
@ -7,6 +7,6 @@ dependencies:
|
|||
version: 13.0.1
|
||||
- name: common
|
||||
repository: oci://registry-1.docker.io/bitnamicharts
|
||||
version: 2.6.0
|
||||
digest: sha256:f847966e025977ebca1a0dc4e2c3d9791d163d777b4ae9c05d376420c453c545
|
||||
generated: "2023-08-08T02:18:40.608494532Z"
|
||||
version: 2.8.0
|
||||
digest: sha256:6673a506e0b94a7a76bd60678f2412846c9cad47d64c138d59239bbabd6b5520
|
||||
generated: "2023-08-10T19:34:26.825906009Z"
|
||||
|
|
|
@ -6,14 +6,14 @@ annotations:
|
|||
category: CMS
|
||||
images: |
|
||||
- name: apache-exporter
|
||||
image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r8
|
||||
image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r11
|
||||
- name: os-shell
|
||||
image: docker.io/bitnami/os-shell:11-debian-11-r31
|
||||
image: docker.io/bitnami/os-shell:11-debian-11-r34
|
||||
- name: wordpress
|
||||
image: docker.io/bitnami/wordpress:6.2.2-debian-11-r82
|
||||
image: docker.io/bitnami/wordpress:6.3.0-debian-11-r0
|
||||
licenses: Apache-2.0
|
||||
apiVersion: v2
|
||||
appVersion: 6.2.2
|
||||
appVersion: 6.3.0
|
||||
dependencies:
|
||||
- condition: memcached.enabled
|
||||
name: memcached
|
||||
|
@ -47,4 +47,4 @@ maintainers:
|
|||
name: wordpress
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
|
||||
version: 17.0.5
|
||||
version: 17.0.6
|
||||
|
|
|
@ -79,10 +79,10 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
### WordPress Image parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| ------------------- | --------------------------------------------------------------------------------------------------------- | --------------------- |
|
||||
| ------------------- | --------------------------------------------------------------------------------------------------------- | -------------------- |
|
||||
| `image.registry` | WordPress image registry | `docker.io` |
|
||||
| `image.repository` | WordPress image repository | `bitnami/wordpress` |
|
||||
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.2.2-debian-11-r82` |
|
||||
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.3.0-debian-11-r0` |
|
||||
| `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` |
|
||||
| `image.pullSecrets` | WordPress image pull secrets | `[]` |
|
||||
|
@ -249,7 +249,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
|
||||
| `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` |
|
||||
| `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` |
|
||||
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r31` |
|
||||
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r34` |
|
||||
| `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` |
|
||||
| `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` |
|
||||
|
@ -281,7 +281,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `metrics.enabled` | Start a sidecar prometheus exporter to expose metrics | `false` |
|
||||
| `metrics.image.registry` | Apache exporter image registry | `docker.io` |
|
||||
| `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` |
|
||||
| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.1-debian-11-r8` |
|
||||
| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.1-debian-11-r11` |
|
||||
| `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` |
|
||||
| `metrics.image.pullSecrets` | Apache exporter image pull secrets | `[]` |
|
||||
|
|
|
@ -2,7 +2,7 @@ annotations:
|
|||
category: Infrastructure
|
||||
licenses: Apache-2.0
|
||||
apiVersion: v2
|
||||
appVersion: 2.6.0
|
||||
appVersion: 2.8.0
|
||||
description: A Library Helm Chart for grouping common logic between bitnami charts.
|
||||
This chart is not deployable by itself.
|
||||
home: https://bitnami.com
|
||||
|
@ -20,4 +20,4 @@ name: common
|
|||
sources:
|
||||
- https://github.com/bitnami/charts
|
||||
type: library
|
||||
version: 2.6.0
|
||||
version: 2.8.0
|
||||
|
|
|
@ -76,7 +76,7 @@ diagnosticMode:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/wordpress
|
||||
tag: 6.2.2-debian-11-r82
|
||||
tag: 6.3.0-debian-11-r0
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
@ -766,7 +766,7 @@ volumePermissions:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/os-shell
|
||||
tag: 11-debian-11-r31
|
||||
tag: 11-debian-11-r34
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
@ -860,7 +860,7 @@ metrics:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/apache-exporter
|
||||
tag: 1.0.1-debian-11-r8
|
||||
tag: 1.0.1-debian-11-r11
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
|
|
@ -1,5 +1,9 @@
|
|||
# Datadog changelog
|
||||
|
||||
## 3.33.9
|
||||
|
||||
* Add `fips.customFipsConfig` parameter to allow configuring FIPS proxy sidecar `datadog-fips-proxy.cfg` using a ConfigMap.
|
||||
|
||||
## 3.33.8
|
||||
|
||||
* Remove `mountPropagation` for `/etc/os-release` files.
|
||||
|
|
|
@ -19,4 +19,4 @@ name: datadog
|
|||
sources:
|
||||
- https://app.datadoghq.com/account/settings#agent/kubernetes
|
||||
- https://github.com/DataDog/datadog-agent
|
||||
version: 3.33.8
|
||||
version: 3.33.9
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Datadog
|
||||
|
||||
![Version: 3.33.8](https://img.shields.io/badge/Version-3.33.8-informational?style=flat-square) ![AppVersion: 7](https://img.shields.io/badge/AppVersion-7-informational?style=flat-square)
|
||||
![Version: 3.33.9](https://img.shields.io/badge/Version-3.33.9-informational?style=flat-square) ![AppVersion: 7](https://img.shields.io/badge/AppVersion-7-informational?style=flat-square)
|
||||
|
||||
[Datadog](https://www.datadoghq.com/) is a hosted infrastructure monitoring platform. This chart adds the Datadog Agent to all nodes in your cluster via a DaemonSet. It also optionally depends on the [kube-state-metrics chart](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-state-metrics). For more information about monitoring Kubernetes with Datadog, please refer to the [Datadog documentation website](https://docs.datadoghq.com/agent/basic_agent_usage/kubernetes/).
|
||||
|
||||
|
@ -733,11 +733,12 @@ helm install <RELEASE_NAME> \
|
|||
| existingClusterAgent.join | bool | `false` | set this to true if you want the agents deployed by this chart to connect to a Cluster Agent deployed independently |
|
||||
| existingClusterAgent.serviceName | string | `nil` | Existing service name to use for reaching the external Cluster Agent |
|
||||
| existingClusterAgent.tokenSecretName | string | `nil` | Existing secret name to use for external Cluster Agent token |
|
||||
| fips.customFipsConfig | object | `{}` | Configure a custom configMap to provide the FIPS configuration. Specify custom contents for the FIPS proxy sidecar container config (/etc/datadog-fips-proxy/datadog-fips-proxy.cfg). If empty, the default FIPS proxy sidecar container config is used. |
|
||||
| fips.enabled | bool | `false` | |
|
||||
| fips.image.digest | string | `""` | Define the FIPS sidecar image digest to use, takes precedence over `fips.image.tag` if specified. |
|
||||
| fips.image.name | string | `"fips-proxy"` | |
|
||||
| fips.image.pullPolicy | string | `"IfNotPresent"` | Datadog the FIPS sidecar image pull policy |
|
||||
| fips.image.repository | string | `nil` | |
|
||||
| fips.image.repository | string | `nil` | Override default registry + image.name for the FIPS sidecar container. |
|
||||
| fips.image.tag | string | `"0.5.4"` | Define the FIPS sidecar container version to use. |
|
||||
| fips.local_address | string | `"127.0.0.1"` | |
|
||||
| fips.port | int | `9803` | |
|
||||
|
|
|
@ -0,0 +1,26 @@
|
|||
datadog:
|
||||
apiKey: "00000000000000000000000000000000"
|
||||
appKey: "0000000000000000000000000000000000000000"
|
||||
|
||||
fips:
|
||||
enabled: true
|
||||
use_https: false
|
||||
customFipsConfig: |
|
||||
global
|
||||
presetenv DD_FIPS_LOCAL_ADDRESS 127.0.0.1
|
||||
log 127.0.0.1 local0
|
||||
ssl-default-server-ciphers ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-GCM-SHA384:!aNULL:!eNULL:!EXPORT
|
||||
ssl-default-bind-options no-sslv3 no-tlsv10 no-tlsv11 no-tlsv13
|
||||
ssl-default-server-options no-sslv3 no-tlsv10 no-tlsv11 no-tlsv13
|
||||
default-path config
|
||||
|
||||
# Some sane defaults
|
||||
defaults
|
||||
log global
|
||||
option dontlognull
|
||||
retries 3
|
||||
option redispatch
|
||||
timeout client 5s
|
||||
timeout server 5s
|
||||
timeout connect 5s
|
||||
default-server verify required ca-file ca-certificates.crt check inter 10s resolvers my-dns init-addr none resolve-prefer ipv4
|
|
@ -167,6 +167,9 @@
|
|||
mountPath: /tmp
|
||||
readOnly: false # Need RW to write to /tmp directory
|
||||
{{- include "linux-container-host-release-volumemounts" . | nindent 4 }}
|
||||
{{- if eq (include "should-mount-fips-configmap" .) "true" }}
|
||||
{{- include "linux-container-fips-proxy-cfg-volumemount" . | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
- name: config
|
||||
mountPath: {{ template "datadog.confPath" . }}
|
||||
|
|
|
@ -16,6 +16,10 @@
|
|||
resources:
|
||||
{{ toYaml .Values.fips.resources | indent 4 }}
|
||||
# TODO Add config to monitor journald
|
||||
{{- if eq (include "should-mount-fips-configmap" .) "true" }}
|
||||
volumeMounts:
|
||||
{{- include "linux-container-fips-proxy-cfg-volumemount" . | nindent 4 }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "fips-envvar" -}}
|
||||
|
@ -30,3 +34,19 @@
|
|||
value: {{ .Values.fips.local_address | quote }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "linux-container-fips-proxy-cfg-volumemount" -}}
|
||||
- name: fips-proxy-cfg
|
||||
mountPath: /etc/datadog-fips-proxy/datadog-fips-proxy.cfg
|
||||
subPath: datadog-fips-proxy.cfg
|
||||
readOnly: true
|
||||
{{- end -}}
|
||||
|
||||
{{- define "linux-container-fips-proxy-cfg-volume" -}}
|
||||
- name: fips-proxy-cfg
|
||||
configMap:
|
||||
name: {{ include "fips-useConfigMap-configmap-name" . }}
|
||||
items:
|
||||
- key: datadog-fips-proxy.cfg
|
||||
path: datadog-fips-proxy.cfg
|
||||
{{- end -}}
|
||||
|
|
|
@ -27,10 +27,8 @@
|
|||
name: etc-lsb-release
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- if eq (include "should-enable-fips" .) "true" }}
|
||||
- name: fips-config
|
||||
configMap:
|
||||
name: {{ template "datadog.fullname" . }}-fips-config
|
||||
{{- if eq (include "should-enable-fips" . ) "true" }}
|
||||
{{ include "linux-container-fips-proxy-cfg-volume" . }}
|
||||
{{- end }}
|
||||
{{- if eq (include "should-mount-hostPath-for-dsd-socket" .) "true" }}
|
||||
- hostPath:
|
||||
|
|
|
@ -328,6 +328,17 @@ false
|
|||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return true if the fips side car configMap should be mounted.
|
||||
*/}}
|
||||
{{- define "should-mount-fips-configmap" -}}
|
||||
{{- if and (eq (include "should-enable-fips" .) "true") (not (empty .Values.fips.customFipsConfig)) -}}
|
||||
true
|
||||
{{- else -}}
|
||||
false
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return true if the security-agent container should be created.
|
||||
*/}}
|
||||
|
@ -536,6 +547,14 @@ datadog-agent-checksd
|
|||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "fips-useConfigMap-configmap-name" -}}
|
||||
{{- if .Values.providers.gke.autopilot -}}
|
||||
datadog-agent-fips-config
|
||||
{{- else -}}
|
||||
{{ template "datadog.fullname" . }}-fips-config
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Common template labels
|
||||
*/}}
|
||||
|
|
|
@ -211,6 +211,9 @@ spec:
|
|||
- name: config
|
||||
mountPath: {{ template "datadog.confPath" . }}
|
||||
readOnly: false # Need RW for config path
|
||||
{{- if eq (include "should-mount-fips-configmap" .) "true" }}
|
||||
{{- include "linux-container-fips-proxy-cfg-volumemount" . | indent 10 }}
|
||||
{{- end }}
|
||||
{{- if .Values.clusterChecksRunner.volumeMounts }}
|
||||
{{ toYaml .Values.clusterChecksRunner.volumeMounts | indent 10 }}
|
||||
{{- end }}
|
||||
|
@ -233,6 +236,9 @@ spec:
|
|||
- name: checksd
|
||||
configMap:
|
||||
name: {{ include "datadog-checksd-configmap-name" . }}
|
||||
{{- end }}
|
||||
{{- if eq (include "should-mount-fips-configmap" .) "true"}}
|
||||
{{ include "linux-container-fips-proxy-cfg-volume" . | indent 8}}
|
||||
{{- end }}
|
||||
affinity:
|
||||
{{- if .Values.clusterChecksRunner.affinity }}
|
||||
|
|
|
@ -400,6 +400,9 @@ spec:
|
|||
{{- end}}
|
||||
- name: config
|
||||
emptyDir: {}
|
||||
{{- if eq (include "should-mount-fips-configmap" .) "true"}}
|
||||
{{ include "linux-container-fips-proxy-cfg-volume" . | indent 8}}
|
||||
{{- end }}
|
||||
{{- if .Values.clusterAgent.volumes }}
|
||||
{{ toYaml .Values.clusterAgent.volumes | indent 8 }}
|
||||
{{- end }}
|
||||
|
|
|
@ -0,0 +1,12 @@
|
|||
{{- if eq (include "should-mount-fips-configmap" .) "true" }}
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ include "fips-useConfigMap-configmap-name" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
{{ include "datadog.labels" . | indent 4 }}
|
||||
data:
|
||||
datadog-fips-proxy.cfg: |
|
||||
{{ tpl (.Values.fips.customFipsConfig) . | indent 4 }}
|
||||
{{- end }}
|
|
@ -1179,9 +1179,17 @@ fips:
|
|||
# fips.image.digest -- Define the FIPS sidecar image digest to use, takes precedence over `fips.image.tag` if specified.
|
||||
digest: ""
|
||||
|
||||
# agents.image.repository -- Override default registry + image.name for Agent
|
||||
# fips.image.repository -- Override default registry + image.name for the FIPS sidecar container.
|
||||
repository:
|
||||
|
||||
# fips.customFipsConfig -- Configure a custom configMap to provide the FIPS configuration. Specify custom contents for the FIPS proxy sidecar container config (/etc/datadog-fips-proxy/datadog-fips-proxy.cfg). If empty, the default FIPS proxy sidecar container config is used.
|
||||
|
||||
## Note: Use `|` to declare multi-line configuration.
|
||||
## ref: https://docs.datadoghq.com/agent/guide/agent-fips-proxy
|
||||
customFipsConfig: {} # |
|
||||
# foobar
|
||||
# foo bar baz
|
||||
|
||||
agents:
|
||||
# agents.enabled -- You should keep Datadog DaemonSet enabled!
|
||||
|
||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>= 1.19.0-0'
|
||||
catalog.cattle.io/release-name: external-secrets
|
||||
apiVersion: v2
|
||||
appVersion: v0.9.2
|
||||
appVersion: v0.9.3
|
||||
description: External secret management for Kubernetes
|
||||
home: https://github.com/external-secrets/external-secrets
|
||||
icon: https://raw.githubusercontent.com/external-secrets/external-secrets/main/assets/eso-logo-large.png
|
||||
|
@ -17,4 +17,4 @@ maintainers:
|
|||
name: mcavoyk
|
||||
name: external-secrets
|
||||
type: application
|
||||
version: 0.9.2
|
||||
version: 0.9.3
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
|
||||
[//]: # (README.md generated by gotmpl. DO NOT EDIT.)
|
||||
|
||||
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.2](https://img.shields.io/badge/Version-0.9.2-informational?style=flat-square)
|
||||
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.3](https://img.shields.io/badge/Version-0.9.3-informational?style=flat-square)
|
||||
|
||||
External secret management for Kubernetes
|
||||
|
||||
|
|
|
@ -7,8 +7,8 @@ should match snapshot of default values:
|
|||
app.kubernetes.io/instance: RELEASE-NAME
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/version: v0.9.2
|
||||
helm.sh/chart: external-secrets-0.9.2
|
||||
app.kubernetes.io/version: v0.9.3
|
||||
helm.sh/chart: external-secrets-0.9.3
|
||||
name: RELEASE-NAME-external-secrets-cert-controller
|
||||
namespace: NAMESPACE
|
||||
spec:
|
||||
|
@ -35,7 +35,7 @@ should match snapshot of default values:
|
|||
- --secret-namespace=NAMESPACE
|
||||
- --metrics-addr=:8080
|
||||
- --healthz-addr=:8081
|
||||
image: ghcr.io/external-secrets/external-secrets:v0.9.2
|
||||
image: ghcr.io/external-secrets/external-secrets:v0.9.3
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: cert-controller
|
||||
ports:
|
||||
|
|
|
@ -7,8 +7,8 @@ should match snapshot of default values:
|
|||
app.kubernetes.io/instance: RELEASE-NAME
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/version: v0.9.2
|
||||
helm.sh/chart: external-secrets-0.9.2
|
||||
app.kubernetes.io/version: v0.9.3
|
||||
helm.sh/chart: external-secrets-0.9.3
|
||||
name: RELEASE-NAME-external-secrets
|
||||
namespace: NAMESPACE
|
||||
spec:
|
||||
|
@ -28,7 +28,7 @@ should match snapshot of default values:
|
|||
containers:
|
||||
- args:
|
||||
- --concurrent=1
|
||||
image: ghcr.io/external-secrets/external-secrets:v0.9.2
|
||||
image: ghcr.io/external-secrets/external-secrets:v0.9.3
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: external-secrets
|
||||
ports:
|
||||
|
|
|
@ -7,8 +7,8 @@ should match snapshot of default values:
|
|||
app.kubernetes.io/instance: RELEASE-NAME
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/version: v0.9.2
|
||||
helm.sh/chart: external-secrets-0.9.2
|
||||
app.kubernetes.io/version: v0.9.3
|
||||
helm.sh/chart: external-secrets-0.9.3
|
||||
name: RELEASE-NAME-external-secrets-webhook
|
||||
namespace: NAMESPACE
|
||||
spec:
|
||||
|
@ -34,7 +34,7 @@ should match snapshot of default values:
|
|||
- --check-interval=5m
|
||||
- --metrics-addr=:8080
|
||||
- --healthz-addr=:8081
|
||||
image: ghcr.io/external-secrets/external-secrets:v0.9.2
|
||||
image: ghcr.io/external-secrets/external-secrets:v0.9.3
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: webhook
|
||||
ports:
|
||||
|
@ -78,8 +78,8 @@ should match snapshot of default values:
|
|||
app.kubernetes.io/instance: RELEASE-NAME
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/version: v0.9.2
|
||||
app.kubernetes.io/version: v0.9.3
|
||||
external-secrets.io/component: webhook
|
||||
helm.sh/chart: external-secrets-0.9.2
|
||||
helm.sh/chart: external-secrets-0.9.3
|
||||
name: RELEASE-NAME-external-secrets-webhook
|
||||
namespace: NAMESPACE
|
||||
|
|
|
@ -1,28 +1,28 @@
|
|||
annotations:
|
||||
artifacthub.io/changes: |
|
||||
- Chart 5.0.20 release
|
||||
- Chart 5.0.21 dev release
|
||||
artifacthub.io/containsSecurityUpdates: "true"
|
||||
artifacthub.io/images: |
|
||||
- name: auth-server
|
||||
image: ghcr.io/janssenproject/jans/auth-server:1.0.16-1
|
||||
image: ghcr.io/janssenproject/jans/auth-server:1.0.17_dev
|
||||
- name: auth-server-key-rotation
|
||||
image: ghcr.io/janssenproject/jans/certmanager:1.0.16-1
|
||||
image: ghcr.io/janssenproject/jans/certmanager:1.0.17_dev
|
||||
- name: configuration-manager
|
||||
image: ghcr.io/janssenproject/jans/configurator:1.0.16-1
|
||||
image: ghcr.io/janssenproject/jans/configurator:1.0.17_dev
|
||||
- name: config-api
|
||||
image: ghcr.io/janssenproject/jans/config-api:1.0.16-1
|
||||
image: ghcr.io/janssenproject/jans/config-api:1.0.17_dev
|
||||
- name: fido2
|
||||
image: ghcr.io/janssenproject/jans/fido2:1.0.16-1
|
||||
image: ghcr.io/janssenproject/jans/fido2:1.0.17_dev
|
||||
- name: opendj
|
||||
image: gluufederation/opendj:5.0.0_dev
|
||||
- name: persistence
|
||||
image: ghcr.io/janssenproject/jans/persistence-loader:1.0.16-1
|
||||
image: ghcr.io/janssenproject/jans/persistence-loader:1.0.17_dev
|
||||
- name: scim
|
||||
image: ghcr.io/janssenproject/jans/scim:1.0.16-1
|
||||
image: ghcr.io/janssenproject/jans/scim:1.0.17_dev
|
||||
- name: casa
|
||||
image: ghcr.io/gluufederation/flex/casa:5.0.0_dev
|
||||
- name: admin-ui
|
||||
image: ghcr.io/gluufederation/flex/admin-ui:1.0.16-1
|
||||
image: ghcr.io/gluufederation/flex/admin-ui:1.0.17_dev
|
||||
artifacthub.io/license: Apache-2.0
|
||||
artifacthub.io/prerelease: "true"
|
||||
catalog.cattle.io/certified: partner
|
||||
|
@ -36,59 +36,59 @@ dependencies:
|
|||
- condition: global.config.enabled
|
||||
name: config
|
||||
repository: file://./charts/config
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.config-api.enabled
|
||||
name: config-api
|
||||
repository: file://./charts/config-api
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.opendj.enabled
|
||||
name: opendj
|
||||
repository: file://./charts/opendj
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.auth-server.enabled
|
||||
name: auth-server
|
||||
repository: file://./charts/auth-server
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.admin-ui.enabled
|
||||
name: admin-ui
|
||||
repository: file://./charts/admin-ui
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.fido2.enabled
|
||||
name: fido2
|
||||
repository: file://./charts/fido2
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.scim.enabled
|
||||
name: scim
|
||||
repository: file://./charts/scim
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.nginx-ingress.enabled
|
||||
name: nginx-ingress
|
||||
repository: file://./charts/nginx-ingress
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.oxshibboleth.enabled
|
||||
name: oxshibboleth
|
||||
repository: file://./charts/oxshibboleth
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.oxpassport.enabled
|
||||
name: oxpassport
|
||||
repository: file://./charts/oxpassport
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.casa.enabled
|
||||
name: casa
|
||||
repository: file://./charts/casa
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.auth-server-key-rotation.enabled
|
||||
name: auth-server-key-rotation
|
||||
repository: file://./charts/auth-server-key-rotation
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.persistence.enabled
|
||||
name: persistence
|
||||
repository: file://./charts/persistence
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
- condition: global.istio.ingress
|
||||
name: cn-istio-ingress
|
||||
repository: file://./charts/cn-istio-ingress
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
description: Gluu Access and Identity Management
|
||||
home: https://www.gluu.org
|
||||
icon: https://gluu.org/docs/gluu-server/favicon.ico
|
||||
|
@ -100,4 +100,4 @@ name: gluu
|
|||
sources:
|
||||
- https://gluu.org/docs/gluu-server
|
||||
- https://github.com/GluuFederation/flex/flex-cn-setup
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# gluu
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Gluu Access and Identity Management
|
||||
|
||||
|
@ -23,26 +23,26 @@ Kubernetes: `>=v1.21.0-0`
|
|||
|
||||
| Repository | Name | Version |
|
||||
|------------|------|---------|
|
||||
| | admin-ui | 5.0.20 |
|
||||
| | auth-server | 5.0.20 |
|
||||
| | auth-server-key-rotation | 5.0.20 |
|
||||
| | casa | 5.0.20 |
|
||||
| | cn-istio-ingress | 5.0.20 |
|
||||
| | config | 5.0.20 |
|
||||
| | config-api | 5.0.20 |
|
||||
| | fido2 | 5.0.20 |
|
||||
| | nginx-ingress | 5.0.20 |
|
||||
| | opendj | 5.0.20 |
|
||||
| | oxpassport | 5.0.20 |
|
||||
| | oxshibboleth | 5.0.20 |
|
||||
| | persistence | 5.0.20 |
|
||||
| | scim | 5.0.20 |
|
||||
| | admin-ui | 5.0.21 |
|
||||
| | auth-server | 5.0.21 |
|
||||
| | auth-server-key-rotation | 5.0.21 |
|
||||
| | casa | 5.0.21 |
|
||||
| | cn-istio-ingress | 5.0.21 |
|
||||
| | config | 5.0.21 |
|
||||
| | config-api | 5.0.21 |
|
||||
| | fido2 | 5.0.21 |
|
||||
| | nginx-ingress | 5.0.21 |
|
||||
| | opendj | 5.0.21 |
|
||||
| | oxpassport | 5.0.21 |
|
||||
| | oxshibboleth | 5.0.21 |
|
||||
| | persistence | 5.0.21 |
|
||||
| | scim | 5.0.21 |
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| admin-ui | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/gluufederation/flex/admin-ui","tag":"1.0.16-1"},"lifecycle":{},"livenessProbe":{"failureThreshold":20,"initialDelaySeconds":60,"periodSeconds":25,"tcpSocket":{"port":8080},"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"failureThreshold":20,"initialDelaySeconds":60,"periodSeconds":25,"tcpSocket":{"port":8080},"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"2000m","memory":"2000Mi"},"requests":{"cpu":"2000m","memory":"2000Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Admin GUI for configuration of the auth-server |
|
||||
| admin-ui | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/gluufederation/flex/admin-ui","tag":"1.0.17_dev"},"lifecycle":{},"livenessProbe":{"failureThreshold":20,"initialDelaySeconds":60,"periodSeconds":25,"tcpSocket":{"port":8080},"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"failureThreshold":20,"initialDelaySeconds":60,"periodSeconds":25,"tcpSocket":{"port":8080},"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"2000m","memory":"2000Mi"},"requests":{"cpu":"2000m","memory":"2000Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Admin GUI for configuration of the auth-server |
|
||||
| admin-ui.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} |
|
||||
| admin-ui.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} |
|
||||
| admin-ui.dnsConfig | object | `{}` | Add custom dns config |
|
||||
|
@ -53,7 +53,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| admin-ui.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| admin-ui.image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| admin-ui.image.repository | string | `"ghcr.io/gluufederation/flex/admin-ui"` | Image to use for deploying. |
|
||||
| admin-ui.image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| admin-ui.image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| admin-ui.livenessProbe | object | `{"failureThreshold":20,"initialDelaySeconds":60,"periodSeconds":25,"tcpSocket":{"port":8080},"timeoutSeconds":5}` | Configure the liveness healthcheck for the admin ui if needed. |
|
||||
| admin-ui.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget |
|
||||
| admin-ui.readinessProbe | object | `{"failureThreshold":20,"initialDelaySeconds":60,"periodSeconds":25,"tcpSocket":{"port":8080},"timeoutSeconds":5}` | Configure the readiness healthcheck for the admin ui if needed. |
|
||||
|
@ -69,8 +69,8 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| admin-ui.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 |
|
||||
| admin-ui.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers |
|
||||
| admin-ui.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod |
|
||||
| auth-server | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/auth-server","tag":"1.0.16-1"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"2500m","memory":"2500Mi"},"requests":{"cpu":"2500m","memory":"2500Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | OAuth Authorization Server, the OpenID Connect Provider, the UMA Authorization Server--this is the main Internet facing component of Gluu. It's the service that returns tokens, JWT's and identity assertions. This service must be Internet facing. |
|
||||
| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/certmanager","tag":"1.0.16-1"},"keysLife":48,"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours |
|
||||
| auth-server | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/auth-server","tag":"1.0.17_dev"},"lifecycle":{},"livenessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"2500m","memory":"2500Mi"},"requests":{"cpu":"2500m","memory":"2500Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | OAuth Authorization Server, the OpenID Connect Provider, the UMA Authorization Server--this is the main Internet facing component of Gluu. It's the service that returns tokens, JWT's and identity assertions. This service must be Internet facing. |
|
||||
| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/certmanager","tag":"1.0.17_dev"},"keysLife":48,"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours |
|
||||
| auth-server-key-rotation.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} |
|
||||
| auth-server-key-rotation.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} |
|
||||
| auth-server-key-rotation.dnsConfig | object | `{}` | Add custom dns config |
|
||||
|
@ -78,7 +78,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| auth-server-key-rotation.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| auth-server-key-rotation.image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| auth-server-key-rotation.image.repository | string | `"ghcr.io/janssenproject/jans/certmanager"` | Image to use for deploying. |
|
||||
| auth-server-key-rotation.image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| auth-server-key-rotation.image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| auth-server-key-rotation.keysLife | int | `48` | Auth server key rotation keys life in hours |
|
||||
| auth-server-key-rotation.resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. |
|
||||
| auth-server-key-rotation.resources.limits.cpu | string | `"300m"` | CPU limit. |
|
||||
|
@ -100,7 +100,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| auth-server.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| auth-server.image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| auth-server.image.repository | string | `"ghcr.io/janssenproject/jans/auth-server"` | Image to use for deploying. |
|
||||
| auth-server.image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| auth-server.image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| auth-server.livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. |
|
||||
| auth-server.livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | Executes the python3 healthcheck. https://github.com/JanssenProject/docker-jans-auth-server/blob/master/scripts/healthcheck.py |
|
||||
| auth-server.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget |
|
||||
|
@ -146,8 +146,8 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| casa.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 |
|
||||
| casa.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers |
|
||||
| casa.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod |
|
||||
| config | object | `{"additionalAnnotations":{},"additionalLabels":{},"adminPassword":"Test1234#","city":"Austin","configmap":{"cnAwsAccessKeyId":"","cnAwsDefaultRegion":"us-west-1","cnAwsProfile":"gluu","cnAwsSecretAccessKey":"","cnAwsSecretsEndpointUrl":"","cnAwsSecretsNamePrefix":"gluu","cnAwsSecretsReplicaRegions":[],"cnCacheType":"NATIVE_PERSISTENCE","cnConfigKubernetesConfigMap":"cn","cnCouchbaseBucketPrefix":"jans","cnCouchbaseCrt":"SWFtTm90YVNlcnZpY2VBY2NvdW50Q2hhbmdlTWV0b09uZQo=","cnCouchbaseIndexNumReplica":0,"cnCouchbasePassword":"P@ssw0rd","cnCouchbaseSuperUser":"admin","cnCouchbaseSuperUserPassword":"Test1234#","cnCouchbaseUrl":"cbgluu.default.svc.cluster.local","cnCouchbaseUser":"gluu","cnGoogleProjectId":"google-project-to-save-config-and-secrets-to","cnGoogleSecretManagerServiceAccount":"SWFtTm90YVNlcnZpY2VBY2NvdW50Q2hhbmdlTWV0b09uZQo=","cnGoogleSecretNamePrefix":"gluu","cnGoogleSecretVersionId":"latest","cnGoogleSpannerDatabaseId":"","cnGoogleSpannerInstanceId":"","cnJettyRequestHeaderSize":8192,"cnLdapUrl":"opendj:1636","cnMaxRamPercent":"75.0","cnPersistenceHybridMapping":"{}","cnRedisSentinelGroup":"","cnRedisSslTruststore":"","cnRedisType":"STANDALONE","cnRedisUrl":"redis.redis.svc.cluster.local:6379","cnRedisUseSsl":false,"cnScimProtectionMode":"OAUTH","cnSecretKubernetesSecret":"cn","cnSqlDbDialect":"mysql","cnSqlDbHost":"my-release-mysql.default.svc.cluster.local","cnSqlDbName":"gluu","cnSqlDbPort":3306,"cnSqlDbSchema":"","cnSqlDbTimezone":"UTC","cnSqlDbUser":"gluu","cnSqldbUserPassword":"Test1234#","lbAddr":""},"countryCode":"US","dnsConfig":{},"dnsPolicy":"","email":"support@gluu.org","image":{"pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/configurator","tag":"1.0.16-1"},"ldapPassword":"P@ssw0rds","lifecycle":{},"migration":{"enabled":false,"migrationDataFormat":"ldif","migrationDir":"/ce-migration"},"orgName":"Gluu","redisPassword":"P@assw0rd","resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"state":"TX","usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Configuration parameters for setup and initial configuration secret and config layers used by Gluu services. |
|
||||
| config-api | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/config-api","tag":"1.0.16-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"jans-config-api/api/v1/health/ready","port":8074},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"1000m","memory":"1000Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Config Api endpoints can be used to configure the auth-server, which is an open-source OpenID Connect Provider (OP) and UMA Authorization Server (AS). |
|
||||
| config | object | `{"additionalAnnotations":{},"additionalLabels":{},"adminPassword":"Test1234#","city":"Austin","configmap":{"cnAwsAccessKeyId":"","cnAwsDefaultRegion":"us-west-1","cnAwsProfile":"gluu","cnAwsSecretAccessKey":"","cnAwsSecretsEndpointUrl":"","cnAwsSecretsNamePrefix":"gluu","cnAwsSecretsReplicaRegions":[],"cnCacheType":"NATIVE_PERSISTENCE","cnConfigKubernetesConfigMap":"cn","cnCouchbaseBucketPrefix":"jans","cnCouchbaseCrt":"SWFtTm90YVNlcnZpY2VBY2NvdW50Q2hhbmdlTWV0b09uZQo=","cnCouchbaseIndexNumReplica":0,"cnCouchbasePassword":"P@ssw0rd","cnCouchbaseSuperUser":"admin","cnCouchbaseSuperUserPassword":"Test1234#","cnCouchbaseUrl":"cbgluu.default.svc.cluster.local","cnCouchbaseUser":"gluu","cnGoogleProjectId":"google-project-to-save-config-and-secrets-to","cnGoogleSecretManagerServiceAccount":"SWFtTm90YVNlcnZpY2VBY2NvdW50Q2hhbmdlTWV0b09uZQo=","cnGoogleSecretNamePrefix":"gluu","cnGoogleSecretVersionId":"latest","cnGoogleSpannerDatabaseId":"","cnGoogleSpannerInstanceId":"","cnJettyRequestHeaderSize":8192,"cnLdapUrl":"opendj:1636","cnMaxRamPercent":"75.0","cnPersistenceHybridMapping":"{}","cnRedisSentinelGroup":"","cnRedisSslTruststore":"","cnRedisType":"STANDALONE","cnRedisUrl":"redis.redis.svc.cluster.local:6379","cnRedisUseSsl":false,"cnScimProtectionMode":"OAUTH","cnSecretKubernetesSecret":"cn","cnSqlDbDialect":"mysql","cnSqlDbHost":"my-release-mysql.default.svc.cluster.local","cnSqlDbName":"gluu","cnSqlDbPort":3306,"cnSqlDbSchema":"","cnSqlDbTimezone":"UTC","cnSqlDbUser":"gluu","cnSqldbUserPassword":"Test1234#","lbAddr":""},"countryCode":"US","dnsConfig":{},"dnsPolicy":"","email":"support@gluu.org","image":{"pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/configurator","tag":"1.0.17_dev"},"ldapPassword":"P@ssw0rds","lifecycle":{},"migration":{"enabled":false,"migrationDataFormat":"ldif","migrationDir":"/ce-migration"},"orgName":"Gluu","redisPassword":"P@assw0rd","resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"state":"TX","usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Configuration parameters for setup and initial configuration secret and config layers used by Gluu services. |
|
||||
| config-api | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/config-api","tag":"1.0.17_dev"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"jans-config-api/api/v1/health/ready","port":8074},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"1000m","memory":"1000Mi"}},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Config Api endpoints can be used to configure the auth-server, which is an open-source OpenID Connect Provider (OP) and UMA Authorization Server (AS). |
|
||||
| config-api.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} |
|
||||
| config-api.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} |
|
||||
| config-api.dnsConfig | object | `{}` | Add custom dns config |
|
||||
|
@ -158,7 +158,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| config-api.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| config-api.image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| config-api.image.repository | string | `"ghcr.io/janssenproject/jans/config-api"` | Image to use for deploying. |
|
||||
| config-api.image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| config-api.image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| config-api.livenessProbe | object | `{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. |
|
||||
| config-api.livenessProbe.httpGet | object | `{"path":"/jans-config-api/api/v1/health/live","port":8074}` | http liveness probe endpoint |
|
||||
| config-api.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget |
|
||||
|
@ -221,7 +221,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| config.email | string | `"support@gluu.org"` | Email address of the administrator usually. Used for certificate creation. |
|
||||
| config.image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| config.image.repository | string | `"ghcr.io/janssenproject/jans/configurator"` | Image to use for deploying. |
|
||||
| config.image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| config.image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| config.ldapPassword | string | `"P@ssw0rds"` | LDAP admin password if OpenDJ is used for persistence. |
|
||||
| config.migration | object | `{"enabled":false,"migrationDataFormat":"ldif","migrationDir":"/ce-migration"}` | CE to CN Migration section |
|
||||
| config.migration.enabled | bool | `false` | Boolean flag to enable migration from CE |
|
||||
|
@ -240,7 +240,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| config.usrEnvs.secret | object | `{}` | Add custom secret envs to the service. variable1: value1 |
|
||||
| config.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers |
|
||||
| config.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod |
|
||||
| fido2 | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/fido2","tag":"1.0.16-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"500Mi"},"requests":{"cpu":"500m","memory":"500Mi"}},"service":{"name":"http-fido2","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | FIDO 2.0 (FIDO2) is an open authentication standard that enables leveraging common devices to authenticate to online services in both mobile and desktop environments. |
|
||||
| fido2 | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/fido2","tag":"1.0.17_dev"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"500m","memory":"500Mi"},"requests":{"cpu":"500m","memory":"500Mi"}},"service":{"name":"http-fido2","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | FIDO 2.0 (FIDO2) is an open authentication standard that enables leveraging common devices to authenticate to online services in both mobile and desktop environments. |
|
||||
| fido2.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} |
|
||||
| fido2.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} |
|
||||
| fido2.dnsConfig | object | `{}` | Add custom dns config |
|
||||
|
@ -251,7 +251,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| fido2.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| fido2.image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| fido2.image.repository | string | `"ghcr.io/janssenproject/jans/fido2"` | Image to use for deploying. |
|
||||
| fido2.image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| fido2.image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| fido2.livenessProbe | object | `{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5}` | Configure the liveness healthcheck for the fido2 if needed. |
|
||||
| fido2.livenessProbe.httpGet | object | `{"path":"/jans-fido2/sys/health-check","port":"http-fido2"}` | http liveness probe endpoint |
|
||||
| fido2.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget |
|
||||
|
@ -551,7 +551,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| oxshibboleth.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 |
|
||||
| oxshibboleth.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers |
|
||||
| oxshibboleth.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod |
|
||||
| persistence | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/persistence-loader","tag":"1.0.16-1"},"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Job to generate data and initial config for Gluu Server persistence layer. |
|
||||
| persistence | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/persistence-loader","tag":"1.0.17_dev"},"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Job to generate data and initial config for Gluu Server persistence layer. |
|
||||
| persistence.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} |
|
||||
| persistence.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} |
|
||||
| persistence.dnsConfig | object | `{}` | Add custom dns config |
|
||||
|
@ -559,7 +559,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| persistence.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| persistence.image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| persistence.image.repository | string | `"ghcr.io/janssenproject/jans/persistence-loader"` | Image to use for deploying. |
|
||||
| persistence.image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| persistence.image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| persistence.resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. |
|
||||
| persistence.resources.limits.cpu | string | `"300m"` | CPU limit |
|
||||
| persistence.resources.limits.memory | string | `"300Mi"` | Memory limit. |
|
||||
|
@ -570,7 +570,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| persistence.usrEnvs.secret | object | `{}` | Add custom secret envs to the service variable1: value1 |
|
||||
| persistence.volumeMounts | list | `[]` | Configure any additional volumesMounts that need to be attached to the containers |
|
||||
| persistence.volumes | list | `[]` | Configure any additional volumes that need to be attached to the pod |
|
||||
| scim | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/scim","tag":"1.0.16-1"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"1000m","memory":"1000Mi"}},"service":{"name":"http-scim","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | System for Cross-domain Identity Management (SCIM) version 2.0 |
|
||||
| scim | object | `{"additionalAnnotations":{},"additionalLabels":{},"dnsConfig":{},"dnsPolicy":"","hpa":{"behavior":{},"enabled":true,"maxReplicas":10,"metrics":[],"minReplicas":1,"targetCPUUtilizationPercentage":50},"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/scim","tag":"1.0.17_dev"},"lifecycle":{},"livenessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5},"pdb":{"enabled":true,"maxUnavailable":"90%"},"readinessProbe":{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5},"replicas":1,"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"1000m","memory":"1000Mi"}},"service":{"name":"http-scim","port":8080},"topologySpreadConstraints":{},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | System for Cross-domain Identity Management (SCIM) version 2.0 |
|
||||
| scim.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} |
|
||||
| scim.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} |
|
||||
| scim.dnsConfig | object | `{}` | Add custom dns config |
|
||||
|
@ -581,7 +581,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| scim.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| scim.image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| scim.image.repository | string | `"ghcr.io/janssenproject/jans/scim"` | Image to use for deploying. |
|
||||
| scim.image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| scim.image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| scim.livenessProbe | object | `{"httpGet":{"path":"/jans-scim/sys/health-check","port":8080},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for SCIM if needed. |
|
||||
| scim.livenessProbe.httpGet.path | string | `"/jans-scim/sys/health-check"` | http liveness probe endpoint |
|
||||
| scim.pdb | object | `{"enabled":true,"maxUnavailable":"90%"}` | Configure the PodDisruptionBudget |
|
||||
|
|
|
@ -17,4 +17,4 @@ sources:
|
|||
- https://github.com/GluuFederation/docker-gluu-admin-ui
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/admin-ui
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# admin-ui
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Admin GUI. Requires license.
|
||||
|
||||
|
@ -35,7 +35,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| image.repository | string | `"gluufederation/admin-ui"` | Image to use for deploying. |
|
||||
| image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| lifecycle | object | `{}` | |
|
||||
| livenessProbe | object | `{"failureThreshold":20,"initialDelaySeconds":60,"periodSeconds":25,"tcpSocket":{"port":8080},"timeoutSeconds":5}` | Configure the liveness healthcheck for the admin ui if needed. |
|
||||
| readinessProbe | object | `{"failureThreshold":20,"initialDelaySeconds":60,"periodSeconds":25,"tcpSocket":{"port":8080},"timeoutSeconds":5}` | Configure the readiness healthcheck for the admin ui if needed. |
|
||||
|
|
|
@ -27,7 +27,7 @@ image:
|
|||
# -- Image to use for deploying.
|
||||
repository: gluufederation/admin-ui
|
||||
# -- Image tag to use for deploying.
|
||||
tag: 1.0.16-1
|
||||
tag: 1.0.17_dev
|
||||
# -- Image Pull Secrets
|
||||
pullSecrets: [ ]
|
||||
# -- Service replica number.
|
||||
|
|
|
@ -15,4 +15,4 @@ sources:
|
|||
- https://github.com/JanssenProject/docker-jans-certmanager
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/auth-server-key-rotation
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# auth-server-key-rotation
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Responsible for regenerating auth-keys per x hours
|
||||
|
||||
|
@ -33,7 +33,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| image.repository | string | `"janssenproject/certmanager"` | Image to use for deploying. |
|
||||
| image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| keysLife | int | `48` | Auth server key rotation keys life in hours |
|
||||
| lifecycle | object | `{}` | |
|
||||
| nodeSelector | object | `{}` | |
|
||||
|
|
|
@ -18,7 +18,7 @@ image:
|
|||
# -- Image to use for deploying.
|
||||
repository: janssenproject/certmanager
|
||||
# -- Image tag to use for deploying.
|
||||
tag: 1.0.16-1
|
||||
tag: 1.0.17_dev
|
||||
# -- Image Pull Secrets
|
||||
pullSecrets: [ ]
|
||||
# -- Auth server key rotation keys life in hours
|
||||
|
|
|
@ -19,4 +19,4 @@ sources:
|
|||
- https://github.com/JanssenProject/docker-jans-auth-server
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/auth-server
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# auth-server
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
OAuth Authorization Server, the OpenID Connect Provider, the UMA Authorization Server--this is the main Internet facing component of Gluu. It's the service that returns tokens, JWT's and identity assertions. This service must be Internet facing.
|
||||
|
||||
|
@ -36,7 +36,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| image.repository | string | `"janssenproject/auth-server"` | Image to use for deploying. |
|
||||
| image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| lifecycle | object | `{}` | |
|
||||
| livenessProbe | object | `{"exec":{"command":["python3","/app/scripts/healthcheck.py"]},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. |
|
||||
| livenessProbe.exec | object | `{"command":["python3","/app/scripts/healthcheck.py"]}` | Executes the python3 healthcheck. https://github.com/GluuFederation/docker-oxauth/blob/4.3/scripts/healthcheck.py |
|
||||
|
|
|
@ -28,7 +28,7 @@ image:
|
|||
# -- Image to use for deploying.
|
||||
repository: janssenproject/auth-server
|
||||
# -- Image tag to use for deploying.
|
||||
tag: 1.0.16-1
|
||||
tag: 1.0.17_dev
|
||||
# -- Image Pull Secrets
|
||||
pullSecrets: [ ]
|
||||
# -- Service replica number.
|
||||
|
|
|
@ -19,4 +19,4 @@ sources:
|
|||
- https://github.com/GluuFederation/docker-casa
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/casa
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# casa
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Gluu Casa ("Casa") is a self-service web portal for end-users to manage authentication and authorization preferences for their account in a Gluu Server.
|
||||
|
||||
|
|
|
@ -16,4 +16,4 @@ sources:
|
|||
- https://gluu.org/docs/gluu-server/
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/cn-istio-ingress
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# cn-istio-ingress
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Istio Gateway
|
||||
|
||||
|
|
|
@ -19,4 +19,4 @@ sources:
|
|||
- https://github.com/JanssenProject/jans/docker-jans-config-api
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/config-api
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# config-api
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Jans Config Api endpoints can be used to configure jans-auth-server, which is an open-source OpenID Connect Provider (OP) and UMA Authorization Server (AS)
|
||||
|
||||
|
@ -38,7 +38,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| image.repository | string | `"janssenproject/config-api"` | Image to use for deploying. |
|
||||
| image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| lifecycle | object | `{}` | |
|
||||
| livenessProbe | object | `{"httpGet":{"path":"/jans-config-api/api/v1/health/live","port":8074},"initialDelaySeconds":30,"periodSeconds":30,"timeoutSeconds":5}` | Configure the liveness healthcheck for the auth server if needed. |
|
||||
| livenessProbe.httpGet | object | `{"path":"/jans-config-api/api/v1/health/live","port":8074}` | Executes the python3 healthcheck. https://github.com/GluuFederation/docker-oxauth/blob/4.3/scripts/healthcheck.py |
|
||||
|
|
|
@ -33,7 +33,7 @@ image:
|
|||
# -- Image to use for deploying.
|
||||
repository: janssenproject/config-api
|
||||
# -- Image tag to use for deploying.
|
||||
tag: 1.0.16-1
|
||||
tag: 1.0.17_dev
|
||||
# -- Image Pull Secrets
|
||||
pullSecrets: [ ]
|
||||
# -- Service replica number.
|
||||
|
|
|
@ -18,4 +18,4 @@ sources:
|
|||
- https://github.com/JanssenProject/jans/docker-jans-configurator
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/config
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# config
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Configuration parameters for setup and initial configuration secret and config layers used by Gluu services.
|
||||
|
||||
|
@ -79,7 +79,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| fullNameOverride | string | `""` | |
|
||||
| image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| image.repository | string | `"janssenproject/configurator"` | Image to use for deploying. |
|
||||
| image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| ldapPassword | string | `"P@ssw0rds"` | LDAP admin password if OpennDJ is used for persistence. |
|
||||
| lifecycle | object | `{}` | |
|
||||
| migration | object | `{"enabled":false,"migrationDataFormat":"ldif","migrationDir":"/ce-migration"}` | CE to CN Migration section |
|
||||
|
|
|
@ -122,7 +122,7 @@ image:
|
|||
# -- Image to use for deploying.
|
||||
repository: janssenproject/configurator
|
||||
# -- Image tag to use for deploying.
|
||||
tag: 1.0.16-1
|
||||
tag: 1.0.17_dev
|
||||
# -- Image Pull Secrets
|
||||
pullSecrets: [ ]
|
||||
# -- LDAP admin password if OpennDJ is used for persistence.
|
||||
|
|
|
@ -19,4 +19,4 @@ sources:
|
|||
- https://github.com/JanssenProject/jans/docker-jans-fido2
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/fido2
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# fido2
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
FIDO 2.0 (FIDO2) is an open authentication standard that enables leveraging common devices to authenticate to online services in both mobile and desktop environments.
|
||||
|
||||
|
@ -37,7 +37,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| image.repository | string | `"janssenproject/fido2"` | Image to use for deploying. |
|
||||
| image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| lifecycle | object | `{}` | |
|
||||
| livenessProbe | object | `{"httpGet":{"path":"/jans-fido2/sys/health-check","port":"http-fido2"},"initialDelaySeconds":25,"periodSeconds":25,"timeoutSeconds":5}` | Configure the liveness healthcheck for the fido2 if needed. |
|
||||
| livenessProbe.httpGet | object | `{"path":"/jans-fido2/sys/health-check","port":"http-fido2"}` | http liveness probe endpoint |
|
||||
|
|
|
@ -29,7 +29,7 @@ image:
|
|||
# -- Image to use for deploying.
|
||||
repository: janssenproject/fido2
|
||||
# -- Image tag to use for deploying.
|
||||
tag: 1.0.16-1
|
||||
tag: 1.0.17_dev
|
||||
# -- Image Pull Secrets
|
||||
pullSecrets: [ ]
|
||||
# -- Service replica number.
|
||||
|
|
|
@ -17,4 +17,4 @@ sources:
|
|||
- https://kubernetes.io/docs/concepts/services-networking/ingress/
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/nginx-ingress
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# nginx-ingress
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Nginx ingress definitions chart
|
||||
|
||||
|
|
|
@ -19,4 +19,4 @@ sources:
|
|||
- https://github.com/GluuFederation/docker-opendj
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/opendj
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# opendj
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
OpenDJ is a directory server which implements a wide range of Lightweight Directory Access Protocol and related standards, including full compliance with LDAPv3 but also support for Directory Service Markup Language (DSMLv2).Written in Java, OpenDJ offers multi-master replication, access control, and many extensions.
|
||||
|
||||
|
|
|
@ -18,4 +18,4 @@ sources:
|
|||
- https://github.com/GluuFederation/docker-oxpassport
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/oxpassport
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# oxpassport
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Gluu interface to Passport.js to support social login and inbound identity.
|
||||
|
||||
|
|
|
@ -17,4 +17,4 @@ sources:
|
|||
- https://github.com/GluuFederation/docker-oxshibboleth
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/oxshibboleth
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# oxshibboleth
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Shibboleth project for the Gluu Server's SAML IDP functionality.
|
||||
|
||||
|
|
|
@ -15,4 +15,4 @@ sources:
|
|||
- https://github.com/JanssenProject/jans/docker-jans-persistence-loader
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/persistence
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# persistence
|
||||
|
||||
![Version: 5.0.20](https://img.shields.io/badge/Version-5.0.20-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
![Version: 5.0.21](https://img.shields.io/badge/Version-5.0.21-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 5.0.0](https://img.shields.io/badge/AppVersion-5.0.0-informational?style=flat-square)
|
||||
|
||||
Job to generate data and initial config for Gluu Server persistence layer.
|
||||
|
||||
|
@ -33,7 +33,7 @@ Kubernetes: `>=v1.21.0-0`
|
|||
| image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
|
||||
| image.pullSecrets | list | `[]` | Image Pull Secrets |
|
||||
| image.repository | string | `"gluufederation/persistence"` | Image to use for deploying. |
|
||||
| image.tag | string | `"1.0.16-1"` | Image tag to use for deploying. |
|
||||
| image.tag | string | `"1.0.17_dev"` | Image tag to use for deploying. |
|
||||
| imagePullSecrets | list | `[]` | |
|
||||
| lifecycle | object | `{}` | |
|
||||
| nameOverride | string | `""` | |
|
||||
|
|
|
@ -18,7 +18,7 @@ image:
|
|||
# -- Image to use for deploying.
|
||||
repository: gluufederation/persistence
|
||||
# -- Image tag to use for deploying.
|
||||
tag: 1.0.16-1
|
||||
tag: 1.0.17_dev
|
||||
# -- Image Pull Secrets
|
||||
pullSecrets: [ ]
|
||||
# -- Resource specs.
|
||||
|
|
|
@ -17,4 +17,4 @@ sources:
|
|||
- https://github.com/JanssenProject/jans/docker-jans-scim
|
||||
- https://github.com/GluuFederation/flex/tree/main/flex-cn-setup/pygluu/kubernetes/templates/helm/gluu/charts/scim
|
||||
type: application
|
||||
version: 5.0.20
|
||||
version: 5.0.21
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue