Charts CI
``` Updated: linkerd/linkerd-control-plane: - 2024.6.2 linkerd/linkerd-crds: - 2024.6.2 speedscale/speedscale-operator: - 2.2.29 traefik/traefik: - 28.3.0 ```pull/1035/head
parent
96bd1ff51f
commit
9a27520d81
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -6,7 +6,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: linkerd-control-plane
|
||||
apiVersion: v2
|
||||
appVersion: edge-24.6.1
|
||||
appVersion: edge-24.6.2
|
||||
dependencies:
|
||||
- name: partials
|
||||
repository: file://./charts/partials
|
||||
|
@ -26,4 +26,4 @@ name: linkerd-control-plane
|
|||
sources:
|
||||
- https://github.com/linkerd/linkerd2/
|
||||
type: application
|
||||
version: 2024.6.1
|
||||
version: 2024.6.2
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
Linkerd gives you observability, reliability, and security
|
||||
for your microservices — with no code change required.
|
||||
|
||||
![Version: 2024.6.1](https://img.shields.io/badge/Version-2024.6.1-informational?style=flat-square)
|
||||
![Version: 2024.6.2](https://img.shields.io/badge/Version-2024.6.2-informational?style=flat-square)
|
||||
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square)
|
||||
![AppVersion: edge-XX.X.X](https://img.shields.io/badge/AppVersion-edge--XX.X.X-informational?style=flat-square)
|
||||
|
||||
|
@ -241,6 +241,7 @@ Kubernetes: `>=1.22.0-0`
|
|||
| proxy.disableInboundProtocolDetectTimeout | bool | `false` | When set to true, disables the protocol detection timeout on the inbound side of the proxy by setting it to a very high value |
|
||||
| proxy.disableOutboundProtocolDetectTimeout | bool | `false` | When set to true, disables the protocol detection timeout on the outbound side of the proxy by setting it to a very high value |
|
||||
| proxy.enableExternalProfiles | bool | `false` | Enable service profiles for non-Kubernetes services |
|
||||
| proxy.enableShutdownEndpoint | bool | `false` | Enables the proxy's /shutdown admin endpoint |
|
||||
| proxy.gid | int | `-1` | Optional customisation of the group id under which the proxy runs (the group ID will be omitted if lower than 0) |
|
||||
| proxy.image.name | string | `"cr.l5d.io/linkerd/proxy"` | Docker image for the proxy |
|
||||
| proxy.image.pullPolicy | string | imagePullPolicy | Pull policy for the proxy container image |
|
||||
|
@ -251,7 +252,8 @@ Kubernetes: `>=1.22.0-0`
|
|||
| proxy.inboundDiscoveryCacheUnusedTimeout | string | `"90s"` | Maximum time allowed before an unused inbound discovery result is evicted from the cache |
|
||||
| proxy.livenessProbe | object | `{"initialDelaySeconds":10,"timeoutSeconds":1}` | LivenessProbe timeout and delay configuration |
|
||||
| proxy.logFormat | string | `"plain"` | Log format (`plain` or `json`) for the proxy |
|
||||
| proxy.logLevel | string | `"warn,linkerd=info,trust_dns=error"` | Log level for the proxy |
|
||||
| proxy.logHTTPHeaders | `off` or `insecure` | `"off"` | If set to `off`, will prevent the proxy from logging HTTP headers. If set to `insecure`, HTTP headers may be logged verbatim. Note that setting this to `insecure` is not alone sufficient to log HTTP headers; the proxy logLevel must also be set to debug. |
|
||||
| proxy.logLevel | string | `"warn,linkerd=info,hickory=error"` | Log level for the proxy |
|
||||
| proxy.nativeSidecar | bool | `false` | Enable KEP-753 native sidecars This is an experimental feature. It requires Kubernetes >= 1.29. If enabled, .proxy.waitBeforeExitSeconds should not be used. |
|
||||
| proxy.opaquePorts | string | `"25,587,3306,4444,5432,6379,9300,11211"` | Default set of opaque ports - SMTP (25,587) server-first - MYSQL (3306) server-first - Galera (4444) server-first - PostgreSQL (5432) server-first - Redis (6379) server-first - ElasticSearch (9300) server-first - Memcached (11211) clients do not issue any preamble, which breaks detection |
|
||||
| proxy.outbound.server.http2.keepAliveInterval | string | `"10s"` | The interval at which PINGs are issued to local application HTTP/2 clients. |
|
||||
|
@ -281,7 +283,7 @@ Kubernetes: `>=1.22.0-0`
|
|||
| proxyInit.ignoreOutboundPorts | string | `"4567,4568"` | Default set of outbound ports to skip via iptables - Galera (4567,4568) |
|
||||
| proxyInit.image.name | string | `"cr.l5d.io/linkerd/proxy-init"` | Docker image for the proxy-init container |
|
||||
| proxyInit.image.pullPolicy | string | imagePullPolicy | Pull policy for the proxy-init container image |
|
||||
| proxyInit.image.version | string | `"v2.4.0"` | Tag for the proxy-init container image |
|
||||
| proxyInit.image.version | string | `"v2.4.1"` | Tag for the proxy-init container image |
|
||||
| proxyInit.iptablesMode | string | `"legacy"` | Variant of iptables that will be used to configure routing. Currently, proxy-init can be run either in 'nft' or in 'legacy' mode. The mode will control which utility binary will be called. The host must support whichever mode will be used |
|
||||
| proxyInit.kubeAPIServerPorts | string | `"443,6443"` | Default set of ports to skip via iptables for control plane components so they can communicate with the Kubernetes API Server |
|
||||
| proxyInit.logFormat | string | plain | Log format (`plain` or `json`) for the proxy-init |
|
||||
|
|
|
@ -2,6 +2,9 @@
|
|||
{{ if and .Values.proxy.nativeSidecar .Values.proxy.waitBeforeExitSeconds }}
|
||||
{{ fail "proxy.nativeSidecar and waitBeforeExitSeconds cannot be used simultaneously" }}
|
||||
{{- end }}
|
||||
{{- if not (has .Values.proxy.logHTTPHeaders (list "insecure" "off")) }}
|
||||
{{- fail "logHTTPHeaders must be one of: insecure | off" }}
|
||||
{{- end }}
|
||||
{{- $trustDomain := (.Values.identityTrustDomain | default .Values.clusterDomain) -}}
|
||||
env:
|
||||
- name: _pod_name
|
||||
|
@ -28,8 +31,10 @@ env:
|
|||
- name: LINKERD2_PROXY_INBOUND_PORTS_REQUIRE_TLS
|
||||
value: {{.Values.proxy.requireTLSOnInboundPorts | quote}}
|
||||
{{ end -}}
|
||||
- name: LINKERD2_PROXY_SHUTDOWN_ENDPOINT_ENABLED
|
||||
value: {{.Values.proxy.enableShutdownEndpoint | quote}}
|
||||
- name: LINKERD2_PROXY_LOG
|
||||
value: {{.Values.proxy.logLevel | quote}}
|
||||
value: "{{.Values.proxy.logLevel}}{{ if not (eq .Values.proxy.logHTTPHeaders "insecure") }},linkerd_proxy_http::client[{headers}]=off{{ end }}"
|
||||
- name: LINKERD2_PROXY_LOG_FORMAT
|
||||
value: {{.Values.proxy.logFormat | quote}}
|
||||
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
||||
|
|
|
@ -24,7 +24,7 @@ controlPlaneTracing: false
|
|||
# -- namespace to send control plane traces to
|
||||
controlPlaneTracingNamespace: linkerd-jaeger
|
||||
# -- control plane version. See Proxy section for proxy version
|
||||
linkerdVersion: edge-24.6.1
|
||||
linkerdVersion: edge-24.6.2
|
||||
# -- default kubernetes deployment strategy
|
||||
deploymentStrategy:
|
||||
rollingUpdate:
|
||||
|
@ -149,10 +149,17 @@ proxy:
|
|||
# -- Tag for the proxy container image
|
||||
# @default -- linkerdVersion
|
||||
version: ""
|
||||
# -- Enables the proxy's /shutdown admin endpoint
|
||||
enableShutdownEndpoint: false
|
||||
# -- Log level for the proxy
|
||||
logLevel: warn,linkerd=info,trust_dns=error
|
||||
logLevel: warn,linkerd=info,hickory=error
|
||||
# -- Log format (`plain` or `json`) for the proxy
|
||||
logFormat: plain
|
||||
# -- (`off` or `insecure`) If set to `off`, will prevent the proxy from
|
||||
# logging HTTP headers. If set to `insecure`, HTTP headers may be logged
|
||||
# verbatim. Note that setting this to `insecure` is not alone sufficient to
|
||||
# log HTTP headers; the proxy logLevel must also be set to debug.
|
||||
logHTTPHeaders: "off"
|
||||
ports:
|
||||
# -- Admin port for the proxy container
|
||||
admin: 4191
|
||||
|
@ -287,7 +294,7 @@ proxyInit:
|
|||
# @default -- imagePullPolicy
|
||||
pullPolicy: ""
|
||||
# -- Tag for the proxy-init container image
|
||||
version: v2.4.0
|
||||
version: v2.4.1
|
||||
resources:
|
||||
cpu:
|
||||
# -- Maximum amount of CPU units that the proxy-init container can use
|
||||
|
|
|
@ -23,4 +23,4 @@ name: linkerd-crds
|
|||
sources:
|
||||
- https://github.com/linkerd/linkerd2/
|
||||
type: application
|
||||
version: 2024.6.1
|
||||
version: 2024.6.2
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
Linkerd gives you observability, reliability, and security
|
||||
for your microservices — with no code change required.
|
||||
|
||||
![Version: 2024.6.1](https://img.shields.io/badge/Version-2024.6.1-informational?style=flat-square)
|
||||
![Version: 2024.6.2](https://img.shields.io/badge/Version-2024.6.2-informational?style=flat-square)
|
||||
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square)
|
||||
|
||||
**Homepage:** <https://linkerd.io>
|
||||
|
|
|
@ -2,6 +2,9 @@
|
|||
{{ if and .Values.proxy.nativeSidecar .Values.proxy.waitBeforeExitSeconds }}
|
||||
{{ fail "proxy.nativeSidecar and waitBeforeExitSeconds cannot be used simultaneously" }}
|
||||
{{- end }}
|
||||
{{- if not (has .Values.proxy.logHTTPHeaders (list "insecure" "off")) }}
|
||||
{{- fail "logHTTPHeaders must be one of: insecure | off" }}
|
||||
{{- end }}
|
||||
{{- $trustDomain := (.Values.identityTrustDomain | default .Values.clusterDomain) -}}
|
||||
env:
|
||||
- name: _pod_name
|
||||
|
@ -28,8 +31,10 @@ env:
|
|||
- name: LINKERD2_PROXY_INBOUND_PORTS_REQUIRE_TLS
|
||||
value: {{.Values.proxy.requireTLSOnInboundPorts | quote}}
|
||||
{{ end -}}
|
||||
- name: LINKERD2_PROXY_SHUTDOWN_ENDPOINT_ENABLED
|
||||
value: {{.Values.proxy.enableShutdownEndpoint | quote}}
|
||||
- name: LINKERD2_PROXY_LOG
|
||||
value: {{.Values.proxy.logLevel | quote}}
|
||||
value: "{{.Values.proxy.logLevel}}{{ if not (eq .Values.proxy.logHTTPHeaders "insecure") }},linkerd_proxy_http::client[{headers}]=off{{ end }}"
|
||||
- name: LINKERD2_PROXY_LOG_FORMAT
|
||||
value: {{.Values.proxy.logFormat | quote}}
|
||||
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
||||
catalog.cattle.io/release-name: speedscale-operator
|
||||
apiVersion: v1
|
||||
appVersion: 2.2.18
|
||||
appVersion: 2.2.29
|
||||
description: Stress test your APIs with real world scenarios. Collect and replay
|
||||
traffic without scripting.
|
||||
home: https://speedscale.com
|
||||
|
@ -24,4 +24,4 @@ maintainers:
|
|||
- email: support@speedscale.com
|
||||
name: Speedscale Support
|
||||
name: speedscale-operator
|
||||
version: 2.2.18
|
||||
version: 2.2.29
|
||||
|
|
|
@ -20,7 +20,7 @@ clusterName: "my-cluster"
|
|||
# Speedscale components image settings.
|
||||
image:
|
||||
registry: gcr.io/speedscale
|
||||
tag: v2.2.18
|
||||
tag: v2.2.29
|
||||
pullPolicy: Always
|
||||
|
||||
# Log level for Speedscale components.
|
||||
|
|
|
@ -1,5 +1,35 @@
|
|||
# Change Log
|
||||
|
||||
## 28.3.0 ![AppVersion: v3.0.2](https://img.shields.io/static/v1?label=AppVersion&message=v3.0.2&color=success&logo=) ![Kubernetes: >=1.22.0-0](https://img.shields.io/static/v1?label=Kubernetes&message=%3E%3D1.22.0-0&color=informational&logo=kubernetes) ![Helm: v3](https://img.shields.io/static/v1?label=Helm&message=v3&color=informational&logo=helm)
|
||||
|
||||
**Release date:** 2024-06-14
|
||||
|
||||
* fix: 🐛 namespaced rbac when kubernetesIngress provider is disabled
|
||||
* fix: 🐛 add divisor: '1' to GOMAXPROCS and GOMEMLIMIT
|
||||
* fix(security): 🐛 🔒️ mount service account token on pod level
|
||||
* fix(Traefik Hub): remove obsolete CRD
|
||||
* fix(Traefik Hub): remove namespace in mutating webhook
|
||||
* feat: allow setting permanent on redirectTo
|
||||
* chore(release): publish v28.3.0
|
||||
* chore(deps): update traefik docker tag to v3.0.2
|
||||
|
||||
### Default value changes
|
||||
|
||||
```diff
|
||||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||||
index c558c78..e440dcf 100644
|
||||
--- a/traefik/values.yaml
|
||||
+++ b/traefik/values.yaml
|
||||
@@ -602,6 +602,7 @@ ports:
|
||||
# port: websecure
|
||||
# (Optional)
|
||||
# priority: 10
|
||||
+ # permanent: true
|
||||
#
|
||||
# -- Trust forwarded headers information (X-Forwarded-*).
|
||||
# forwardedHeaders:
|
||||
```
|
||||
|
||||
## 28.2.0 ![AppVersion: v3.0.1](https://img.shields.io/static/v1?label=AppVersion&message=v3.0.1&color=success&logo=) ![Kubernetes: >=1.22.0-0](https://img.shields.io/static/v1?label=Kubernetes&message=%3E%3D1.22.0-0&color=informational&logo=kubernetes) ![Helm: v3](https://img.shields.io/static/v1?label=Helm&message=v3&color=informational&logo=helm)
|
||||
|
||||
**Release date:** 2024-05-28
|
||||
|
|
|
@ -1,14 +1,17 @@
|
|||
annotations:
|
||||
artifacthub.io/changes: "- \"fix(IngressClass): provides annotation on IngressRoutes
|
||||
when it's enabled\"\n- \"feat: ✨ simplify values and provide more examples\"\n-
|
||||
\"feat: add deletecollection right on secrets\"\n- \"chore(release): \U0001F680
|
||||
publish v28.2.0\"\n- \"chore(deps): update traefik docker tag to v3.0.1\"\n"
|
||||
artifacthub.io/changes: "- \"fix: \U0001F41B namespaced rbac when kubernetesIngress
|
||||
provider is disabled\"\n- \"fix: \U0001F41B add divisor: '1' to GOMAXPROCS and
|
||||
GOMEMLIMIT\"\n- \"fix(security): \U0001F41B \U0001F512️ mount service account
|
||||
token on pod level\"\n- \"fix(Traefik Hub): remove obsolete CRD\"\n- \"fix(Traefik
|
||||
Hub): remove namespace in mutating webhook\"\n- \"feat: allow setting permanent
|
||||
on redirectTo\"\n- \"chore(release): publish v28.3.0\"\n- \"chore(deps): update
|
||||
traefik docker tag to v3.0.2\"\n"
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Traefik Proxy
|
||||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: traefik
|
||||
apiVersion: v2
|
||||
appVersion: v3.0.1
|
||||
appVersion: v3.0.2
|
||||
description: A Traefik based Kubernetes ingress controller
|
||||
home: https://traefik.io/
|
||||
icon: https://raw.githubusercontent.com/traefik/traefik/v2.3/docs/content/assets/img/traefik.logo.png
|
||||
|
@ -30,4 +33,4 @@ sources:
|
|||
- https://github.com/traefik/traefik
|
||||
- https://github.com/traefik/traefik-helm-chart
|
||||
type: application
|
||||
version: 28.2.0
|
||||
version: 28.3.0
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# traefik
|
||||
|
||||
![Version: 28.2.0](https://img.shields.io/badge/Version-28.2.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v3.0.1](https://img.shields.io/badge/AppVersion-v3.0.1-informational?style=flat-square)
|
||||
![Version: 28.3.0](https://img.shields.io/badge/Version-28.3.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v3.0.2](https://img.shields.io/badge/AppVersion-v3.0.2-informational?style=flat-square)
|
||||
|
||||
A Traefik based Kubernetes ingress controller
|
||||
|
||||
|
|
|
@ -1,115 +0,0 @@
|
|||
---
|
||||
apiVersion: apiextensions.k8s.io/v1
|
||||
kind: CustomResourceDefinition
|
||||
metadata:
|
||||
annotations:
|
||||
controller-gen.kubebuilder.io/version: v0.13.0
|
||||
name: edgeingresses.hub.traefik.io
|
||||
spec:
|
||||
group: hub.traefik.io
|
||||
names:
|
||||
kind: EdgeIngress
|
||||
listKind: EdgeIngressList
|
||||
plural: edgeingresses
|
||||
singular: edgeingress
|
||||
scope: Namespaced
|
||||
versions:
|
||||
- additionalPrinterColumns:
|
||||
- jsonPath: .spec.service.name
|
||||
name: Service
|
||||
type: string
|
||||
- jsonPath: .spec.service.port
|
||||
name: Port
|
||||
type: string
|
||||
- jsonPath: .spec.acp.name
|
||||
name: ACP
|
||||
priority: 1
|
||||
type: string
|
||||
- jsonPath: .status.urls
|
||||
name: URLs
|
||||
type: string
|
||||
- jsonPath: .status.connection
|
||||
name: Connection
|
||||
type: string
|
||||
name: v1alpha1
|
||||
schema:
|
||||
openAPIV3Schema:
|
||||
description: EdgeIngress defines an edge ingress.
|
||||
properties:
|
||||
apiVersion:
|
||||
description: 'APIVersion defines the versioned schema of this representation
|
||||
of an object. Servers should convert recognized schemas to the latest
|
||||
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||
type: string
|
||||
kind:
|
||||
description: 'Kind is a string value representing the REST resource this
|
||||
object represents. Servers may infer this from the endpoint the client
|
||||
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||
type: string
|
||||
metadata:
|
||||
type: object
|
||||
spec:
|
||||
description: The desired behavior of this edge ingress.
|
||||
properties:
|
||||
acp:
|
||||
description: EdgeIngressACP configures the ACP to use on the Ingress.
|
||||
properties:
|
||||
name:
|
||||
type: string
|
||||
required:
|
||||
- name
|
||||
type: object
|
||||
customDomains:
|
||||
description: CustomDomains are the custom domains for accessing the
|
||||
exposed service.
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
service:
|
||||
description: EdgeIngressService configures the service to exposed
|
||||
on the edge.
|
||||
properties:
|
||||
name:
|
||||
type: string
|
||||
port:
|
||||
type: integer
|
||||
required:
|
||||
- name
|
||||
- port
|
||||
type: object
|
||||
required:
|
||||
- service
|
||||
type: object
|
||||
status:
|
||||
description: The current status of this edge ingress.
|
||||
properties:
|
||||
connection:
|
||||
description: Connection is the status of the underlying connection
|
||||
to the edge.
|
||||
type: string
|
||||
customDomains:
|
||||
description: CustomDomains are the custom domains for accessing the
|
||||
exposed service.
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
domain:
|
||||
description: Domain is the Domain for accessing the exposed service.
|
||||
type: string
|
||||
specHash:
|
||||
description: SpecHash is a hash representing the EdgeIngressSpec
|
||||
type: string
|
||||
syncedAt:
|
||||
format: date-time
|
||||
type: string
|
||||
urls:
|
||||
description: URLs is the list of coma separated URL for accessing
|
||||
the exposed service.
|
||||
type: string
|
||||
version:
|
||||
type: string
|
||||
type: object
|
||||
type: object
|
||||
served: true
|
||||
storage: true
|
||||
subresources: {}
|
|
@ -22,6 +22,7 @@
|
|||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
serviceAccountName: {{ include "traefik.serviceAccountName" . }}
|
||||
automountServiceAccountToken: true
|
||||
terminationGracePeriodSeconds: {{ default 60 .Values.deployment.terminationGracePeriodSeconds }}
|
||||
hostNetwork: {{ .Values.hostNetwork }}
|
||||
{{- with .Values.deployment.dnsPolicy }}
|
||||
|
@ -516,6 +517,9 @@
|
|||
{{- if $config.redirectTo.priority }}
|
||||
- "--entryPoints.{{ $entrypoint }}.http.redirections.entryPoint.priority={{ $config.redirectTo.priority }}"
|
||||
{{- end }}
|
||||
{{- if $config.redirectTo.permanent }}
|
||||
- "--entryPoints.{{ $entrypoint }}.http.redirections.entryPoint.permanent=true"
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if $config.middlewares }}
|
||||
- "--entryPoints.{{ $entrypoint }}.http.middlewares={{ join "," $config.middlewares }}"
|
||||
|
@ -703,12 +707,14 @@
|
|||
valueFrom:
|
||||
resourceFieldRef:
|
||||
resource: limits.cpu
|
||||
divisor: '1'
|
||||
{{- end }}
|
||||
{{- if ($.Values.resources.limits).memory }}
|
||||
- name: GOMEMLIMIT
|
||||
valueFrom:
|
||||
resourceFieldRef:
|
||||
resource: limits.memory
|
||||
divisor: '1'
|
||||
{{- end }}
|
||||
{{- with .Values.hub.token }}
|
||||
- name: HUB_TOKEN
|
||||
|
|
|
@ -19,7 +19,6 @@ apiVersion: admissionregistration.k8s.io/v1
|
|||
kind: MutatingWebhookConfiguration
|
||||
metadata:
|
||||
name: hub-edge-ingress
|
||||
namespace: {{ template "traefik.namespace" . }}
|
||||
labels:
|
||||
{{- include "traefik.labels" . | nindent 4 }}
|
||||
webhooks:
|
||||
|
@ -51,7 +50,6 @@ apiVersion: admissionregistration.k8s.io/v1
|
|||
kind: MutatingWebhookConfiguration
|
||||
metadata:
|
||||
name: hub-acp
|
||||
namespace: {{ template "traefik.namespace" . }}
|
||||
labels:
|
||||
{{- include "traefik.labels" . | nindent 4 }}
|
||||
webhooks:
|
||||
|
@ -82,7 +80,6 @@ apiVersion: admissionregistration.k8s.io/v1
|
|||
kind: MutatingWebhookConfiguration
|
||||
metadata:
|
||||
name: hub-api
|
||||
namespace: {{ template "traefik.namespace" . }}
|
||||
labels:
|
||||
{{- include "traefik.labels" . | nindent 4 }}
|
||||
webhooks:
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{{- if and .Values.rbac.enabled (or .Values.providers.kubernetesIngress.enabled (not .Values.rbac.namespaced)) -}}
|
||||
{{- if not (and .Values.rbac.namespaced .Values.providers.kubernetesIngress.disableIngressClassLookup) -}}
|
||||
{{- if and .Values.rbac.enabled (or .Values.providers.kubernetesIngress.enabled (not .Values.rbac.namespaced)) }}
|
||||
{{- if not (and .Values.rbac.namespaced .Values.providers.kubernetesIngress.disableIngressClassLookup) }}
|
||||
---
|
||||
kind: ClusterRole
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
|
@ -115,8 +115,6 @@ rules:
|
|||
- update
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- if .Values.hub.token }}
|
||||
- apiGroups:
|
||||
- hub.traefik.io
|
||||
|
@ -208,4 +206,6 @@ rules:
|
|||
- get
|
||||
- list
|
||||
- watch
|
||||
{{- end -}}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
|
|
@ -10,4 +10,5 @@ metadata:
|
|||
{{- with .Values.serviceAccountAnnotations }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
automountServiceAccountToken: false
|
||||
{{- end -}}
|
||||
|
|
|
@ -602,6 +602,7 @@ ports:
|
|||
# port: websecure
|
||||
# (Optional)
|
||||
# priority: 10
|
||||
# permanent: true
|
||||
#
|
||||
# -- Trust forwarded headers information (X-Forwarded-*).
|
||||
# forwardedHeaders:
|
||||
|
|
141
index.yaml
141
index.yaml
|
@ -18586,17 +18586,49 @@ entries:
|
|||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: linkerd-control-plane
|
||||
apiVersion: v2
|
||||
appVersion: edge-24.6.1
|
||||
created: "2024-06-11T00:56:38.07423297Z"
|
||||
appVersion: edge-24.6.2
|
||||
created: "2024-06-15T00:56:05.147072815Z"
|
||||
dependencies:
|
||||
- name: partials
|
||||
repository: file://./charts/partials
|
||||
version: 0.1.0
|
||||
description: 'Linkerd gives you observability, reliability, and security for your
|
||||
microservices — with no code change required. '
|
||||
digest: a8b6e11b87595eb41bad7309eccb07c5c0229e4dd042dcf806f644f04c0ad66c
|
||||
digest: dbcb658e1581a8143eea6036e25dddab949155dd6f55469939ab69e9e54876e6
|
||||
home: https://linkerd.io
|
||||
icon: file://assets/icons/linkerd-control-plane.png
|
||||
icon: https://linkerd.io/images/logo-only-200h.png
|
||||
keywords:
|
||||
- service-mesh
|
||||
kubeVersion: '>=1.22.0-0'
|
||||
maintainers:
|
||||
- email: cncf-linkerd-dev@lists.cncf.io
|
||||
name: Linkerd authors
|
||||
url: https://linkerd.io/
|
||||
name: linkerd-control-plane
|
||||
sources:
|
||||
- https://github.com/linkerd/linkerd2/
|
||||
type: application
|
||||
urls:
|
||||
- assets/linkerd/linkerd-control-plane-2024.6.2.tgz
|
||||
version: 2024.6.2
|
||||
- annotations:
|
||||
catalog.cattle.io/auto-install: linkerd-crds
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Linkerd Control Plane
|
||||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: linkerd-control-plane
|
||||
apiVersion: v2
|
||||
appVersion: edge-24.6.1
|
||||
created: "2024-06-15T00:56:00.108537507Z"
|
||||
dependencies:
|
||||
- name: partials
|
||||
repository: file://./charts/partials
|
||||
version: 0.1.0
|
||||
description: 'Linkerd gives you observability, reliability, and security for your
|
||||
microservices — with no code change required. '
|
||||
digest: 1bcb9b47c4305f8475e0e7c880c42b4b394b7f92c5028170cc0c314d61eb9f2b
|
||||
home: https://linkerd.io
|
||||
icon: https://linkerd.io/images/logo-only-200h.png
|
||||
keywords:
|
||||
- service-mesh
|
||||
kubeVersion: '>=1.22.0-0'
|
||||
|
@ -19369,6 +19401,36 @@ entries:
|
|||
- assets/linkerd/linkerd-control-plane-1.12.5.tgz
|
||||
version: 1.12.5
|
||||
linkerd-crds:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Linkerd CRDs
|
||||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: linkerd-crds
|
||||
apiVersion: v2
|
||||
created: "2024-06-15T00:56:05.193544837Z"
|
||||
dependencies:
|
||||
- name: partials
|
||||
repository: file://./charts/partials
|
||||
version: 0.1.0
|
||||
description: 'Linkerd gives you observability, reliability, and security for your
|
||||
microservices — with no code change required. '
|
||||
digest: 894c25a2c5780cc8d6e93bbedddd5b35b2b8a186dad187bc38dc5b7f3c398e7e
|
||||
home: https://linkerd.io
|
||||
icon: https://linkerd.io/images/logo-only-200h.png
|
||||
keywords:
|
||||
- service-mesh
|
||||
kubeVersion: '>=1.22.0-0'
|
||||
maintainers:
|
||||
- email: cncf-linkerd-dev@lists.cncf.io
|
||||
name: Linkerd authors
|
||||
url: https://linkerd.io/
|
||||
name: linkerd-crds
|
||||
sources:
|
||||
- https://github.com/linkerd/linkerd2/
|
||||
type: application
|
||||
urls:
|
||||
- assets/linkerd/linkerd-crds-2024.6.2.tgz
|
||||
version: 2024.6.2
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Linkerd CRDs
|
||||
|
@ -28817,6 +28879,37 @@ entries:
|
|||
- assets/shipa/shipa-1.4.0.tgz
|
||||
version: 1.4.0
|
||||
speedscale-operator:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Speedscale Operator
|
||||
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
||||
catalog.cattle.io/release-name: speedscale-operator
|
||||
apiVersion: v1
|
||||
appVersion: 2.2.29
|
||||
created: "2024-06-15T00:56:06.306019123Z"
|
||||
description: Stress test your APIs with real world scenarios. Collect and replay
|
||||
traffic without scripting.
|
||||
digest: 6ed63610956e5f97e05469aa331d8eae41699694e6abcd93e6004f4f35ae4632
|
||||
home: https://speedscale.com
|
||||
icon: https://raw.githubusercontent.com/speedscale/assets/main/logo/gold_logo_only.png
|
||||
keywords:
|
||||
- speedscale
|
||||
- test
|
||||
- testing
|
||||
- regression
|
||||
- reliability
|
||||
- load
|
||||
- replay
|
||||
- network
|
||||
- traffic
|
||||
kubeVersion: '>= 1.17.0-0'
|
||||
maintainers:
|
||||
- email: support@speedscale.com
|
||||
name: Speedscale Support
|
||||
name: speedscale-operator
|
||||
urls:
|
||||
- assets/speedscale/speedscale-operator-2.2.29.tgz
|
||||
version: 2.2.29
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Speedscale Operator
|
||||
|
@ -32114,6 +32207,46 @@ entries:
|
|||
- assets/intel/tcs-issuer-0.1.0.tgz
|
||||
version: 0.1.0
|
||||
traefik:
|
||||
- annotations:
|
||||
artifacthub.io/changes: "- \"fix: \U0001F41B namespaced rbac when kubernetesIngress
|
||||
provider is disabled\"\n- \"fix: \U0001F41B add divisor: '1' to GOMAXPROCS
|
||||
and GOMEMLIMIT\"\n- \"fix(security): \U0001F41B \U0001F512️ mount service
|
||||
account token on pod level\"\n- \"fix(Traefik Hub): remove obsolete CRD\"\n-
|
||||
\"fix(Traefik Hub): remove namespace in mutating webhook\"\n- \"feat: allow
|
||||
setting permanent on redirectTo\"\n- \"chore(release): publish v28.3.0\"\n-
|
||||
\"chore(deps): update traefik docker tag to v3.0.2\"\n"
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Traefik Proxy
|
||||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: traefik
|
||||
apiVersion: v2
|
||||
appVersion: v3.0.2
|
||||
created: "2024-06-15T00:56:06.574969343Z"
|
||||
description: A Traefik based Kubernetes ingress controller
|
||||
digest: 98a123ffcf58c711abe2e08751589985a2bdb17fbe3eba7ca0afc1c8f2bbef0f
|
||||
home: https://traefik.io/
|
||||
icon: https://raw.githubusercontent.com/traefik/traefik/v2.3/docs/content/assets/img/traefik.logo.png
|
||||
keywords:
|
||||
- traefik
|
||||
- ingress
|
||||
- networking
|
||||
kubeVersion: '>=1.22.0-0'
|
||||
maintainers:
|
||||
- email: michel.loiseleur@traefik.io
|
||||
name: mloiseleur
|
||||
- email: charlie.haley@traefik.io
|
||||
name: charlie-haley
|
||||
- email: remi.buisson@traefik.io
|
||||
name: darkweaver87
|
||||
- name: jnoordsij
|
||||
name: traefik
|
||||
sources:
|
||||
- https://github.com/traefik/traefik
|
||||
- https://github.com/traefik/traefik-helm-chart
|
||||
type: application
|
||||
urls:
|
||||
- assets/traefik/traefik-28.3.0.tgz
|
||||
version: 28.3.0
|
||||
- annotations:
|
||||
artifacthub.io/changes: "- \"fix(IngressClass): provides annotation on IngressRoutes
|
||||
when it's enabled\"\n- \"feat: ✨ simplify values and provide more examples\"\n-
|
||||
|
|
Loading…
Reference in New Issue