Charts CI

```
Updated:
  argo/argo-cd:
    - 5.49.0
  bitnami/wordpress:
    - 18.0.12
  cert-manager/cert-manager:
    - v1.13.2
  crowdstrike/falcon-sensor:
    - 1.22.1
  external-secrets/external-secrets:
    - 0.9.8
  hashicorp/vault:
    - 0.26.1
  loft/loft:
    - 3.3.1
  nats/nats:
    - 1.1.3
  new-relic/nri-bundle:
    - 5.0.43
  redpanda/redpanda:
    - 5.6.37
  stackstate/stackstate-k8s-agent:
    - 1.0.51
```
pull/932/head
github-actions[bot] 2023-10-31 13:41:58 +00:00
parent 0771e64a07
commit d47dfdbd11
103 changed files with 1097 additions and 170 deletions

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

BIN
assets/loft/loft-3.3.1.tgz Normal file

Binary file not shown.

BIN
assets/nats/nats-1.1.3.tgz Normal file

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -1,7 +1,7 @@
annotations: annotations:
artifacthub.io/changes: | artifacthub.io/changes: |
- kind: added - kind: added
description: add terminationGracePeriodSeconds description: Add notification cluster role support
artifacthub.io/signKey: | artifacthub.io/signKey: |
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252 fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
url: https://argoproj.github.io/argo-helm/pgp_keys.asc url: https://argoproj.github.io/argo-helm/pgp_keys.asc
@ -11,7 +11,7 @@ annotations:
catalog.cattle.io/kube-version: '>=1.23.0-0' catalog.cattle.io/kube-version: '>=1.23.0-0'
catalog.cattle.io/release-name: argo-cd catalog.cattle.io/release-name: argo-cd
apiVersion: v2 apiVersion: v2
appVersion: v2.8.4 appVersion: v2.8.5
dependencies: dependencies:
- condition: redis-ha.enabled - condition: redis-ha.enabled
name: redis-ha name: redis-ha
@ -33,4 +33,4 @@ name: argo-cd
sources: sources:
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd - https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
- https://github.com/argoproj/argo-cd - https://github.com/argoproj/argo-cd
version: 5.47.0 version: 5.49.0

View File

@ -1160,6 +1160,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
|-----|------|---------|-------------| |-----|------|---------|-------------|
| notifications.affinity | object | `{}` (defaults to global.affinity preset) | Assign custom [affinity] rules | | notifications.affinity | object | `{}` (defaults to global.affinity preset) | Assign custom [affinity] rules |
| notifications.argocdUrl | string | `nil` | Argo CD dashboard url; used in place of {{.context.argocdUrl}} in templates | | notifications.argocdUrl | string | `nil` | Argo CD dashboard url; used in place of {{.context.argocdUrl}} in templates |
| notifications.clusterRoleRules.rules | list | `[]` | List of custom rules for the notifications controller's ClusterRole resource |
| notifications.cm.create | bool | `true` | Whether helm chart creates notifications controller config map | | notifications.cm.create | bool | `true` | Whether helm chart creates notifications controller config map |
| notifications.containerPorts.metrics | int | `9001` | Metrics container port | | notifications.containerPorts.metrics | int | `9001` | Metrics container port |
| notifications.containerSecurityContext | object | See [values.yaml] | Notification controller container-level security Context | | notifications.containerSecurityContext | object | See [values.yaml] | Notification controller container-level security Context |

View File

@ -0,0 +1,22 @@
{{- if .Values.createClusterRoles }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: {{ include "argo-cd.notifications.fullname" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.notifications.name "name" .Values.notifications.name) | nindent 4 }}
rules:
{{- with .Values.notifications.clusterRoleRules.rules }}
{{- toYaml . | nindent 2 }}
{{- end }}
- apiGroups:
- "argoproj.io"
resources:
- "applications"
verbs:
- get
- list
- watch
- update
- patch
{{- end }}

View File

@ -0,0 +1,16 @@
{{- if .Values.createClusterRoles }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: {{ include "argo-cd.notifications.fullname" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.notifications.name "name" .Values.notifications.name) | nindent 4 }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: {{ include "argo-cd.notifications.fullname" . }}
subjects:
- kind: ServiceAccount
name: {{ include "argo-cd.notificationsServiceAccountName" . }}
namespace: {{ .Release.Namespace }}
{{- end }}

View File

@ -78,13 +78,19 @@ spec:
configMapKeyRef: configMapKeyRef:
key: notificationscontroller.log.level key: notificationscontroller.log.level
name: argocd-cmd-params-cm name: argocd-cmd-params-cm
optional: true optional: true
- name: ARGOCD_NOTIFICATIONS_CONTROLLER_LOGFORMAT - name: ARGOCD_NOTIFICATIONS_CONTROLLER_LOGFORMAT
valueFrom: valueFrom:
configMapKeyRef: configMapKeyRef:
key: notificationscontroller.log.format key: notificationscontroller.log.format
name: argocd-cmd-params-cm name: argocd-cmd-params-cm
optional: true optional: true
- name: ARGOCD_APPLICATION_NAMESPACES
valueFrom:
configMapKeyRef:
key: application.namespaces
name: argocd-cmd-params-cm
optional: true
{{- with .Values.notifications.extraEnvFrom }} {{- with .Values.notifications.extraEnvFrom }}
envFrom: envFrom:
{{- toYaml . | nindent 12 }} {{- toYaml . | nindent 12 }}

View File

@ -326,7 +326,7 @@ configs:
[ssh.github.com]:443 ssh-rsa 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 [ssh.github.com]:443 ssh-rsa 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
bitbucket.org ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPIQmuzMBuKdWeF4+a2sjSSpBK0iqitSQ+5BM9KhpexuGt20JpTVM7u5BDZngncgrqDMbWdxMWWOGtZ9UgbqgZE= bitbucket.org ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPIQmuzMBuKdWeF4+a2sjSSpBK0iqitSQ+5BM9KhpexuGt20JpTVM7u5BDZngncgrqDMbWdxMWWOGtZ9UgbqgZE=
bitbucket.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIazEu89wgQZ4bqs3d63QSMzYVa0MuJ2e2gKTKqu+UUO bitbucket.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIazEu89wgQZ4bqs3d63QSMzYVa0MuJ2e2gKTKqu+UUO
bitbucket.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAubiN81eDcafrgMeLzaFPsw2kNvEcqTKl/VqLat/MaB33pZy0y3rJZtnqwR2qOOvbwKZYKiEO1O6VqNEBxKvJJelCq0dTXWT5pbO2gDXC6h6QDXCaHo6pOHGPUy+YBaGQRGuSusMEASYiWunYN0vCAI8QaXnWMXNMdFP3jHAJH0eDsoiGnLPBlBp4TNm6rYI74nMzgz3B9IikW4WVK+dc8KZJZWYjAuORU3jc1c/NPskD2ASinf8v3xnfXeukU0sJ5N6m5E8VLjObPEO+mN2t/FZTMZLiFqPWc/ALSqnMnnhwrNi2rbfg/rd/IpL8Le3pSBne8+seeFVBoGqzHM9yXw== bitbucket.org ssh-rsa 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
github.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEmKSENjQEezOmxkZMy7opKgwFB9nkt5YRrYMjNuG5N87uRgg6CLrbo5wAdT/y6v0mKV0U2w0WZ2YB/++Tpockg= github.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEmKSENjQEezOmxkZMy7opKgwFB9nkt5YRrYMjNuG5N87uRgg6CLrbo5wAdT/y6v0mKV0U2w0WZ2YB/++Tpockg=
github.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl github.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl
github.com ssh-rsa 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 github.com ssh-rsa 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
@ -2997,6 +2997,12 @@ notifications:
# -- Whether helm chart creates notifications controller config map # -- Whether helm chart creates notifications controller config map
create: true create: true
## Enable this and set the rules: to whatever custom rules you want for the Cluster Role resource.
## Defaults to off
clusterRoleRules:
# -- List of custom rules for the notifications controller's ClusterRole resource
rules: []
# -- Contains centrally managed global application subscriptions # -- Contains centrally managed global application subscriptions
## For more information: https://argocd-notifications.readthedocs.io/en/stable/subscriptions/ ## For more information: https://argocd-notifications.readthedocs.io/en/stable/subscriptions/
subscriptions: [] subscriptions: []

View File

@ -10,7 +10,7 @@ annotations:
- name: os-shell - name: os-shell
image: docker.io/bitnami/os-shell:11-debian-11-r90 image: docker.io/bitnami/os-shell:11-debian-11-r90
- name: wordpress - name: wordpress
image: docker.io/bitnami/wordpress:6.3.2-debian-11-r4 image: docker.io/bitnami/wordpress:6.3.2-debian-11-r5
licenses: Apache-2.0 licenses: Apache-2.0
apiVersion: v2 apiVersion: v2
appVersion: 6.3.2 appVersion: 6.3.2
@ -47,4 +47,4 @@ maintainers:
name: wordpress name: wordpress
sources: sources:
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress - https://github.com/bitnami/charts/tree/main/bitnami/wordpress
version: 18.0.11 version: 18.0.12

View File

@ -76,7 +76,7 @@ diagnosticMode:
image: image:
registry: docker.io registry: docker.io
repository: bitnami/wordpress repository: bitnami/wordpress
tag: 6.3.2-debian-11-r4 tag: 6.3.2-debian-11-r5
digest: "" digest: ""
## Specify a imagePullPolicy ## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'

View File

@ -10,7 +10,7 @@ annotations:
catalog.cattle.io/namespace: cert-manager catalog.cattle.io/namespace: cert-manager
catalog.cattle.io/release-name: cert-manager catalog.cattle.io/release-name: cert-manager
apiVersion: v1 apiVersion: v1
appVersion: v1.13.1 appVersion: v1.13.2
description: A Helm chart for cert-manager description: A Helm chart for cert-manager
home: https://github.com/cert-manager/cert-manager home: https://github.com/cert-manager/cert-manager
icon: https://raw.githubusercontent.com/cert-manager/cert-manager/d53c0b9270f8cd90d908460d69502694e1838f5f/logo/logo-small.png icon: https://raw.githubusercontent.com/cert-manager/cert-manager/d53c0b9270f8cd90d908460d69502694e1838f5f/logo/logo-small.png
@ -27,4 +27,4 @@ maintainers:
name: cert-manager name: cert-manager
sources: sources:
- https://github.com/cert-manager/cert-manager - https://github.com/cert-manager/cert-manager
version: v1.13.1 version: v1.13.2

View File

@ -19,7 +19,7 @@ Before installing the chart, you must first install the cert-manager CustomResou
This is performed in a separate step to allow you to easily uninstall and reinstall cert-manager without deleting your installed custom resources. This is performed in a separate step to allow you to easily uninstall and reinstall cert-manager without deleting your installed custom resources.
```bash ```bash
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.13.1/cert-manager.crds.yaml $ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.13.2/cert-manager.crds.yaml
``` ```
To install the chart with the release name `my-release`: To install the chart with the release name `my-release`:
@ -29,7 +29,7 @@ To install the chart with the release name `my-release`:
$ helm repo add jetstack https://charts.jetstack.io $ helm repo add jetstack https://charts.jetstack.io
## Install the cert-manager helm chart ## Install the cert-manager helm chart
$ helm install my-release --namespace cert-manager --version v1.13.1 jetstack/cert-manager $ helm install my-release --namespace cert-manager --version v1.13.2 jetstack/cert-manager
``` ```
In order to begin issuing certificates, you will need to set up a ClusterIssuer In order to begin issuing certificates, you will need to set up a ClusterIssuer
@ -65,7 +65,7 @@ If you want to completely uninstall cert-manager from your cluster, you will als
delete the previously installed CustomResourceDefinition resources: delete the previously installed CustomResourceDefinition resources:
```console ```console
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.13.1/cert-manager.crds.yaml $ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.13.2/cert-manager.crds.yaml
``` ```
## Configuration ## Configuration
@ -86,7 +86,7 @@ The following table lists the configurable parameters of the cert-manager chart
| `global.leaderElection.retryPeriod` | The duration the clients should wait between attempting acquisition and renewal of a leadership | | | `global.leaderElection.retryPeriod` | The duration the clients should wait between attempting acquisition and renewal of a leadership | |
| `installCRDs` | If true, CRD resources will be installed as part of the Helm chart. If enabled, when uninstalling CRD resources will be deleted causing all installed custom resources to be DELETED | `false` | | `installCRDs` | If true, CRD resources will be installed as part of the Helm chart. If enabled, when uninstalling CRD resources will be deleted causing all installed custom resources to be DELETED | `false` |
| `image.repository` | Image repository | `quay.io/jetstack/cert-manager-controller` | | `image.repository` | Image repository | `quay.io/jetstack/cert-manager-controller` |
| `image.tag` | Image tag | `v1.13.1` | | `image.tag` | Image tag | `v1.13.2` |
| `image.pullPolicy` | Image pull policy | `IfNotPresent` | | `image.pullPolicy` | Image pull policy | `IfNotPresent` |
| `replicaCount` | Number of cert-manager replicas | `1` | | `replicaCount` | Number of cert-manager replicas | `1` |
| `clusterResourceNamespace` | Override the namespace used to store DNS provider credentials etc. for ClusterIssuer resources | Same namespace as cert-manager pod | | `clusterResourceNamespace` | Override the namespace used to store DNS provider credentials etc. for ClusterIssuer resources | Same namespace as cert-manager pod |
@ -171,7 +171,7 @@ The following table lists the configurable parameters of the cert-manager chart
| `webhook.tolerations` | Node tolerations for webhook pod assignment | `[]` | | `webhook.tolerations` | Node tolerations for webhook pod assignment | `[]` |
| `webhook.topologySpreadConstraints` | Topology spread constraints for webhook pod assignment | `[]` | | `webhook.topologySpreadConstraints` | Topology spread constraints for webhook pod assignment | `[]` |
| `webhook.image.repository` | Webhook image repository | `quay.io/jetstack/cert-manager-webhook` | | `webhook.image.repository` | Webhook image repository | `quay.io/jetstack/cert-manager-webhook` |
| `webhook.image.tag` | Webhook image tag | `v1.13.1` | | `webhook.image.tag` | Webhook image tag | `v1.13.2` |
| `webhook.image.pullPolicy` | Webhook image pull policy | `IfNotPresent` | | `webhook.image.pullPolicy` | Webhook image pull policy | `IfNotPresent` |
| `webhook.securePort` | The port that the webhook should listen on for requests. | `10250` | | `webhook.securePort` | The port that the webhook should listen on for requests. | `10250` |
| `webhook.securityContext` | Security context for webhook pod assignment | refer to [Default Security Contexts](#default-security-contexts) | | `webhook.securityContext` | Security context for webhook pod assignment | refer to [Default Security Contexts](#default-security-contexts) |
@ -210,13 +210,13 @@ The following table lists the configurable parameters of the cert-manager chart
| `cainjector.tolerations` | Node tolerations for cainjector pod assignment | `[]` | | `cainjector.tolerations` | Node tolerations for cainjector pod assignment | `[]` |
| `cainjector.topologySpreadConstraints` | Topology spread constraints for cainjector pod assignment | `[]` | | `cainjector.topologySpreadConstraints` | Topology spread constraints for cainjector pod assignment | `[]` |
| `cainjector.image.repository` | cainjector image repository | `quay.io/jetstack/cert-manager-cainjector` | | `cainjector.image.repository` | cainjector image repository | `quay.io/jetstack/cert-manager-cainjector` |
| `cainjector.image.tag` | cainjector image tag | `v1.13.1` | | `cainjector.image.tag` | cainjector image tag | `v1.13.2` |
| `cainjector.image.pullPolicy` | cainjector image pull policy | `IfNotPresent` | | `cainjector.image.pullPolicy` | cainjector image pull policy | `IfNotPresent` |
| `cainjector.securityContext` | Security context for cainjector pod assignment | refer to [Default Security Contexts](#default-security-contexts) | | `cainjector.securityContext` | Security context for cainjector pod assignment | refer to [Default Security Contexts](#default-security-contexts) |
| `cainjector.containerSecurityContext` | Security context to be set on cainjector component container | refer to [Default Security Contexts](#default-security-contexts) | | `cainjector.containerSecurityContext` | Security context to be set on cainjector component container | refer to [Default Security Contexts](#default-security-contexts) |
| `cainjector.enableServiceLinks` | Indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links. | `false` | | `cainjector.enableServiceLinks` | Indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links. | `false` |
| `acmesolver.image.repository` | acmesolver image repository | `quay.io/jetstack/cert-manager-acmesolver` | | `acmesolver.image.repository` | acmesolver image repository | `quay.io/jetstack/cert-manager-acmesolver` |
| `acmesolver.image.tag` | acmesolver image tag | `v1.13.1` | | `acmesolver.image.tag` | acmesolver image tag | `v1.13.2` |
| `acmesolver.image.pullPolicy` | acmesolver image pull policy | `IfNotPresent` | | `acmesolver.image.pullPolicy` | acmesolver image pull policy | `IfNotPresent` |
| `startupapicheck.enabled` | Toggles whether the startupapicheck Job should be installed | `true` | | `startupapicheck.enabled` | Toggles whether the startupapicheck Job should be installed | `true` |
| `startupapicheck.securityContext` | Security context for startupapicheck pod assignment | refer to [Default Security Contexts](#default-security-contexts) | | `startupapicheck.securityContext` | Security context for startupapicheck pod assignment | refer to [Default Security Contexts](#default-security-contexts) |
@ -232,7 +232,7 @@ The following table lists the configurable parameters of the cert-manager chart
| `startupapicheck.tolerations` | Node tolerations for startupapicheck pod assignment | `[]` | | `startupapicheck.tolerations` | Node tolerations for startupapicheck pod assignment | `[]` |
| `startupapicheck.podLabels` | Optional additional labels to add to the startupapicheck Pods | `{}` | | `startupapicheck.podLabels` | Optional additional labels to add to the startupapicheck Pods | `{}` |
| `startupapicheck.image.repository` | startupapicheck image repository | `quay.io/jetstack/cert-manager-ctl` | | `startupapicheck.image.repository` | startupapicheck image repository | `quay.io/jetstack/cert-manager-ctl` |
| `startupapicheck.image.tag` | startupapicheck image tag | `v1.13.1` | | `startupapicheck.image.tag` | startupapicheck image tag | `v1.13.2` |
| `startupapicheck.image.pullPolicy` | startupapicheck image pull policy | `IfNotPresent` | | `startupapicheck.image.pullPolicy` | startupapicheck image pull policy | `IfNotPresent` |
| `startupapicheck.serviceAccount.create` | If `true`, create a new service account for the startupapicheck component | `true` | | `startupapicheck.serviceAccount.create` | If `true`, create a new service account for the startupapicheck component | `true` |
| `startupapicheck.serviceAccount.name` | Service account for the startupapicheck component to be used. If not set and `startupapicheck.serviceAccount.create` is `true`, a name is generated using the fullname template | | | `startupapicheck.serviceAccount.name` | Service account for the startupapicheck component to be used. If not set and `startupapicheck.serviceAccount.create` is `true`, a name is generated using the fullname template | |

View File

@ -75,7 +75,7 @@ spec:
{{ if not $config.securePort -}} {{ if not $config.securePort -}}
- --secure-port={{ .Values.webhook.securePort }} - --secure-port={{ .Values.webhook.securePort }}
{{- end }} {{- end }}
{{- if .Values.featureGates }} {{- if .Values.webhook.featureGates }}
- --feature-gates={{ .Values.webhook.featureGates }} - --feature-gates={{ .Values.webhook.featureGates }}
{{- end }} {{- end }}
{{- $tlsConfig := default $config.tlsConfig "" }} {{- $tlsConfig := default $config.tlsConfig "" }}

View File

@ -4,7 +4,7 @@ annotations:
catalog.cattle.io/kube-version: '>1.22.0-0' catalog.cattle.io/kube-version: '>1.22.0-0'
catalog.cattle.io/release-name: falcon-sensor catalog.cattle.io/release-name: falcon-sensor
apiVersion: v2 apiVersion: v2
appVersion: 1.21.2 appVersion: 1.22.1
description: A Helm chart to deploy CrowdStrike Falcon sensors into Kubernetes clusters. description: A Helm chart to deploy CrowdStrike Falcon sensors into Kubernetes clusters.
home: https://crowdstrike.com home: https://crowdstrike.com
icon: https://raw.githubusercontent.com/CrowdStrike/falcon-helm/main/images/crowdstrike-logo.svg icon: https://raw.githubusercontent.com/CrowdStrike/falcon-helm/main/images/crowdstrike-logo.svg
@ -24,4 +24,4 @@ name: falcon-sensor
sources: sources:
- https://github.com/CrowdStrike/falcon-helm - https://github.com/CrowdStrike/falcon-helm
type: application type: application
version: 1.21.2 version: 1.22.1

View File

@ -108,6 +108,15 @@ spec:
- name: falconstore-dir - name: falconstore-dir
mountPath: /host_opt mountPath: /host_opt
{{- end }} {{- end }}
resources:
requests:
cpu: 10m
ephemeral-storage: 10Mi
memory: 50Mi
limits:
cpu: 10m
ephemeral-storage: 10Mi
memory: 50Mi
securityContext: securityContext:
runAsUser: 0 runAsUser: 0
privileged: true privileged: true

View File

@ -100,6 +100,15 @@ spec:
- name: opt-crowdstrike - name: opt-crowdstrike
mountPath: /host_opt mountPath: /host_opt
{{- end }} {{- end }}
resources:
requests:
cpu: 10m
ephemeral-storage: 10Mi
memory: 50Mi
limits:
cpu: 10m
ephemeral-storage: 10Mi
memory: 50Mi
securityContext: securityContext:
runAsUser: 0 runAsUser: 0
privileged: true privileged: true
@ -124,6 +133,15 @@ spec:
- sleep 10 - sleep 10
command: command:
- /bin/bash - /bin/bash
resources:
requests:
cpu: 10m
ephemeral-storage: 10Mi
memory: 50Mi
limits:
cpu: 10m
ephemeral-storage: 10Mi
memory: 50Mi
securityContext: securityContext:
privileged: false privileged: false
readOnlyRootFilesystem: true readOnlyRootFilesystem: true

View File

@ -4,7 +4,7 @@ annotations:
catalog.cattle.io/kube-version: '>= 1.19.0-0' catalog.cattle.io/kube-version: '>= 1.19.0-0'
catalog.cattle.io/release-name: external-secrets catalog.cattle.io/release-name: external-secrets
apiVersion: v2 apiVersion: v2
appVersion: v0.9.7 appVersion: v0.9.8
description: External secret management for Kubernetes description: External secret management for Kubernetes
home: https://github.com/external-secrets/external-secrets home: https://github.com/external-secrets/external-secrets
icon: https://raw.githubusercontent.com/external-secrets/external-secrets/main/assets/eso-logo-large.png icon: https://raw.githubusercontent.com/external-secrets/external-secrets/main/assets/eso-logo-large.png
@ -17,4 +17,4 @@ maintainers:
name: mcavoyk name: mcavoyk
name: external-secrets name: external-secrets
type: application type: application
version: 0.9.7 version: 0.9.8

View File

@ -4,7 +4,7 @@
[//]: # (README.md generated by gotmpl. DO NOT EDIT.) [//]: # (README.md generated by gotmpl. DO NOT EDIT.)
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.7](https://img.shields.io/badge/Version-0.9.7-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.8](https://img.shields.io/badge/Version-0.9.8-informational?style=flat-square)
External secret management for Kubernetes External secret management for Kubernetes

View File

@ -79,16 +79,28 @@ spec:
conversionStrategy: conversionStrategy:
default: Default default: Default
description: Used to define a conversion Strategy description: Used to define a conversion Strategy
enum:
- Default
- Unicode
type: string type: string
decodingStrategy: decodingStrategy:
default: None default: None
description: Used to define a decoding Strategy description: Used to define a decoding Strategy
enum:
- Auto
- Base64
- Base64URL
- None
type: string type: string
key: key:
description: Key is the key used in the Provider, mandatory description: Key is the key used in the Provider, mandatory
type: string type: string
metadataPolicy: metadataPolicy:
default: None
description: Policy for fetching tags/labels from provider secrets, possible options are Fetch, None. Defaults to None description: Policy for fetching tags/labels from provider secrets, possible options are Fetch, None. Defaults to None
enum:
- None
- Fetch
type: string type: string
property: property:
description: Used to select a specific property of the Provider value (if a map), if supported description: Used to select a specific property of the Provider value (if a map), if supported
@ -151,16 +163,28 @@ spec:
conversionStrategy: conversionStrategy:
default: Default default: Default
description: Used to define a conversion Strategy description: Used to define a conversion Strategy
enum:
- Default
- Unicode
type: string type: string
decodingStrategy: decodingStrategy:
default: None default: None
description: Used to define a decoding Strategy description: Used to define a decoding Strategy
enum:
- Auto
- Base64
- Base64URL
- None
type: string type: string
key: key:
description: Key is the key used in the Provider, mandatory description: Key is the key used in the Provider, mandatory
type: string type: string
metadataPolicy: metadataPolicy:
default: None
description: Policy for fetching tags/labels from provider secrets, possible options are Fetch, None. Defaults to None description: Policy for fetching tags/labels from provider secrets, possible options are Fetch, None. Defaults to None
enum:
- None
- Fetch
type: string type: string
property: property:
description: Used to select a specific property of the Provider value (if a map), if supported description: Used to select a specific property of the Provider value (if a map), if supported
@ -177,10 +201,18 @@ spec:
conversionStrategy: conversionStrategy:
default: Default default: Default
description: Used to define a conversion Strategy description: Used to define a conversion Strategy
enum:
- Default
- Unicode
type: string type: string
decodingStrategy: decodingStrategy:
default: None default: None
description: Used to define a decoding Strategy description: Used to define a decoding Strategy
enum:
- Auto
- Base64
- Base64URL
- None
type: string type: string
name: name:
description: Finds secrets based on the name. description: Finds secrets based on the name.
@ -215,6 +247,15 @@ spec:
- source - source
- target - target
type: object type: object
transform:
description: Used to apply string transformation on the secrets. The resulting key will be the output of the template applied by the operation.
properties:
template:
description: Used to define the template to apply on the secret name. `.value ` will specify the secret name in the template.
type: string
required:
- template
type: object
type: object type: object
type: array type: array
sourceRef: sourceRef:
@ -307,9 +348,16 @@ spec:
type: object type: object
engineVersion: engineVersion:
default: v2 default: v2
description: EngineVersion specifies the template engine version that should be used to compile/execute the template specified in .data and .templateFrom[].
enum:
- v1
- v2
type: string type: string
mergePolicy: mergePolicy:
default: Replace default: Replace
enum:
- Replace
- Merge
type: string type: string
metadata: metadata:
description: ExternalSecretTemplateMetadata defines metadata fields for the Secret blueprint. description: ExternalSecretTemplateMetadata defines metadata fields for the Secret blueprint.
@ -335,6 +383,9 @@ spec:
type: string type: string
templateAs: templateAs:
default: Values default: Values
enum:
- Values
- KeysAndValues
type: string type: string
required: required:
- key - key
@ -357,6 +408,9 @@ spec:
type: string type: string
templateAs: templateAs:
default: Values default: Values
enum:
- Values
- KeysAndValues
type: string type: string
required: required:
- key - key
@ -370,6 +424,10 @@ spec:
type: object type: object
target: target:
default: Data default: Data
enum:
- Data
- Annotations
- Labels
type: string type: string
type: object type: object
type: array type: array
@ -409,12 +467,16 @@ spec:
type: object type: object
type: object type: object
x-kubernetes-map-type: atomic x-kubernetes-map-type: atomic
namespaces:
description: Choose namespaces by name. This field is ORed with anything that NamespaceSelector ends up choosing.
items:
type: string
type: array
refreshTime: refreshTime:
description: The time in which the controller should reconcile it's objects and recheck namespaces for labels. description: The time in which the controller should reconcile its objects and recheck namespaces for labels.
type: string type: string
required: required:
- externalSecretSpec - externalSecretSpec
- namespaceSelector
type: object type: object
status: status:
description: ClusterExternalSecretStatus defines the observed state of ClusterExternalSecret. description: ClusterExternalSecretStatus defines the observed state of ClusterExternalSecret.

View File

@ -657,7 +657,7 @@ spec:
description: Oracle configures this store to sync secrets using Oracle Vault provider description: Oracle configures this store to sync secrets using Oracle Vault provider
properties: properties:
auth: auth:
description: Auth configures how secret-manager authenticates with the Oracle Vault. If empty, use the instance principal, otherwise the user credentials specified in Auth. description: Auth configures how secret-manager authenticates with the Oracle Vault. If empty, instance principal is used. Optionally, the authenticating principal type and/or user data may be supplied for the use of workload identity and user principal.
properties: properties:
secretRef: secretRef:
description: SecretRef to pass through sensitive information. description: SecretRef to pass through sensitive information.
@ -703,6 +703,9 @@ spec:
- tenancy - tenancy
- user - user
type: object type: object
principalType:
description: The type of principal to use for authentication. If left blank, the Auth struct will determine the principal type. This optional field must be specified if using workload identity.
type: string
region: region:
description: Region is the region where vault is located. description: Region is the region where vault is located.
type: string type: string
@ -2221,6 +2224,9 @@ spec:
- tenancy - tenancy
- user - user
type: object type: object
principalType:
description: The type of principal to use for authentication. If left blank, the Auth struct will determine the principal type. This optional field must be specified if using workload identity.
type: string
region: region:
description: Region is the region where vault is located. description: Region is the region where vault is located.
type: string type: string

View File

@ -62,6 +62,9 @@ spec:
conversionStrategy: conversionStrategy:
default: Default default: Default
description: Used to define a conversion Strategy description: Used to define a conversion Strategy
enum:
- Default
- Unicode
type: string type: string
key: key:
description: Key is the key used in the Provider, mandatory description: Key is the key used in the Provider, mandatory
@ -90,6 +93,9 @@ spec:
conversionStrategy: conversionStrategy:
default: Default default: Default
description: Used to define a conversion Strategy description: Used to define a conversion Strategy
enum:
- Default
- Unicode
type: string type: string
key: key:
description: Key is the key used in the Provider, mandatory description: Key is the key used in the Provider, mandatory
@ -126,6 +132,10 @@ spec:
creationPolicy: creationPolicy:
default: Owner default: Owner
description: CreationPolicy defines rules on how to create the resulting Secret Defaults to 'Owner' description: CreationPolicy defines rules on how to create the resulting Secret Defaults to 'Owner'
enum:
- Owner
- Merge
- None
type: string type: string
immutable: immutable:
description: Immutable defines if the final secret will be immutable description: Immutable defines if the final secret will be immutable
@ -143,6 +153,9 @@ spec:
engineVersion: engineVersion:
default: v1 default: v1
description: EngineVersion specifies the template engine version that should be used to compile/execute the template specified in .data and .templateFrom[]. description: EngineVersion specifies the template engine version that should be used to compile/execute the template specified in .data and .templateFrom[].
enum:
- v1
- v2
type: string type: string
metadata: metadata:
description: ExternalSecretTemplateMetadata defines metadata fields for the Secret blueprint. description: ExternalSecretTemplateMetadata defines metadata fields for the Secret blueprint.
@ -288,16 +301,28 @@ spec:
conversionStrategy: conversionStrategy:
default: Default default: Default
description: Used to define a conversion Strategy description: Used to define a conversion Strategy
enum:
- Default
- Unicode
type: string type: string
decodingStrategy: decodingStrategy:
default: None default: None
description: Used to define a decoding Strategy description: Used to define a decoding Strategy
enum:
- Auto
- Base64
- Base64URL
- None
type: string type: string
key: key:
description: Key is the key used in the Provider, mandatory description: Key is the key used in the Provider, mandatory
type: string type: string
metadataPolicy: metadataPolicy:
default: None
description: Policy for fetching tags/labels from provider secrets, possible options are Fetch, None. Defaults to None description: Policy for fetching tags/labels from provider secrets, possible options are Fetch, None. Defaults to None
enum:
- None
- Fetch
type: string type: string
property: property:
description: Used to select a specific property of the Provider value (if a map), if supported description: Used to select a specific property of the Provider value (if a map), if supported
@ -360,16 +385,28 @@ spec:
conversionStrategy: conversionStrategy:
default: Default default: Default
description: Used to define a conversion Strategy description: Used to define a conversion Strategy
enum:
- Default
- Unicode
type: string type: string
decodingStrategy: decodingStrategy:
default: None default: None
description: Used to define a decoding Strategy description: Used to define a decoding Strategy
enum:
- Auto
- Base64
- Base64URL
- None
type: string type: string
key: key:
description: Key is the key used in the Provider, mandatory description: Key is the key used in the Provider, mandatory
type: string type: string
metadataPolicy: metadataPolicy:
default: None
description: Policy for fetching tags/labels from provider secrets, possible options are Fetch, None. Defaults to None description: Policy for fetching tags/labels from provider secrets, possible options are Fetch, None. Defaults to None
enum:
- None
- Fetch
type: string type: string
property: property:
description: Used to select a specific property of the Provider value (if a map), if supported description: Used to select a specific property of the Provider value (if a map), if supported
@ -386,10 +423,18 @@ spec:
conversionStrategy: conversionStrategy:
default: Default default: Default
description: Used to define a conversion Strategy description: Used to define a conversion Strategy
enum:
- Default
- Unicode
type: string type: string
decodingStrategy: decodingStrategy:
default: None default: None
description: Used to define a decoding Strategy description: Used to define a decoding Strategy
enum:
- Auto
- Base64
- Base64URL
- None
type: string type: string
name: name:
description: Finds secrets based on the name. description: Finds secrets based on the name.
@ -424,6 +469,15 @@ spec:
- source - source
- target - target
type: object type: object
transform:
description: Used to apply string transformation on the secrets. The resulting key will be the output of the template applied by the operation.
properties:
template:
description: Used to define the template to apply on the secret name. `.value ` will specify the secret name in the template.
type: string
required:
- template
type: object
type: object type: object
type: array type: array
sourceRef: sourceRef:
@ -516,9 +570,16 @@ spec:
type: object type: object
engineVersion: engineVersion:
default: v2 default: v2
description: EngineVersion specifies the template engine version that should be used to compile/execute the template specified in .data and .templateFrom[].
enum:
- v1
- v2
type: string type: string
mergePolicy: mergePolicy:
default: Replace default: Replace
enum:
- Replace
- Merge
type: string type: string
metadata: metadata:
description: ExternalSecretTemplateMetadata defines metadata fields for the Secret blueprint. description: ExternalSecretTemplateMetadata defines metadata fields for the Secret blueprint.
@ -544,6 +605,9 @@ spec:
type: string type: string
templateAs: templateAs:
default: Values default: Values
enum:
- Values
- KeysAndValues
type: string type: string
required: required:
- key - key
@ -566,6 +630,9 @@ spec:
type: string type: string
templateAs: templateAs:
default: Values default: Values
enum:
- Values
- KeysAndValues
type: string type: string
required: required:
- key - key
@ -579,6 +646,10 @@ spec:
type: object type: object
target: target:
default: Data default: Data
enum:
- Data
- Annotations
- Labels
type: string type: string
type: object type: object
type: array type: array

View File

@ -80,6 +80,9 @@ spec:
deletionPolicy: deletionPolicy:
default: None default: None
description: 'Deletion Policy to handle Secrets in the provider. Possible Values: "Delete/None". Defaults to "None".' description: 'Deletion Policy to handle Secrets in the provider. Possible Values: "Delete/None". Defaults to "None".'
enum:
- Delete
- None
type: string type: string
refreshInterval: refreshInterval:
description: The Interval to which External Secrets will try to push a secret definition description: The Interval to which External Secrets will try to push a secret definition

View File

@ -657,7 +657,7 @@ spec:
description: Oracle configures this store to sync secrets using Oracle Vault provider description: Oracle configures this store to sync secrets using Oracle Vault provider
properties: properties:
auth: auth:
description: Auth configures how secret-manager authenticates with the Oracle Vault. If empty, use the instance principal, otherwise the user credentials specified in Auth. description: Auth configures how secret-manager authenticates with the Oracle Vault. If empty, instance principal is used. Optionally, the authenticating principal type and/or user data may be supplied for the use of workload identity and user principal.
properties: properties:
secretRef: secretRef:
description: SecretRef to pass through sensitive information. description: SecretRef to pass through sensitive information.
@ -703,6 +703,9 @@ spec:
- tenancy - tenancy
- user - user
type: object type: object
principalType:
description: The type of principal to use for authentication. If left blank, the Auth struct will determine the principal type. This optional field must be specified if using workload identity.
type: string
region: region:
description: Region is the region where vault is located. description: Region is the region where vault is located.
type: string type: string
@ -2221,6 +2224,9 @@ spec:
- tenancy - tenancy
- user - user
type: object type: object
principalType:
description: The type of principal to use for authentication. If left blank, the Auth struct will determine the principal type. This optional field must be specified if using workload identity.
type: string
region: region:
description: Region is the region where vault is located. description: Region is the region where vault is located.
type: string type: string

View File

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/version: v0.9.7 app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.7 helm.sh/chart: external-secrets-0.9.8
name: RELEASE-NAME-external-secrets-cert-controller name: RELEASE-NAME-external-secrets-cert-controller
namespace: NAMESPACE namespace: NAMESPACE
spec: spec:
@ -24,8 +24,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/version: v0.9.7 app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.7 helm.sh/chart: external-secrets-0.9.8
spec: spec:
automountServiceAccountToken: true automountServiceAccountToken: true
containers: containers:
@ -38,7 +38,7 @@ should match snapshot of default values:
- --secret-namespace=NAMESPACE - --secret-namespace=NAMESPACE
- --metrics-addr=:8080 - --metrics-addr=:8080
- --healthz-addr=:8081 - --healthz-addr=:8081
image: ghcr.io/external-secrets/external-secrets:v0.9.7 image: ghcr.io/external-secrets/external-secrets:v0.9.8
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: cert-controller name: cert-controller
ports: ports:

View File

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets app.kubernetes.io/name: external-secrets
app.kubernetes.io/version: v0.9.7 app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.7 helm.sh/chart: external-secrets-0.9.8
name: RELEASE-NAME-external-secrets name: RELEASE-NAME-external-secrets
namespace: NAMESPACE namespace: NAMESPACE
spec: spec:
@ -24,14 +24,14 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets app.kubernetes.io/name: external-secrets
app.kubernetes.io/version: v0.9.7 app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.7 helm.sh/chart: external-secrets-0.9.8
spec: spec:
automountServiceAccountToken: true automountServiceAccountToken: true
containers: containers:
- args: - args:
- --concurrent=1 - --concurrent=1
image: ghcr.io/external-secrets/external-secrets:v0.9.7 image: ghcr.io/external-secrets/external-secrets:v0.9.8
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: external-secrets name: external-secrets
ports: ports:

View File

@ -662,7 +662,7 @@ should match snapshot of default values:
description: Oracle configures this store to sync secrets using Oracle Vault provider description: Oracle configures this store to sync secrets using Oracle Vault provider
properties: properties:
auth: auth:
description: Auth configures how secret-manager authenticates with the Oracle Vault. If empty, use the instance principal, otherwise the user credentials specified in Auth. description: Auth configures how secret-manager authenticates with the Oracle Vault. If empty, instance principal is used. Optionally, the authenticating principal type and/or user data may be supplied for the use of workload identity and user principal.
properties: properties:
secretRef: secretRef:
description: SecretRef to pass through sensitive information. description: SecretRef to pass through sensitive information.
@ -708,6 +708,9 @@ should match snapshot of default values:
- tenancy - tenancy
- user - user
type: object type: object
principalType:
description: The type of principal to use for authentication. If left blank, the Auth struct will determine the principal type. This optional field must be specified if using workload identity.
type: string
region: region:
description: Region is the region where vault is located. description: Region is the region where vault is located.
type: string type: string
@ -2226,6 +2229,9 @@ should match snapshot of default values:
- tenancy - tenancy
- user - user
type: object type: object
principalType:
description: The type of principal to use for authentication. If left blank, the Auth struct will determine the principal type. This optional field must be specified if using workload identity.
type: string
region: region:
description: Region is the region where vault is located. description: Region is the region where vault is located.
type: string type: string

View File

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/version: v0.9.7 app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.7 helm.sh/chart: external-secrets-0.9.8
name: RELEASE-NAME-external-secrets-webhook name: RELEASE-NAME-external-secrets-webhook
namespace: NAMESPACE namespace: NAMESPACE
spec: spec:
@ -24,8 +24,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/version: v0.9.7 app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.7 helm.sh/chart: external-secrets-0.9.8
spec: spec:
automountServiceAccountToken: true automountServiceAccountToken: true
containers: containers:
@ -37,7 +37,7 @@ should match snapshot of default values:
- --check-interval=5m - --check-interval=5m
- --metrics-addr=:8080 - --metrics-addr=:8080
- --healthz-addr=:8081 - --healthz-addr=:8081
image: ghcr.io/external-secrets/external-secrets:v0.9.7 image: ghcr.io/external-secrets/external-secrets:v0.9.8
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: webhook name: webhook
ports: ports:
@ -81,8 +81,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/version: v0.9.7 app.kubernetes.io/version: v0.9.8
external-secrets.io/component: webhook external-secrets.io/component: webhook
helm.sh/chart: external-secrets-0.9.7 helm.sh/chart: external-secrets-0.9.8
name: RELEASE-NAME-external-secrets-webhook name: RELEASE-NAME-external-secrets-webhook
namespace: NAMESPACE namespace: NAMESPACE

View File

@ -1,5 +1,33 @@
## Unreleased ## Unreleased
## 0.26.1 (October 30, 2023)
Bugs:
* Fix templating of `server.ha.replicas` when set via override file. The `0.26.0` chart would ignore `server.ha.replicas` and always deploy 3 server replicas when `server.ha.enabled=true` unless overridden by command line when issuing the helm command: `--set server.ha.replicas=<some_number>`. Fixed in [GH-961](https://github.com/hashicorp/vault-helm/pull/961)
## 0.26.0 (October 27, 2023)
Changes:
* Default `vault` version updated to 1.15.1
* Default `vault-k8s` version updated to 1.3.1
* Default `vault-csi-provider` version updated to 1.4.1
* Tested with Kubernetes versions 1.24-1.28
* server: OpenShift default readiness probe returns 204 when uninitialized [GH-966](https://github.com/hashicorp/vault-helm/pull/966)
Features:
* server: Add support for dual stack clusters [GH-833](https://github.com/hashicorp/vault-helm/pull/833)
* server: Support `hostAliases` for the StatefulSet pods [GH-955](https://github.com/hashicorp/vault-helm/pull/955)
* server: Add `server.service.active.annotations` and `server.service.standby.annotations` [GH-896](https://github.com/hashicorp/vault-helm/pull/896)
* server: Add long-lived service account token option [GH-923](https://github.com/hashicorp/vault-helm/pull/923)
Bugs:
* csi: Add namespace field to `csi-role` and `csi-rolebindings`. [GH-909](https://github.com/hashicorp/vault-helm/pull/909)
Improvements:
* global: Add `global.namespace` to override the helm installation namespace. [GH-909](https://github.com/hashicorp/vault-helm/pull/909)
* server: use vault.fullname in Helm test [GH-912](https://github.com/hashicorp/vault-helm/pull/912)
* server: Allow scaling HA replicas to zero [GH-943](https://github.com/hashicorp/vault-helm/pull/943)
## 0.25.0 (June 26, 2023) ## 0.25.0 (June 26, 2023)
Changes: Changes:

View File

@ -6,7 +6,7 @@ annotations:
catalog.cattle.io/release-name: vault catalog.cattle.io/release-name: vault
charts.openshift.io/name: HashiCorp Vault charts.openshift.io/name: HashiCorp Vault
apiVersion: v2 apiVersion: v2
appVersion: 1.14.0 appVersion: 1.15.1
description: Official HashiCorp Vault Chart description: Official HashiCorp Vault Chart
home: https://www.vaultproject.io home: https://www.vaultproject.io
icon: https://github.com/hashicorp/vault/raw/f22d202cde2018f9455dec755118a9b84586e082/Vault_PrimaryLogo_Black.png icon: https://github.com/hashicorp/vault/raw/f22d202cde2018f9455dec755118a9b84586e082/Vault_PrimaryLogo_Black.png
@ -25,4 +25,4 @@ sources:
- https://github.com/hashicorp/vault-helm - https://github.com/hashicorp/vault-helm
- https://github.com/hashicorp/vault-k8s - https://github.com/hashicorp/vault-k8s
- https://github.com/hashicorp/vault-csi-provider - https://github.com/hashicorp/vault-csi-provider
version: 0.25.0 version: 0.26.1

View File

@ -10,7 +10,7 @@ cases of Vault on Kubernetes depending on the values provided.
For full documentation on this Helm chart along with all the ways you can For full documentation on this Helm chart along with all the ways you can
use Vault with Kubernetes, please see the use Vault with Kubernetes, please see the
[Vault and Kubernetes documentation](https://www.vaultproject.io/docs/platform/k8s/). [Vault and Kubernetes documentation](https://developer.hashicorp.com/vault/docs/platform/k8s).
## Prerequisites ## Prerequisites
@ -39,5 +39,5 @@ $ helm install vault hashicorp/vault
Please see the many options supported in the `values.yaml` file. These are also Please see the many options supported in the `values.yaml` file. These are also
fully documented directly on the [Vault fully documented directly on the [Vault
website](https://www.vaultproject.io/docs/platform/k8s/helm) along with more website](https://developer.hashicorp.com/vault/docs/platform/k8s/helm) along with more
detailed installation instructions. detailed installation instructions.

View File

@ -4,7 +4,7 @@ Thank you for installing HashiCorp Vault!
Now that you have deployed Vault, you should look over the docs on using Now that you have deployed Vault, you should look over the docs on using
Vault with Kubernetes available here: Vault with Kubernetes available here:
https://www.vaultproject.io/docs/ https://developer.hashicorp.com/vault/docs
Your release is named {{ .Release.Name }}. To learn more about the release, try: Your release is named {{ .Release.Name }}. To learn more about the release, try:

View File

@ -36,6 +36,13 @@ Expand the name of the chart.
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} {{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}}
{{- end -}} {{- end -}}
{{/*
Allow the release namespace to be overridden
*/}}
{{- define "vault.namespace" -}}
{{- default .Release.Namespace .Values.global.namespace -}}
{{- end -}}
{{/* {{/*
Compute if the csi driver is enabled. Compute if the csi driver is enabled.
*/}} */}}
@ -75,6 +82,17 @@ Compute if the server serviceaccount is enabled.
(eq (.Values.global.enabled | toString) "true"))) -}} (eq (.Values.global.enabled | toString) "true"))) -}}
{{- end -}} {{- end -}}
{{/*
Compute if the server serviceaccount should have a token created and mounted to the serviceaccount.
*/}}
{{- define "vault.serverServiceAccountSecretCreationEnabled" -}}
{{- $_ := set . "serverServiceAccountSecretCreationEnabled"
(and
(eq (.Values.server.serviceAccount.create | toString) "true")
(eq (.Values.server.serviceAccount.createSecret | toString) "true")) -}}
{{- end -}}
{{/* {{/*
Compute if the server auth delegator serviceaccount is enabled. Compute if the server auth delegator serviceaccount is enabled.
*/}} */}}
@ -149,7 +167,11 @@ Set's the replica count based on the different modes configured by user
{{ if eq .mode "standalone" }} {{ if eq .mode "standalone" }}
{{- default 1 -}} {{- default 1 -}}
{{ else if eq .mode "ha" }} {{ else if eq .mode "ha" }}
{{- .Values.server.ha.replicas | default 3 -}} {{- if or (kindIs "int64" .Values.server.ha.replicas) (kindIs "float64" .Values.server.ha.replicas) -}}
{{- .Values.server.ha.replicas -}}
{{ else }}
{{- 3 -}}
{{- end -}}
{{ else }} {{ else }}
{{- default 1 -}} {{- default 1 -}}
{{ end }} {{ end }}
@ -688,6 +710,33 @@ Sets extra vault server Service annotations
{{- end }} {{- end }}
{{- end -}} {{- end -}}
{{/*
Sets extra vault server Service (active) annotations
*/}}
{{- define "vault.service.active.annotations" -}}
{{- if .Values.server.service.active.annotations }}
{{- $tp := typeOf .Values.server.service.active.annotations }}
{{- if eq $tp "string" }}
{{- tpl .Values.server.service.active.annotations . | nindent 4 }}
{{- else }}
{{- toYaml .Values.server.service.active.annotations | nindent 4 }}
{{- end }}
{{- end }}
{{- end -}}
{{/*
Sets extra vault server Service annotations
*/}}
{{- define "vault.service.standby.annotations" -}}
{{- if .Values.server.service.standby.annotations }}
{{- $tp := typeOf .Values.server.service.standby.annotations }}
{{- if eq $tp "string" }}
{{- tpl .Values.server.service.standby.annotations . | nindent 4 }}
{{- else }}
{{- toYaml .Values.server.service.standby.annotations | nindent 4 }}
{{- end }}
{{- end }}
{{- end -}}
{{/* {{/*
Sets PodSecurityPolicy annotations Sets PodSecurityPolicy annotations
*/}} */}}

View File

@ -9,7 +9,7 @@ apiVersion: v1
kind: ConfigMap kind: ConfigMap
metadata: metadata:
name: {{ template "vault.fullname" . }}-csi-provider-agent-config name: {{ template "vault.fullname" . }}-csi-provider-agent-config
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider
@ -21,7 +21,7 @@ data:
{{- if .Values.global.externalVaultAddr }} {{- if .Values.global.externalVaultAddr }}
"address" = "{{ .Values.global.externalVaultAddr }}" "address" = "{{ .Values.global.externalVaultAddr }}"
{{- else }} {{- else }}
"address" = "{{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ .Release.Namespace }}.svc:{{ .Values.server.service.port }}" "address" = "{{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ include "vault.namespace" . }}.svc:{{ .Values.server.service.port }}"
{{- end }} {{- end }}
} }

View File

@ -20,5 +20,5 @@ roleRef:
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ template "vault.fullname" . }}-csi-provider name: {{ template "vault.fullname" . }}-csi-provider
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
{{- end }} {{- end }}

View File

@ -9,7 +9,7 @@ apiVersion: apps/v1
kind: DaemonSet kind: DaemonSet
metadata: metadata:
name: {{ template "vault.fullname" . }}-csi-provider name: {{ template "vault.fullname" . }}-csi-provider
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}
@ -71,7 +71,7 @@ spec:
{{- else if .Values.global.externalVaultAddr }} {{- else if .Values.global.externalVaultAddr }}
value: "{{ .Values.global.externalVaultAddr }}" value: "{{ .Values.global.externalVaultAddr }}"
{{- else }} {{- else }}
value: {{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ .Release.Namespace }}.svc:{{ .Values.server.service.port }} value: {{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ include "vault.namespace" . }}.svc:{{ .Values.server.service.port }}
{{- end }} {{- end }}
volumeMounts: volumeMounts:
- name: providervol - name: providervol

View File

@ -9,6 +9,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
name: {{ template "vault.fullname" . }}-csi-provider-role name: {{ template "vault.fullname" . }}-csi-provider-role
namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -9,6 +9,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: {{ template "vault.fullname" . }}-csi-provider-rolebinding name: {{ template "vault.fullname" . }}-csi-provider-rolebinding
namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}
@ -20,5 +21,5 @@ roleRef:
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ template "vault.fullname" . }}-csi-provider name: {{ template "vault.fullname" . }}-csi-provider
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
{{- end }} {{- end }}

View File

@ -9,7 +9,7 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: {{ template "vault.fullname" . }}-csi-provider name: {{ template "vault.fullname" . }}-csi-provider
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider app.kubernetes.io/name: {{ include "vault.name" . }}-csi-provider
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -10,7 +10,7 @@ apiVersion: v1
kind: Secret kind: Secret
metadata: metadata:
name: vault-injector-certs name: vault-injector-certs
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -20,5 +20,5 @@ roleRef:
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ template "vault.fullname" . }}-agent-injector name: {{ template "vault.fullname" . }}-agent-injector
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
{{ end }} {{ end }}

View File

@ -10,7 +10,7 @@ apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: {{ template "vault.fullname" . }}-agent-injector name: {{ template "vault.fullname" . }}-agent-injector
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}
@ -64,7 +64,7 @@ spec:
{{- else if .Values.injector.externalVaultAddr }} {{- else if .Values.injector.externalVaultAddr }}
value: "{{ .Values.injector.externalVaultAddr }}" value: "{{ .Values.injector.externalVaultAddr }}"
{{- else }} {{- else }}
value: {{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ .Release.Namespace }}.svc:{{ .Values.server.service.port }} value: {{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ include "vault.namespace" . }}.svc:{{ .Values.server.service.port }}
{{- end }} {{- end }}
- name: AGENT_INJECT_VAULT_AUTH_PATH - name: AGENT_INJECT_VAULT_AUTH_PATH
value: {{ .Values.injector.authPath }} value: {{ .Values.injector.authPath }}
@ -79,7 +79,7 @@ spec:
- name: AGENT_INJECT_TLS_AUTO - name: AGENT_INJECT_TLS_AUTO
value: {{ template "vault.fullname" . }}-agent-injector-cfg value: {{ template "vault.fullname" . }}-agent-injector-cfg
- name: AGENT_INJECT_TLS_AUTO_HOSTS - name: AGENT_INJECT_TLS_AUTO_HOSTS
value: {{ template "vault.fullname" . }}-agent-injector-svc,{{ template "vault.fullname" . }}-agent-injector-svc.{{ .Release.Namespace }},{{ template "vault.fullname" . }}-agent-injector-svc.{{ .Release.Namespace }}.svc value: {{ template "vault.fullname" . }}-agent-injector-svc,{{ template "vault.fullname" . }}-agent-injector-svc.{{ include "vault.namespace" . }},{{ template "vault.fullname" . }}-agent-injector-svc.{{ include "vault.namespace" . }}.svc
{{- end }} {{- end }}
- name: AGENT_INJECT_LOG_FORMAT - name: AGENT_INJECT_LOG_FORMAT
value: {{ .Values.injector.logFormat | default "standard" }} value: {{ .Values.injector.logFormat | default "standard" }}

View File

@ -8,7 +8,7 @@ apiVersion: policy/v1
kind: PodDisruptionBudget kind: PodDisruptionBudget
metadata: metadata:
name: {{ template "vault.fullname" . }}-agent-injector name: {{ template "vault.fullname" . }}-agent-injector
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector

View File

@ -28,7 +28,7 @@ webhooks:
clientConfig: clientConfig:
service: service:
name: {{ template "vault.fullname" . }}-agent-injector-svc name: {{ template "vault.fullname" . }}-agent-injector-svc
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
path: "/mutate" path: "/mutate"
caBundle: {{ .Values.injector.certs.caBundle | quote }} caBundle: {{ .Values.injector.certs.caBundle | quote }}
rules: rules:

View File

@ -10,7 +10,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
name: {{ template "vault.fullname" . }}-agent-injector-psp name: {{ template "vault.fullname" . }}-agent-injector-psp
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -10,7 +10,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: {{ template "vault.fullname" . }}-agent-injector-psp name: {{ template "vault.fullname" . }}-agent-injector-psp
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -10,7 +10,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
name: {{ template "vault.fullname" . }}-agent-injector-leader-elector-role name: {{ template "vault.fullname" . }}-agent-injector-leader-elector-role
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -10,7 +10,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: {{ template "vault.fullname" . }}-agent-injector-leader-elector-binding name: {{ template "vault.fullname" . }}-agent-injector-leader-elector-binding
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}
@ -22,6 +22,6 @@ roleRef:
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ template "vault.fullname" . }}-agent-injector name: {{ template "vault.fullname" . }}-agent-injector
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
{{- end }} {{- end }}
{{- end }} {{- end }}

View File

@ -9,7 +9,7 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: {{ template "vault.fullname" . }}-agent-injector-svc name: {{ template "vault.fullname" . }}-agent-injector-svc
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -9,7 +9,7 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: {{ template "vault.fullname" . }}-agent-injector name: {{ template "vault.fullname" . }}-agent-injector
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector app.kubernetes.io/name: {{ include "vault.name" . }}-agent-injector
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -45,5 +45,5 @@ spec:
insecureSkipVerify: true insecureSkipVerify: true
namespaceSelector: namespaceSelector:
matchNames: matchNames:
- {{ .Release.Namespace }} - {{ include "vault.namespace" . }}
{{ end }} {{ end }}

View File

@ -25,5 +25,5 @@ roleRef:
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ template "vault.serviceAccount.name" . }} name: {{ template "vault.serviceAccount.name" . }}
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
{{ end }} {{ end }}

View File

@ -12,7 +12,7 @@ apiVersion: v1
kind: ConfigMap kind: ConfigMap
metadata: metadata:
name: {{ template "vault.fullname" . }}-config name: {{ template "vault.fullname" . }}-config
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}

View File

@ -10,7 +10,7 @@ SPDX-License-Identifier: MPL-2.0
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
name: {{ template "vault.fullname" . }}-discovery-role name: {{ template "vault.fullname" . }}-discovery-role
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}

View File

@ -15,7 +15,7 @@ apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: {{ template "vault.fullname" . }}-discovery-rolebinding name: {{ template "vault.fullname" . }}-discovery-rolebinding
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
@ -28,7 +28,7 @@ roleRef:
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ template "vault.serviceAccount.name" . }} name: {{ template "vault.serviceAccount.name" . }}
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
{{ end }} {{ end }}
{{ end }} {{ end }}
{{ end }} {{ end }}

View File

@ -13,7 +13,7 @@ apiVersion: policy/v1
kind: PodDisruptionBudget kind: PodDisruptionBudget
metadata: metadata:
name: {{ template "vault.fullname" . }} name: {{ template "vault.fullname" . }}
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}

View File

@ -14,7 +14,7 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: {{ template "vault.fullname" . }}-active name: {{ template "vault.fullname" . }}-active
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
@ -22,11 +22,20 @@ metadata:
app.kubernetes.io/managed-by: {{ .Release.Service }} app.kubernetes.io/managed-by: {{ .Release.Service }}
vault-active: "true" vault-active: "true"
annotations: annotations:
{{ template "vault.service.annotations" .}} {{- template "vault.service.active.annotations" . }}
{{- template "vault.service.annotations" . }}
spec: spec:
{{- if .Values.server.service.type}} {{- if .Values.server.service.type}}
type: {{ .Values.server.service.type }} type: {{ .Values.server.service.type }}
{{- end}} {{- end}}
{{- if (semverCompare ">= 1.23-0" .Capabilities.KubeVersion.Version) }}
{{- if .Values.server.service.ipFamilyPolicy }}
ipFamilyPolicy: {{ .Values.server.service.ipFamilyPolicy }}
{{- end }}
{{- if .Values.server.service.ipFamilies }}
ipFamilies: {{ .Values.server.service.ipFamilies | toYaml | nindent 2 }}
{{- end }}
{{- end }}
{{- if .Values.server.service.clusterIP }} {{- if .Values.server.service.clusterIP }}
clusterIP: {{ .Values.server.service.clusterIP }} clusterIP: {{ .Values.server.service.clusterIP }}
{{- end }} {{- end }}

View File

@ -14,18 +14,27 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: {{ template "vault.fullname" . }}-standby name: {{ template "vault.fullname" . }}-standby
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}
app.kubernetes.io/managed-by: {{ .Release.Service }} app.kubernetes.io/managed-by: {{ .Release.Service }}
annotations: annotations:
{{ template "vault.service.annotations" .}} {{- template "vault.service.standby.annotations" . }}
{{- template "vault.service.annotations" . }}
spec: spec:
{{- if .Values.server.service.type}} {{- if .Values.server.service.type}}
type: {{ .Values.server.service.type }} type: {{ .Values.server.service.type }}
{{- end}} {{- end}}
{{- if (semverCompare ">= 1.23-0" .Capabilities.KubeVersion.Version) }}
{{- if .Values.server.service.ipFamilyPolicy }}
ipFamilyPolicy: {{ .Values.server.service.ipFamilyPolicy }}
{{- end }}
{{- if .Values.server.service.ipFamilies }}
ipFamilies: {{ .Values.server.service.ipFamilies | toYaml | nindent 2 }}
{{- end }}
{{- end }}
{{- if .Values.server.service.clusterIP }} {{- if .Values.server.service.clusterIP }}
clusterIP: {{ .Values.server.service.clusterIP }} clusterIP: {{ .Values.server.service.clusterIP }}
{{- end }} {{- end }}

View File

@ -12,7 +12,7 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: {{ template "vault.fullname" . }}-internal name: {{ template "vault.fullname" . }}-internal
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
@ -22,6 +22,14 @@ metadata:
annotations: annotations:
{{ template "vault.service.annotations" .}} {{ template "vault.service.annotations" .}}
spec: spec:
{{- if (semverCompare ">= 1.23-0" .Capabilities.KubeVersion.Version) }}
{{- if .Values.server.service.ipFamilyPolicy }}
ipFamilyPolicy: {{ .Values.server.service.ipFamilyPolicy }}
{{- end }}
{{- if .Values.server.service.ipFamilies }}
ipFamilies: {{ .Values.server.service.ipFamilies | toYaml | nindent 2 }}
{{- end }}
{{- end }}
clusterIP: None clusterIP: None
publishNotReadyAddresses: true publishNotReadyAddresses: true
ports: ports:

View File

@ -21,7 +21,7 @@ apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
metadata: metadata:
name: {{ template "vault.fullname" . }} name: {{ template "vault.fullname" . }}
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}

View File

@ -10,7 +10,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
name: {{ template "vault.fullname" . }}-psp name: {{ template "vault.fullname" . }}-psp
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -10,7 +10,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: {{ template "vault.fullname" . }}-psp name: {{ template "vault.fullname" . }}-psp
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -14,7 +14,7 @@ kind: Route
apiVersion: route.openshift.io/v1 apiVersion: route.openshift.io/v1
metadata: metadata:
name: {{ template "vault.fullname" . }} name: {{ template "vault.fullname" . }}
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}

View File

@ -12,7 +12,7 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: {{ template "vault.fullname" . }} name: {{ template "vault.fullname" . }}
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
@ -24,6 +24,14 @@ spec:
{{- if .Values.server.service.type}} {{- if .Values.server.service.type}}
type: {{ .Values.server.service.type }} type: {{ .Values.server.service.type }}
{{- end}} {{- end}}
{{- if (semverCompare ">= 1.23-0" .Capabilities.KubeVersion.Version) }}
{{- if .Values.server.service.ipFamilyPolicy }}
ipFamilyPolicy: {{ .Values.server.service.ipFamilyPolicy }}
{{- end }}
{{- if .Values.server.service.ipFamilies }}
ipFamilies: {{ .Values.server.service.ipFamilies | toYaml | nindent 2 }}
{{- end }}
{{- end }}
{{- if .Values.server.service.clusterIP }} {{- if .Values.server.service.clusterIP }}
clusterIP: {{ .Values.server.service.clusterIP }} clusterIP: {{ .Values.server.service.clusterIP }}
{{- end }} {{- end }}

View File

@ -0,0 +1,21 @@
{{/*
Copyright (c) HashiCorp, Inc.
SPDX-License-Identifier: MPL-2.0
*/}}
{{ template "vault.serverServiceAccountSecretCreationEnabled" . }}
{{- if .serverServiceAccountSecretCreationEnabled -}}
apiVersion: v1
kind: Secret
metadata:
name: {{ template "vault.serviceAccount.name" . }}-token
namespace: {{ include "vault.namespace" . }}
annotations:
kubernetes.io/service-account.name: {{ template "vault.serviceAccount.name" . }}
labels:
helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }}
app.kubernetes.io/managed-by: {{ .Release.Service }}
type: kubernetes.io/service-account-token
{{ end }}

View File

@ -9,7 +9,7 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: {{ template "vault.serviceAccount.name" . }} name: {{ template "vault.serviceAccount.name" . }}
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}

View File

@ -12,7 +12,7 @@ apiVersion: apps/v1
kind: StatefulSet kind: StatefulSet
metadata: metadata:
name: {{ template "vault.fullname" . }} name: {{ template "vault.fullname" . }}
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}
@ -61,6 +61,10 @@ spec:
{{ template "vault.volumes" . }} {{ template "vault.volumes" . }}
- name: home - name: home
emptyDir: {} emptyDir: {}
{{- if .Values.server.hostAliases }}
hostAliases:
{{ toYaml .Values.server.hostAliases | nindent 8}}
{{- end }}
{{- if .Values.server.extraInitContainers }} {{- if .Values.server.extraInitContainers }}
initContainers: initContainers:
{{ toYaml .Values.server.extraInitContainers | nindent 8}} {{ toYaml .Values.server.extraInitContainers | nindent 8}}

View File

@ -9,8 +9,8 @@ SPDX-License-Identifier: MPL-2.0
apiVersion: v1 apiVersion: v1
kind: Pod kind: Pod
metadata: metadata:
name: "{{ .Release.Name }}-server-test" name: {{ template "vault.fullname" . }}-server-test
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
annotations: annotations:
"helm.sh/hook": test "helm.sh/hook": test
spec: spec:
@ -21,7 +21,7 @@ spec:
imagePullPolicy: {{ .Values.server.image.pullPolicy }} imagePullPolicy: {{ .Values.server.image.pullPolicy }}
env: env:
- name: VAULT_ADDR - name: VAULT_ADDR
value: {{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ .Release.Namespace }}.svc:{{ .Values.server.service.port }} value: {{ include "vault.scheme" . }}://{{ template "vault.fullname" . }}.{{ include "vault.namespace" . }}.svc:{{ .Values.server.service.port }}
{{- include "vault.extraEnvironmentVars" .Values.server | nindent 8 }} {{- include "vault.extraEnvironmentVars" .Values.server | nindent 8 }}
command: command:
- /bin/sh - /bin/sh

View File

@ -12,7 +12,7 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: {{ template "vault.fullname" . }}-ui name: {{ template "vault.fullname" . }}-ui
namespace: {{ .Release.Namespace }} namespace: {{ include "vault.namespace" . }}
labels: labels:
helm.sh/chart: {{ include "vault.chart" . }} helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }}-ui app.kubernetes.io/name: {{ include "vault.name" . }}-ui
@ -20,6 +20,14 @@ metadata:
app.kubernetes.io/managed-by: {{ .Release.Service }} app.kubernetes.io/managed-by: {{ .Release.Service }}
{{- template "vault.ui.annotations" . }} {{- template "vault.ui.annotations" . }}
spec: spec:
{{- if (semverCompare ">= 1.23-0" .Capabilities.KubeVersion.Version) }}
{{- if .Values.ui.serviceIPFamilyPolicy }}
ipFamilyPolicy: {{ .Values.ui.serviceIPFamilyPolicy }}
{{- end }}
{{- if .Values.ui.serviceIPFamilies }}
ipFamilies: {{ .Values.ui.serviceIPFamilies | toYaml | nindent 2 }}
{{- end }}
{{- end }}
selector: selector:
app.kubernetes.io/name: {{ include "vault.name" . }} app.kubernetes.io/name: {{ include "vault.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/instance: {{ .Release.Name }}

View File

@ -9,13 +9,16 @@ global:
injector: injector:
image: image:
repository: "registry.connect.redhat.com/hashicorp/vault-k8s" repository: "registry.connect.redhat.com/hashicorp/vault-k8s"
tag: "1.2.1-ubi" tag: "1.3.1-ubi"
agentImage: agentImage:
repository: "registry.connect.redhat.com/hashicorp/vault" repository: "registry.connect.redhat.com/hashicorp/vault"
tag: "1.14.0-ubi" tag: "1.15.1-ubi"
server: server:
image: image:
repository: "registry.connect.redhat.com/hashicorp/vault" repository: "registry.connect.redhat.com/hashicorp/vault"
tag: "1.14.0-ubi" tag: "1.15.1-ubi"
readinessProbe:
path: "/v1/sys/health?uninitcode=204"

View File

@ -228,6 +228,9 @@
"enabled": { "enabled": {
"type": "boolean" "type": "boolean"
}, },
"namespace": {
"type": "string"
},
"externalVaultAddr": { "externalVaultAddr": {
"type": "string" "type": "string"
}, },
@ -737,6 +740,9 @@
} }
} }
}, },
"hostAliases": {
"type": "array"
},
"image": { "image": {
"type": "object", "type": "object",
"properties": { "properties": {
@ -916,6 +922,12 @@
"properties": { "properties": {
"enabled": { "enabled": {
"type": "boolean" "type": "boolean"
},
"annotations": {
"type": [
"object",
"string"
]
} }
} }
}, },
@ -950,6 +962,12 @@
"properties": { "properties": {
"enabled": { "enabled": {
"type": "boolean" "type": "boolean"
},
"annotations": {
"type": [
"object",
"string"
]
} }
} }
}, },
@ -964,6 +982,14 @@
}, },
"standbyNodePort": { "standbyNodePort": {
"type": "integer" "type": "integer"
},
"ipFamilyPolicy": {
"type": "string"
},
"ipFamilies": {
"type": [
"array"
]
} }
} }
}, },
@ -982,6 +1008,9 @@
"extraLabels": { "extraLabels": {
"type": "object" "type": "object"
}, },
"createSecret": {
"type": "boolean"
},
"name": { "name": {
"type": "string" "type": "string"
}, },
@ -1137,6 +1166,16 @@
}, },
"targetPort": { "targetPort": {
"type": "integer" "type": "integer"
},
"serviceIPFamilyPolicy": {
"type": [
"string"
]
},
"serviceIPFamilies": {
"type": [
"array"
]
} }
} }
} }

View File

@ -8,6 +8,9 @@ global:
# will enable or disable all the components within this chart by default. # will enable or disable all the components within this chart by default.
enabled: true enabled: true
# The namespace to deploy to. Defaults to the `helm` installation namespace.
namespace: ""
# Image pull secret to use for registry authentication. # Image pull secret to use for registry authentication.
# Alternatively, the value may be specified as an array of strings. # Alternatively, the value may be specified as an array of strings.
imagePullSecrets: [] imagePullSecrets: []
@ -65,7 +68,7 @@ injector:
# image sets the repo and tag of the vault-k8s image to use for the injector. # image sets the repo and tag of the vault-k8s image to use for the injector.
image: image:
repository: "hashicorp/vault-k8s" repository: "hashicorp/vault-k8s"
tag: "1.2.1" tag: "1.3.1"
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
# agentImage sets the repo and tag of the Vault image to use for the Vault Agent # agentImage sets the repo and tag of the Vault image to use for the Vault Agent
@ -73,7 +76,7 @@ injector:
# required. # required.
agentImage: agentImage:
repository: "hashicorp/vault" repository: "hashicorp/vault"
tag: "1.14.0" tag: "1.15.1"
# The default values for the injected Vault Agent containers. # The default values for the injected Vault Agent containers.
agentDefaults: agentDefaults:
@ -374,7 +377,7 @@ server:
image: image:
repository: "hashicorp/vault" repository: "hashicorp/vault"
tag: "1.14.0" tag: "1.15.1"
# Overrides the default Image Pull Policy # Overrides the default Image Pull Policy
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
@ -442,6 +445,12 @@ server:
# hosts: # hosts:
# - chart-example.local # - chart-example.local
# hostAliases is a list of aliases to be added to /etc/hosts. Specified as a YAML list.
hostAliases: []
# - ip: 127.0.0.1
# hostnames:
# - chart-example.local
# OpenShift only - create a route to expose the service # OpenShift only - create a route to expose the service
# By default the created route will be of type passthrough # By default the created route will be of type passthrough
route: route:
@ -462,7 +471,7 @@ server:
# authDelegator enables a cluster role binding to be attached to the service # authDelegator enables a cluster role binding to be attached to the service
# account. This cluster role binding can be used to setup Kubernetes auth # account. This cluster role binding can be used to setup Kubernetes auth
# method. https://www.vaultproject.io/docs/auth/kubernetes.html # method. See https://developer.hashicorp.com/vault/docs/auth/kubernetes
authDelegator: authDelegator:
enabled: true enabled: true
@ -649,13 +658,21 @@ server:
service: service:
enabled: true enabled: true
# Enable or disable the vault-active service, which selects Vault pods that # Enable or disable the vault-active service, which selects Vault pods that
# have labelled themselves as the cluster leader with `vault-active: "true"` # have labeled themselves as the cluster leader with `vault-active: "true"`.
active: active:
enabled: true enabled: true
# Extra annotations for the service definition. This can either be YAML or a
# YAML-formatted multi-line templated string map of the annotations to apply
# to the active service.
annotations: {}
# Enable or disable the vault-standby service, which selects Vault pods that # Enable or disable the vault-standby service, which selects Vault pods that
# have labelled themselves as a cluster follower with `vault-active: "false"` # have labeled themselves as a cluster follower with `vault-active: "false"`.
standby: standby:
enabled: true enabled: true
# Extra annotations for the service definition. This can either be YAML or a
# YAML-formatted multi-line templated string map of the annotations to apply
# to the standby service.
annotations: {}
# If enabled, the service selectors will include `app.kubernetes.io/instance: {{ .Release.Name }}` # If enabled, the service selectors will include `app.kubernetes.io/instance: {{ .Release.Name }}`
# When disabled, services may select Vault pods not deployed from the chart. # When disabled, services may select Vault pods not deployed from the chart.
# Does not affect the headless vault-internal service with `ClusterIP: None` # Does not affect the headless vault-internal service with `ClusterIP: None`
@ -673,6 +690,21 @@ server:
# or NodePort. # or NodePort.
#type: ClusterIP #type: ClusterIP
# The IP family and IP families options are to set the behaviour in a dual-stack environment.
# Omitting these values will let the service fall back to whatever the CNI dictates the defaults
# should be.
# These are only supported for kubernetes versions >=1.23.0
#
# Configures the service's supported IP family policy, can be either:
# SingleStack: Single-stack service. The control plane allocates a cluster IP for the Service, using the first configured service cluster IP range.
# PreferDualStack: Allocates IPv4 and IPv6 cluster IPs for the Service.
# RequireDualStack: Allocates Service .spec.ClusterIPs from both IPv4 and IPv6 address ranges.
ipFamilyPolicy: ""
# Sets the families that should be supported and the order in which they should be applied to ClusterIP as well.
# Can be IPv4 and/or IPv6.
ipFamilies: []
# Do not wait for pods to be ready before including them in the services' # Do not wait for pods to be ready before including them in the services'
# targets. Does not apply to the headless service, which is used for # targets. Does not apply to the headless service, which is used for
# cluster-internal communication. # cluster-internal communication.
@ -709,7 +741,7 @@ server:
# This configures the Vault Statefulset to create a PVC for data # This configures the Vault Statefulset to create a PVC for data
# storage when using the file or raft backend storage engines. # storage when using the file or raft backend storage engines.
# See https://www.vaultproject.io/docs/configuration/storage/index.html to know more # See https://developer.hashicorp.com/vault/docs/configuration/storage to know more
dataStorage: dataStorage:
enabled: true enabled: true
# Size of the PVC created # Size of the PVC created
@ -728,7 +760,7 @@ server:
# logs. Once Vault is deployed, initialized, and unsealed, Vault must # logs. Once Vault is deployed, initialized, and unsealed, Vault must
# be configured to use this for audit logs. This will be mounted to # be configured to use this for audit logs. This will be mounted to
# /vault/audit # /vault/audit
# See https://www.vaultproject.io/docs/audit/index.html to know more # See https://developer.hashicorp.com/vault/docs/audit to know more
auditStorage: auditStorage:
enabled: false enabled: false
# Size of the PVC created # Size of the PVC created
@ -747,7 +779,7 @@ server:
# and no initialization. This is useful for experimenting with Vault without # and no initialization. This is useful for experimenting with Vault without
# needing to unseal, store keys, et. al. All data is lost on restart - do not # needing to unseal, store keys, et. al. All data is lost on restart - do not
# use dev mode for anything other than experimenting. # use dev mode for anything other than experimenting.
# See https://www.vaultproject.io/docs/concepts/dev-server.html to know more # See https://developer.hashicorp.com/vault/docs/concepts/dev-server to know more
dev: dev:
enabled: false enabled: false
@ -769,7 +801,7 @@ server:
# Note: Configuration files are stored in ConfigMaps so sensitive data # Note: Configuration files are stored in ConfigMaps so sensitive data
# such as passwords should be either mounted through extraSecretEnvironmentVars # such as passwords should be either mounted through extraSecretEnvironmentVars
# or through a Kube secret. For more information see: # or through a Kube secret. For more information see:
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations # https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
config: | config: |
ui = true ui = true
@ -812,12 +844,12 @@ server:
replicas: 3 replicas: 3
# Set the api_addr configuration for Vault HA # Set the api_addr configuration for Vault HA
# See https://www.vaultproject.io/docs/configuration#api_addr # See https://developer.hashicorp.com/vault/docs/configuration#api_addr
# If set to null, this will be set to the Pod IP Address # If set to null, this will be set to the Pod IP Address
apiAddr: null apiAddr: null
# Set the cluster_addr confuguration for Vault HA # Set the cluster_addr confuguration for Vault HA
# See https://www.vaultproject.io/docs/configuration#cluster_addr # See https://developer.hashicorp.com/vault/docs/configuration#cluster_addr
# If set to null, this will be set to https://$(HOSTNAME).{{ template "vault.fullname" . }}-internal:8201 # If set to null, this will be set to https://$(HOSTNAME).{{ template "vault.fullname" . }}-internal:8201
clusterAddr: null clusterAddr: null
@ -835,7 +867,7 @@ server:
# Note: Configuration files are stored in ConfigMaps so sensitive data # Note: Configuration files are stored in ConfigMaps so sensitive data
# such as passwords should be either mounted through extraSecretEnvironmentVars # such as passwords should be either mounted through extraSecretEnvironmentVars
# or through a Kube secret. For more information see: # or through a Kube secret. For more information see:
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations # https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
config: | config: |
ui = true ui = true
@ -862,7 +894,7 @@ server:
# Note: Configuration files are stored in ConfigMaps so sensitive data # Note: Configuration files are stored in ConfigMaps so sensitive data
# such as passwords should be either mounted through extraSecretEnvironmentVars # such as passwords should be either mounted through extraSecretEnvironmentVars
# or through a Kube secret. For more information see: # or through a Kube secret. For more information see:
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations # https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
config: | config: |
ui = true ui = true
@ -914,6 +946,12 @@ server:
# The name of the service account to use. # The name of the service account to use.
# If not set and create is true, a name is generated using the fullname template # If not set and create is true, a name is generated using the fullname template
name: "" name: ""
# Create a Secret API object to store a non-expiring token for the service account.
# Prior to v1.24.0, Kubernetes used to generate this secret for each service account by default.
# Kubernetes now recommends using short-lived tokens from the TokenRequest API or projected volumes instead if possible.
# For more details, see https://kubernetes.io/docs/concepts/configuration/secret/#service-account-token-secrets
# serviceAccount.create must be equal to 'true' in order to use this feature.
createSecret: false
# Extra annotations for the serviceAccount definition. This can either be # Extra annotations for the serviceAccount definition. This can either be
# YAML or a YAML-formatted multi-line templated string map of the # YAML or a YAML-formatted multi-line templated string map of the
# annotations to apply to the serviceAccount. # annotations to apply to the serviceAccount.
@ -970,6 +1008,21 @@ ui:
externalPort: 8200 externalPort: 8200
targetPort: 8200 targetPort: 8200
# The IP family and IP families options are to set the behaviour in a dual-stack environment.
# Omitting these values will let the service fall back to whatever the CNI dictates the defaults
# should be.
# These are only supported for kubernetes versions >=1.23.0
#
# Configures the service's supported IP family, can be either:
# SingleStack: Single-stack service. The control plane allocates a cluster IP for the Service, using the first configured service cluster IP range.
# PreferDualStack: Allocates IPv4 and IPv6 cluster IPs for the Service.
# RequireDualStack: Allocates Service .spec.ClusterIPs from both IPv4 and IPv6 address ranges.
serviceIPFamilyPolicy: ""
# Sets the families that should be supported and the order in which they should be applied to ClusterIP as well
# Can be IPv4 and/or IPv6.
serviceIPFamilies: []
# The externalTrafficPolicy can be set to either Cluster or Local # The externalTrafficPolicy can be set to either Cluster or Local
# and is only valid for LoadBalancer and NodePort service types. # and is only valid for LoadBalancer and NodePort service types.
# The default value is Cluster. # The default value is Cluster.
@ -1001,7 +1054,7 @@ csi:
image: image:
repository: "hashicorp/vault-csi-provider" repository: "hashicorp/vault-csi-provider"
tag: "1.4.0" tag: "1.4.1"
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
# volumes is a list of volumes made available to all containers. These are rendered # volumes is a list of volumes made available to all containers. These are rendered
@ -1086,7 +1139,7 @@ csi:
image: image:
repository: "hashicorp/vault" repository: "hashicorp/vault"
tag: "1.14.0" tag: "1.15.1"
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
logFormat: standard logFormat: standard
@ -1143,7 +1196,7 @@ csi:
debug: false debug: false
# Pass arbitrary additional arguments to vault-csi-provider. # Pass arbitrary additional arguments to vault-csi-provider.
# See https://www.vaultproject.io/docs/platform/k8s/csi/configurations#command-line-arguments # See https://developer.hashicorp.com/vault/docs/platform/k8s/csi/configurations#command-line-arguments
# for the available command line flags. # for the available command line flags.
extraArgs: [] extraArgs: []
@ -1152,8 +1205,8 @@ csi:
# the Vault configuration. There are a few examples included in the `config` sections above. # the Vault configuration. There are a few examples included in the `config` sections above.
# #
# For more information see: # For more information see:
# https://www.vaultproject.io/docs/configuration/telemetry # https://developer.hashicorp.com/vault/docs/configuration/telemetry
# https://www.vaultproject.io/docs/internals/telemetry # https://developer.hashicorp.com/vault/docs/internals/telemetry
serverTelemetry: serverTelemetry:
# Enable support for the Prometheus Operator. Currently, this chart does not support # Enable support for the Prometheus Operator. Currently, this chart does not support
# authenticating to Vault's metrics endpoint, so the following `telemetry{}` must be included # authenticating to Vault's metrics endpoint, so the following `telemetry{}` must be included

View File

@ -28,4 +28,4 @@ name: loft
sources: sources:
- https://github.com/loft-sh/loft - https://github.com/loft-sh/loft
type: application type: application
version: 3.3.0 version: 3.3.1

View File

@ -4,7 +4,7 @@ annotations:
catalog.cattle.io/kube-version: '>=1.16-0' catalog.cattle.io/kube-version: '>=1.16-0'
catalog.cattle.io/release-name: nats catalog.cattle.io/release-name: nats
apiVersion: v2 apiVersion: v2
appVersion: 2.10.3 appVersion: 2.10.4
description: A Helm chart for the NATS.io High Speed Cloud Native Distributed Communications description: A Helm chart for the NATS.io High Speed Cloud Native Distributed Communications
Technology. Technology.
home: http://github.com/nats-io/k8s home: http://github.com/nats-io/k8s
@ -18,4 +18,4 @@ maintainers:
name: The NATS Authors name: The NATS Authors
url: https://github.com/nats-io url: https://github.com/nats-io
name: nats name: nats
version: 1.1.2 version: 1.1.3

View File

@ -308,7 +308,7 @@ config:
container: container:
image: image:
repository: nats repository: nats
tag: 2.10.3-alpine tag: 2.10.4-alpine
pullPolicy: pullPolicy:
registry: registry:

View File

@ -1,25 +1,25 @@
dependencies: dependencies:
- name: newrelic-infrastructure - name: newrelic-infrastructure
repository: https://newrelic.github.io/nri-kubernetes repository: https://newrelic.github.io/nri-kubernetes
version: 3.23.3 version: 3.23.4
- name: nri-prometheus - name: nri-prometheus
repository: https://newrelic.github.io/nri-prometheus repository: https://newrelic.github.io/nri-prometheus
version: 2.1.17 version: 2.1.17
- name: newrelic-prometheus-agent - name: newrelic-prometheus-agent
repository: https://newrelic.github.io/newrelic-prometheus-configurator repository: https://newrelic.github.io/newrelic-prometheus-configurator
version: 1.5.1 version: 1.6.0
- name: nri-metadata-injection - name: nri-metadata-injection
repository: https://newrelic.github.io/k8s-metadata-injection repository: https://newrelic.github.io/k8s-metadata-injection
version: 4.10.2 version: 4.11.0
- name: newrelic-k8s-metrics-adapter - name: newrelic-k8s-metrics-adapter
repository: https://newrelic.github.io/newrelic-k8s-metrics-adapter repository: https://newrelic.github.io/newrelic-k8s-metrics-adapter
version: 1.4.3 version: 1.5.0
- name: kube-state-metrics - name: kube-state-metrics
repository: https://prometheus-community.github.io/helm-charts repository: https://prometheus-community.github.io/helm-charts
version: 5.12.1 version: 5.12.1
- name: nri-kube-events - name: nri-kube-events
repository: https://newrelic.github.io/nri-kube-events repository: https://newrelic.github.io/nri-kube-events
version: 3.2.6 version: 3.3.0
- name: newrelic-logging - name: newrelic-logging
repository: https://newrelic.github.io/helm-charts repository: https://newrelic.github.io/helm-charts
version: 1.18.1 version: 1.18.1
@ -31,6 +31,6 @@ dependencies:
version: 0.1.4 version: 0.1.4
- name: newrelic-infra-operator - name: newrelic-infra-operator
repository: https://newrelic.github.io/newrelic-infra-operator repository: https://newrelic.github.io/newrelic-infra-operator
version: 2.3.3 version: 2.4.0
digest: sha256:c543d1a04d2e80cc532d335b7c13104007c19ca20fc64a625ca1f0c4e27ae681 digest: sha256:513fd7c4b9475bfa329ebe349022b95481f456b4facad64b82921bb8926361e1
generated: "2023-10-25T15:02:36.960563782Z" generated: "2023-10-31T08:04:17.666576471Z"

View File

@ -7,7 +7,7 @@ dependencies:
- condition: infrastructure.enabled,newrelic-infrastructure.enabled - condition: infrastructure.enabled,newrelic-infrastructure.enabled
name: newrelic-infrastructure name: newrelic-infrastructure
repository: file://./charts/newrelic-infrastructure repository: file://./charts/newrelic-infrastructure
version: 3.23.3 version: 3.23.4
- condition: prometheus.enabled,nri-prometheus.enabled - condition: prometheus.enabled,nri-prometheus.enabled
name: nri-prometheus name: nri-prometheus
repository: file://./charts/nri-prometheus repository: file://./charts/nri-prometheus
@ -15,15 +15,15 @@ dependencies:
- condition: newrelic-prometheus-agent.enabled - condition: newrelic-prometheus-agent.enabled
name: newrelic-prometheus-agent name: newrelic-prometheus-agent
repository: file://./charts/newrelic-prometheus-agent repository: file://./charts/newrelic-prometheus-agent
version: 1.5.1 version: 1.6.0
- condition: webhook.enabled,nri-metadata-injection.enabled - condition: webhook.enabled,nri-metadata-injection.enabled
name: nri-metadata-injection name: nri-metadata-injection
repository: file://./charts/nri-metadata-injection repository: file://./charts/nri-metadata-injection
version: 4.10.2 version: 4.11.0
- condition: metrics-adapter.enabled,newrelic-k8s-metrics-adapter.enabled - condition: metrics-adapter.enabled,newrelic-k8s-metrics-adapter.enabled
name: newrelic-k8s-metrics-adapter name: newrelic-k8s-metrics-adapter
repository: file://./charts/newrelic-k8s-metrics-adapter repository: file://./charts/newrelic-k8s-metrics-adapter
version: 1.4.3 version: 1.5.0
- condition: ksm.enabled,kube-state-metrics.enabled - condition: ksm.enabled,kube-state-metrics.enabled
name: kube-state-metrics name: kube-state-metrics
repository: file://./charts/kube-state-metrics repository: file://./charts/kube-state-metrics
@ -31,7 +31,7 @@ dependencies:
- condition: kubeEvents.enabled,nri-kube-events.enabled - condition: kubeEvents.enabled,nri-kube-events.enabled
name: nri-kube-events name: nri-kube-events
repository: file://./charts/nri-kube-events repository: file://./charts/nri-kube-events
version: 3.2.6 version: 3.3.0
- condition: logging.enabled,newrelic-logging.enabled - condition: logging.enabled,newrelic-logging.enabled
name: newrelic-logging name: newrelic-logging
repository: file://./charts/newrelic-logging repository: file://./charts/newrelic-logging
@ -48,7 +48,7 @@ dependencies:
- condition: newrelic-infra-operator.enabled - condition: newrelic-infra-operator.enabled
name: newrelic-infra-operator name: newrelic-infra-operator
repository: file://./charts/newrelic-infra-operator repository: file://./charts/newrelic-infra-operator
version: 2.3.3 version: 2.4.0
description: Groups together the individual charts for the New Relic Kubernetes solution description: Groups together the individual charts for the New Relic Kubernetes solution
for a more comfortable deployment. for a more comfortable deployment.
home: https://github.com/newrelic/helm-charts home: https://github.com/newrelic/helm-charts
@ -89,4 +89,4 @@ sources:
- https://github.com/newrelic/helm-charts/tree/master/charts/newrelic-logging - https://github.com/newrelic/helm-charts/tree/master/charts/newrelic-logging
- https://github.com/newrelic/helm-charts/tree/master/charts/newrelic-pixie - https://github.com/newrelic/helm-charts/tree/master/charts/newrelic-pixie
- https://github.com/newrelic/newrelic-infra-operator/tree/master/charts/newrelic-infra-operator - https://github.com/newrelic/newrelic-infra-operator/tree/master/charts/newrelic-infra-operator
version: 5.0.42 version: 5.0.43

View File

@ -1,5 +1,5 @@
apiVersion: v2 apiVersion: v2
appVersion: 0.11.3 appVersion: 0.12.0
dependencies: dependencies:
- name: common-library - name: common-library
repository: https://helm-charts.newrelic.com repository: https://helm-charts.newrelic.com
@ -32,4 +32,4 @@ name: newrelic-infra-operator
sources: sources:
- https://github.com/newrelic/newrelic-infra-operator - https://github.com/newrelic/newrelic-infra-operator
- https://github.com/newrelic/newrelic-infra-operator/tree/main/charts/newrelic-infra-operator - https://github.com/newrelic/newrelic-infra-operator/tree/main/charts/newrelic-infra-operator
version: 2.3.3 version: 2.4.0

View File

@ -1,5 +1,5 @@
apiVersion: v2 apiVersion: v2
appVersion: 3.18.3 appVersion: 3.18.4
dependencies: dependencies:
- name: common-library - name: common-library
repository: https://helm-charts.newrelic.com repository: https://helm-charts.newrelic.com
@ -35,4 +35,4 @@ sources:
- https://github.com/newrelic/nri-kubernetes/ - https://github.com/newrelic/nri-kubernetes/
- https://github.com/newrelic/nri-kubernetes/tree/main/charts/newrelic-infrastructure - https://github.com/newrelic/nri-kubernetes/tree/main/charts/newrelic-infrastructure
- https://github.com/newrelic/infrastructure-agent/ - https://github.com/newrelic/infrastructure-agent/
version: 3.23.3 version: 3.23.4

View File

@ -1,5 +1,5 @@
apiVersion: v2 apiVersion: v2
appVersion: 0.6.4 appVersion: 0.7.0
dependencies: dependencies:
- name: common-library - name: common-library
repository: https://helm-charts.newrelic.com repository: https://helm-charts.newrelic.com
@ -20,4 +20,4 @@ name: newrelic-k8s-metrics-adapter
sources: sources:
- https://github.com/newrelic/newrelic-k8s-metrics-adapter - https://github.com/newrelic/newrelic-k8s-metrics-adapter
- https://github.com/newrelic/newrelic-k8s-metrics-adapter/tree/main/charts/newrelic-k8s-metrics-adapter - https://github.com/newrelic/newrelic-k8s-metrics-adapter/tree/main/charts/newrelic-k8s-metrics-adapter
version: 1.4.3 version: 1.5.0

View File

@ -1,5 +1,5 @@
annotations: annotations:
configuratorVersion: 1.8.1 configuratorVersion: 1.9.0
apiVersion: v2 apiVersion: v2
appVersion: v2.37.8 appVersion: v2.37.8
dependencies: dependencies:
@ -31,4 +31,4 @@ maintainers:
url: https://github.com/xqi-nr url: https://github.com/xqi-nr
name: newrelic-prometheus-agent name: newrelic-prometheus-agent
type: application type: application
version: 1.5.1 version: 1.6.0

View File

@ -1,5 +1,5 @@
apiVersion: v2 apiVersion: v2
appVersion: 2.2.13 appVersion: 2.3.0
dependencies: dependencies:
- name: common-library - name: common-library
repository: https://helm-charts.newrelic.com repository: https://helm-charts.newrelic.com
@ -35,4 +35,4 @@ sources:
- https://github.com/newrelic/nri-kube-events/ - https://github.com/newrelic/nri-kube-events/
- https://github.com/newrelic/nri-kube-events/tree/main/charts/nri-kube-events - https://github.com/newrelic/nri-kube-events/tree/main/charts/nri-kube-events
- https://github.com/newrelic/infrastructure-agent/ - https://github.com/newrelic/infrastructure-agent/
version: 3.2.6 version: 3.3.0

View File

@ -1,6 +1,6 @@
# nri-kube-events # nri-kube-events
![Version: 3.2.6](https://img.shields.io/badge/Version-3.2.6-informational?style=flat-square) ![AppVersion: 2.2.13](https://img.shields.io/badge/AppVersion-2.2.13-informational?style=flat-square) ![Version: 3.3.0](https://img.shields.io/badge/Version-3.3.0-informational?style=flat-square) ![AppVersion: 2.3.0](https://img.shields.io/badge/AppVersion-2.3.0-informational?style=flat-square)
A Helm chart to deploy the New Relic Kube Events router A Helm chart to deploy the New Relic Kube Events router

View File

@ -1,5 +1,5 @@
apiVersion: v2 apiVersion: v2
appVersion: 1.18.4 appVersion: 1.19.0
dependencies: dependencies:
- name: common-library - name: common-library
repository: https://helm-charts.newrelic.com repository: https://helm-charts.newrelic.com
@ -22,4 +22,4 @@ name: nri-metadata-injection
sources: sources:
- https://github.com/newrelic/k8s-metadata-injection - https://github.com/newrelic/k8s-metadata-injection
- https://github.com/newrelic/k8s-metadata-injection/tree/master/charts/nri-metadata-injection - https://github.com/newrelic/k8s-metadata-injection/tree/master/charts/nri-metadata-injection
version: 4.10.2 version: 4.11.0

View File

@ -6,4 +6,4 @@ dependencies:
repository: https://charts.redpanda.com repository: https://charts.redpanda.com
version: 0.1.7 version: 0.1.7
digest: sha256:2be209fa1660b3c8a030bb35e9e7fa25dcb81aa456ce7a73c2ab1ae6eebb3d04 digest: sha256:2be209fa1660b3c8a030bb35e9e7fa25dcb81aa456ce7a73c2ab1ae6eebb3d04
generated: "2023-10-27T18:34:04.296697929Z" generated: "2023-10-30T17:31:44.018230015Z"

View File

@ -10,7 +10,7 @@ annotations:
artifacthub.io/links: | artifacthub.io/links: |
- name: Documentation - name: Documentation
url: https://docs.redpanda.com url: https://docs.redpanda.com
- name: "Helm (>= 3.6.0)" - name: "Helm (>= 3.8.0)"
url: https://helm.sh/docs/intro/install/ url: https://helm.sh/docs/intro/install/
catalog.cattle.io/certified: partner catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Redpanda catalog.cattle.io/display-name: Redpanda
@ -37,4 +37,4 @@ name: redpanda
sources: sources:
- https://github.com/redpanda-data/helm-charts - https://github.com/redpanda-data/helm-charts
type: application type: application
version: 5.6.35 version: 5.6.37

View File

@ -202,7 +202,10 @@ Use AppVersion if image.tag is not set
Input can be: b | B | k | K | m | M | g | G | Ki | Mi | Gi Input can be: b | B | k | K | m | M | g | G | Ki | Mi | Gi
Or number without suffix Or number without suffix
*/}} */}}
{{- $si := . | toString -}} {{- $si := . -}}
{{- if not (typeIs "string" . ) -}}
{{- $si = int64 $si | toString -}}
{{- end -}}
{{- $bytes := 0 -}} {{- $bytes := 0 -}}
{{- if or (hasSuffix "B" $si) (hasSuffix "b" $si) -}} {{- if or (hasSuffix "B" $si) (hasSuffix "b" $si) -}}
{{- $bytes = $si | trimSuffix "B" | trimSuffix "b" | float64 | floor -}} {{- $bytes = $si | trimSuffix "B" | trimSuffix "b" | float64 | floor -}}
@ -423,6 +426,13 @@ than 1 core.
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{- define "fail-on-unsupported-helm-version" -}}
{{- $helmVer := (fromYaml (toYaml .Capabilities.HelmVersion)).version -}}
{{- if semverCompare "<3.8.0-0" $helmVer -}}
{{- fail (printf "helm version %s is not supported. Please use helm version v3.8.0 or newer." $helmVer) -}}
{{- end -}}
{{- end -}}
{{- define "redpanda-atleast-22-2-0" -}} {{- define "redpanda-atleast-22-2-0" -}}
{{- toJson (dict "bool" (or (not (eq .Values.image.repository "docker.redpanda.com/redpandadata/redpanda")) (include "redpanda.semver" . | semverCompare ">=22.2.0-0 || <0.0.1-0"))) -}} {{- toJson (dict "bool" (or (not (eq .Values.image.repository "docker.redpanda.com/redpandadata/redpanda")) (include "redpanda.semver" . | semverCompare ">=22.2.0-0 || <0.0.1-0"))) -}}
{{- end -}} {{- end -}}

View File

@ -15,6 +15,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/}} */}}
{{- include "fail-on-unsupported-helm-version" . -}}
{{- include "fail-on-insecure-sasl-logging" . -}} {{- include "fail-on-insecure-sasl-logging" . -}}
{{- $values := .Values }} {{- $values := .Values }}

View File

@ -21,4 +21,4 @@ maintainers:
- email: ops@stackstate.com - email: ops@stackstate.com
name: Stackstate name: Stackstate
name: stackstate-k8s-agent name: stackstate-k8s-agent
version: 1.0.49 version: 1.0.51

View File

@ -2,7 +2,7 @@
Helm chart for the StackState Agent. Helm chart for the StackState Agent.
Current chart version is `1.0.49` Current chart version is `1.0.51`
**Homepage:** <https://github.com/StackVista/stackstate-agent> **Homepage:** <https://github.com/StackVista/stackstate-agent>
@ -61,7 +61,7 @@ stackstate/stackstate-k8s-agent
| checksAgent.enabled | bool | `true` | Enable / disable runnning cluster checks in a separately deployed pod | | checksAgent.enabled | bool | `true` | Enable / disable runnning cluster checks in a separately deployed pod |
| checksAgent.image.pullPolicy | string | `"IfNotPresent"` | Default container image pull policy. | | checksAgent.image.pullPolicy | string | `"IfNotPresent"` | Default container image pull policy. |
| checksAgent.image.repository | string | `"stackstate/stackstate-k8s-agent"` | Base container image repository. | | checksAgent.image.repository | string | `"stackstate/stackstate-k8s-agent"` | Base container image repository. |
| checksAgent.image.tag | string | `"e36d1c88"` | Default container image tag. | | checksAgent.image.tag | string | `"9af1b63f"` | Default container image tag. |
| checksAgent.livenessProbe.enabled | bool | `true` | Enable use of livenessProbe check. | | checksAgent.livenessProbe.enabled | bool | `true` | Enable use of livenessProbe check. |
| checksAgent.livenessProbe.failureThreshold | int | `3` | `failureThreshold` for the liveness probe. | | checksAgent.livenessProbe.failureThreshold | int | `3` | `failureThreshold` for the liveness probe. |
| checksAgent.livenessProbe.initialDelaySeconds | int | `15` | `initialDelaySeconds` for the liveness probe. | | checksAgent.livenessProbe.initialDelaySeconds | int | `15` | `initialDelaySeconds` for the liveness probe. |
@ -121,7 +121,7 @@ stackstate/stackstate-k8s-agent
| clusterAgent.enabled | bool | `true` | Enable / disable the cluster agent. | | clusterAgent.enabled | bool | `true` | Enable / disable the cluster agent. |
| clusterAgent.image.pullPolicy | string | `"IfNotPresent"` | Default container image pull policy. | | clusterAgent.image.pullPolicy | string | `"IfNotPresent"` | Default container image pull policy. |
| clusterAgent.image.repository | string | `"stackstate/stackstate-k8s-cluster-agent"` | Base container image repository. | | clusterAgent.image.repository | string | `"stackstate/stackstate-k8s-cluster-agent"` | Base container image repository. |
| clusterAgent.image.tag | string | `"e36d1c88"` | Default container image tag. | | clusterAgent.image.tag | string | `"9af1b63f"` | Default container image tag. |
| clusterAgent.livenessProbe.enabled | bool | `true` | Enable use of livenessProbe check. | | clusterAgent.livenessProbe.enabled | bool | `true` | Enable use of livenessProbe check. |
| clusterAgent.livenessProbe.failureThreshold | int | `3` | `failureThreshold` for the liveness probe. | | clusterAgent.livenessProbe.failureThreshold | int | `3` | `failureThreshold` for the liveness probe. |
| clusterAgent.livenessProbe.initialDelaySeconds | int | `15` | `initialDelaySeconds` for the liveness probe. | | clusterAgent.livenessProbe.initialDelaySeconds | int | `15` | `initialDelaySeconds` for the liveness probe. |
@ -178,7 +178,7 @@ stackstate/stackstate-k8s-agent
| nodeAgent.containers.agent.env | object | `{}` | Additional environment variables for the agent container | | nodeAgent.containers.agent.env | object | `{}` | Additional environment variables for the agent container |
| nodeAgent.containers.agent.image.pullPolicy | string | `"IfNotPresent"` | Default container image pull policy. | | nodeAgent.containers.agent.image.pullPolicy | string | `"IfNotPresent"` | Default container image pull policy. |
| nodeAgent.containers.agent.image.repository | string | `"stackstate/stackstate-k8s-agent"` | Base container image repository. | | nodeAgent.containers.agent.image.repository | string | `"stackstate/stackstate-k8s-agent"` | Base container image repository. |
| nodeAgent.containers.agent.image.tag | string | `"e36d1c88"` | Default container image tag. | | nodeAgent.containers.agent.image.tag | string | `"9af1b63f"` | Default container image tag. |
| nodeAgent.containers.agent.livenessProbe.enabled | bool | `true` | Enable use of livenessProbe check. | | nodeAgent.containers.agent.livenessProbe.enabled | bool | `true` | Enable use of livenessProbe check. |
| nodeAgent.containers.agent.livenessProbe.failureThreshold | int | `3` | `failureThreshold` for the liveness probe. | | nodeAgent.containers.agent.livenessProbe.failureThreshold | int | `3` | `failureThreshold` for the liveness probe. |
| nodeAgent.containers.agent.livenessProbe.initialDelaySeconds | int | `15` | `initialDelaySeconds` for the liveness probe. | | nodeAgent.containers.agent.livenessProbe.initialDelaySeconds | int | `15` | `initialDelaySeconds` for the liveness probe. |

Some files were not shown because too many files have changed in this diff Show More