commit
e97c3f1212
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -35,4 +35,4 @@ sources:
|
||||||
- https://github.com/aquarist-labs/s3gw-cosi-driver
|
- https://github.com/aquarist-labs/s3gw-cosi-driver
|
||||||
- https://github.com/kubernetes-sigs/container-object-storage-interface-provisioner-sidecar
|
- https://github.com/kubernetes-sigs/container-object-storage-interface-provisioner-sidecar
|
||||||
type: application
|
type: application
|
||||||
version: 0.19.0
|
version: 0.20.0
|
||||||
|
|
|
@ -45,4 +45,4 @@ maintainers:
|
||||||
name: kafka
|
name: kafka
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/bitnami/charts/tree/main/bitnami/kafka
|
- https://github.com/bitnami/charts/tree/main/bitnami/kafka
|
||||||
version: 25.1.4
|
version: 25.1.5
|
||||||
|
|
|
@ -187,6 +187,10 @@ data:
|
||||||
cp "/mounted-certs/kafka.crt" /certs/tls.crt
|
cp "/mounted-certs/kafka.crt" /certs/tls.crt
|
||||||
# Copy the PEM key ensuring the key used PEM format with PKCS#8
|
# Copy the PEM key ensuring the key used PEM format with PKCS#8
|
||||||
openssl pkcs8 -topk8 -nocrypt -in "/mounted-certs/kafka.key" > /certs/tls.key
|
openssl pkcs8 -topk8 -nocrypt -in "/mounted-certs/kafka.key" > /certs/tls.key
|
||||||
|
elif [[ -f /mounted-certs/tls.crt && -f /mounted-certs/tls.key ]]; then
|
||||||
|
cp "/mounted-certs/tls.crt" /certs/tls.crt
|
||||||
|
# Copy the PEM key ensuring the key used PEM format with PKCS#8
|
||||||
|
openssl pkcs8 -topk8 -nocrypt -in "/mounted-certs/tls.key" > /certs/tls.key
|
||||||
else
|
else
|
||||||
error "PEM key and cert files not found"
|
error "PEM key and cert files not found"
|
||||||
fi
|
fi
|
||||||
|
@ -195,6 +199,8 @@ data:
|
||||||
# Copy CA certificate
|
# Copy CA certificate
|
||||||
if [[ -f /mounted-certs/kafka-ca.crt ]]; then
|
if [[ -f /mounted-certs/kafka-ca.crt ]]; then
|
||||||
cp /mounted-certs/kafka-ca.crt /certs/ca.crt
|
cp /mounted-certs/kafka-ca.crt /certs/ca.crt
|
||||||
|
elif [[ -f /mounted-certs/ca.crt ]]; then
|
||||||
|
cp /mounted-certs/ca.crt /certs/ca.crt
|
||||||
else
|
else
|
||||||
error "CA certificate file not found"
|
error "CA certificate file not found"
|
||||||
fi
|
fi
|
||||||
|
|
|
@ -268,6 +268,7 @@ tls:
|
||||||
## --from-file=kafka-broker-0.crt=./kafka-broker-0.crt --from-file=kafka-broker-0.key=./kafka-broker-0.key ...
|
## --from-file=kafka-broker-0.crt=./kafka-broker-0.crt --from-file=kafka-broker-0.key=./kafka-broker-0.key ...
|
||||||
##
|
##
|
||||||
## NOTE: Alternatively, a single key and certificate can be provided for all nodes under the keys 'kafka.crt' and 'kafka.key'. These certificates will be used by all nodes unless overridden by the 'kafka-<role>-X.key' and 'kafka-<role>-X.crt' files
|
## NOTE: Alternatively, a single key and certificate can be provided for all nodes under the keys 'kafka.crt' and 'kafka.key'. These certificates will be used by all nodes unless overridden by the 'kafka-<role>-X.key' and 'kafka-<role>-X.crt' files
|
||||||
|
## NOTE: Alternatively, a single key and certificate can be provided for all nodes under the keys 'tls.crt' and 'tls.key'. These certificates will be used by all nodes unless overridden by the 'kafka-<role>-X.key' and 'kafka-<role>-X.crt' files
|
||||||
##
|
##
|
||||||
existingSecret: ""
|
existingSecret: ""
|
||||||
## @param tls.autoGenerated Generate automatically self-signed TLS certificates for Kafka brokers. Currently only supported if `tls.type` is `PEM`
|
## @param tls.autoGenerated Generate automatically self-signed TLS certificates for Kafka brokers. Currently only supported if `tls.type` is `PEM`
|
||||||
|
|
|
@ -7,6 +7,6 @@ dependencies:
|
||||||
version: 13.1.2
|
version: 13.1.2
|
||||||
- name: common
|
- name: common
|
||||||
repository: oci://registry-1.docker.io/bitnamicharts
|
repository: oci://registry-1.docker.io/bitnamicharts
|
||||||
version: 2.9.1
|
version: 2.9.2
|
||||||
digest: sha256:5df6e862af69422cc6e287bf9dd560b3a1e56d3b49b4bc81132b0db10903cd80
|
digest: sha256:467adda3c6f9bea1762beb6c252fd4d1a5ba52942ab1b9b48af60ac4e375783d
|
||||||
generated: "2023-08-30T09:41:25.351778314Z"
|
generated: "2023-08-31T19:21:10.315977353Z"
|
||||||
|
|
|
@ -6,11 +6,11 @@ annotations:
|
||||||
category: CMS
|
category: CMS
|
||||||
images: |
|
images: |
|
||||||
- name: apache-exporter
|
- name: apache-exporter
|
||||||
image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r29
|
image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r32
|
||||||
- name: os-shell
|
- name: os-shell
|
||||||
image: docker.io/bitnami/os-shell:11-debian-11-r51
|
image: docker.io/bitnami/os-shell:11-debian-11-r54
|
||||||
- name: wordpress
|
- name: wordpress
|
||||||
image: docker.io/bitnami/wordpress:6.3.1-debian-11-r0
|
image: docker.io/bitnami/wordpress:6.3.1-debian-11-r2
|
||||||
licenses: Apache-2.0
|
licenses: Apache-2.0
|
||||||
apiVersion: v2
|
apiVersion: v2
|
||||||
appVersion: 6.3.1
|
appVersion: 6.3.1
|
||||||
|
@ -47,4 +47,4 @@ maintainers:
|
||||||
name: wordpress
|
name: wordpress
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
|
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
|
||||||
version: 17.1.4
|
version: 17.1.6
|
||||||
|
|
|
@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||||
| ------------------- | --------------------------------------------------------------------------------------------------------- | -------------------- |
|
| ------------------- | --------------------------------------------------------------------------------------------------------- | -------------------- |
|
||||||
| `image.registry` | WordPress image registry | `docker.io` |
|
| `image.registry` | WordPress image registry | `docker.io` |
|
||||||
| `image.repository` | WordPress image repository | `bitnami/wordpress` |
|
| `image.repository` | WordPress image repository | `bitnami/wordpress` |
|
||||||
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.3.1-debian-11-r0` |
|
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.3.1-debian-11-r2` |
|
||||||
| `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
| `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||||
| `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` |
|
| `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` |
|
||||||
| `image.pullSecrets` | WordPress image pull secrets | `[]` |
|
| `image.pullSecrets` | WordPress image pull secrets | `[]` |
|
||||||
|
@ -249,7 +249,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||||
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
|
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
|
||||||
| `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` |
|
| `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` |
|
||||||
| `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` |
|
| `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` |
|
||||||
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r51` |
|
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r54` |
|
||||||
| `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
| `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||||
| `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` |
|
| `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` |
|
||||||
| `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` |
|
| `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` |
|
||||||
|
@ -281,7 +281,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||||
| `metrics.enabled` | Start a sidecar prometheus exporter to expose metrics | `false` |
|
| `metrics.enabled` | Start a sidecar prometheus exporter to expose metrics | `false` |
|
||||||
| `metrics.image.registry` | Apache exporter image registry | `docker.io` |
|
| `metrics.image.registry` | Apache exporter image registry | `docker.io` |
|
||||||
| `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` |
|
| `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` |
|
||||||
| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.1-debian-11-r29` |
|
| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.1-debian-11-r32` |
|
||||||
| `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
| `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||||
| `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` |
|
| `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` |
|
||||||
| `metrics.image.pullSecrets` | Apache exporter image pull secrets | `[]` |
|
| `metrics.image.pullSecrets` | Apache exporter image pull secrets | `[]` |
|
||||||
|
|
|
@ -2,7 +2,7 @@ annotations:
|
||||||
category: Infrastructure
|
category: Infrastructure
|
||||||
licenses: Apache-2.0
|
licenses: Apache-2.0
|
||||||
apiVersion: v2
|
apiVersion: v2
|
||||||
appVersion: 2.9.1
|
appVersion: 2.9.2
|
||||||
description: A Library Helm Chart for grouping common logic between bitnami charts.
|
description: A Library Helm Chart for grouping common logic between bitnami charts.
|
||||||
This chart is not deployable by itself.
|
This chart is not deployable by itself.
|
||||||
home: https://bitnami.com
|
home: https://bitnami.com
|
||||||
|
@ -20,4 +20,4 @@ name: common
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/bitnami/charts
|
- https://github.com/bitnami/charts
|
||||||
type: library
|
type: library
|
||||||
version: 2.9.1
|
version: 2.9.2
|
||||||
|
|
|
@ -11,17 +11,14 @@ Usage:
|
||||||
{{ include "common.tplvalues.render" ( dict "value" .Values.path.to.the.Value "context" $ "scope" $app ) }}
|
{{ include "common.tplvalues.render" ( dict "value" .Values.path.to.the.Value "context" $ "scope" $app ) }}
|
||||||
*/}}
|
*/}}
|
||||||
{{- define "common.tplvalues.render" -}}
|
{{- define "common.tplvalues.render" -}}
|
||||||
{{- if .scope }}
|
{{- $value := typeIs "string" .value | ternary .value (.value | toYaml) }}
|
||||||
{{- if typeIs "string" .value }}
|
{{- if contains "{{" (toJson .value) }}
|
||||||
{{- tpl (cat "{{- with $.RelativeScope -}}" .value "{{- end }}") (merge (dict "RelativeScope" .scope) .context) }}
|
{{- if .scope }}
|
||||||
|
{{- tpl (cat "{{- with $.RelativeScope -}}" $value "{{- end }}") (merge (dict "RelativeScope" .scope) .context) }}
|
||||||
{{- else }}
|
{{- else }}
|
||||||
{{- tpl (cat "{{- with $.RelativeScope -}}" (.value | toYaml) "{{- end }}") (merge (dict "RelativeScope" .scope) .context) }}
|
{{- tpl $value .context }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- else }}
|
{{- else }}
|
||||||
{{- if typeIs "string" .value }}
|
{{- $value }}
|
||||||
{{- tpl .value .context }}
|
{{- end }}
|
||||||
{{- else }}
|
|
||||||
{{- tpl (.value | toYaml) .context }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
{{- end -}}
|
||||||
|
|
|
@ -76,7 +76,7 @@ diagnosticMode:
|
||||||
image:
|
image:
|
||||||
registry: docker.io
|
registry: docker.io
|
||||||
repository: bitnami/wordpress
|
repository: bitnami/wordpress
|
||||||
tag: 6.3.1-debian-11-r0
|
tag: 6.3.1-debian-11-r2
|
||||||
digest: ""
|
digest: ""
|
||||||
## Specify a imagePullPolicy
|
## Specify a imagePullPolicy
|
||||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||||
|
@ -766,7 +766,7 @@ volumePermissions:
|
||||||
image:
|
image:
|
||||||
registry: docker.io
|
registry: docker.io
|
||||||
repository: bitnami/os-shell
|
repository: bitnami/os-shell
|
||||||
tag: 11-debian-11-r51
|
tag: 11-debian-11-r54
|
||||||
digest: ""
|
digest: ""
|
||||||
pullPolicy: IfNotPresent
|
pullPolicy: IfNotPresent
|
||||||
## Optionally specify an array of imagePullSecrets.
|
## Optionally specify an array of imagePullSecrets.
|
||||||
|
@ -860,7 +860,7 @@ metrics:
|
||||||
image:
|
image:
|
||||||
registry: docker.io
|
registry: docker.io
|
||||||
repository: bitnami/apache-exporter
|
repository: bitnami/apache-exporter
|
||||||
tag: 1.0.1-debian-11-r29
|
tag: 1.0.1-debian-11-r32
|
||||||
digest: ""
|
digest: ""
|
||||||
pullPolicy: IfNotPresent
|
pullPolicy: IfNotPresent
|
||||||
## Optionally specify an array of imagePullSecrets.
|
## Optionally specify an array of imagePullSecrets.
|
||||||
|
|
|
@ -4,6 +4,14 @@
|
||||||
|
|
||||||
Nothing yet.
|
Nothing yet.
|
||||||
|
|
||||||
|
## 2.26.5
|
||||||
|
|
||||||
|
### Fixed
|
||||||
|
|
||||||
|
* Kuma ServiceAccount Token hints and volumes are also available in migrations
|
||||||
|
Pods.
|
||||||
|
[#877](https://github.com/Kong/charts/pull/877)
|
||||||
|
|
||||||
## 2.26.4
|
## 2.26.4
|
||||||
|
|
||||||
### Fixed
|
### Fixed
|
||||||
|
|
|
@ -20,4 +20,4 @@ maintainers:
|
||||||
name: kong
|
name: kong
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/Kong/charts/tree/main/charts/kong
|
- https://github.com/Kong/charts/tree/main/charts/kong
|
||||||
version: 2.26.4
|
version: 2.26.5
|
||||||
|
|
|
@ -552,6 +552,41 @@ The name of the service used for the ingress controller's validation webhook
|
||||||
- name: {{ template "kong.fullname" . }}-tmp
|
- name: {{ template "kong.fullname" . }}-tmp
|
||||||
emptyDir:
|
emptyDir:
|
||||||
sizeLimit: {{ .Values.deployment.tmpDir.sizeLimit }}
|
sizeLimit: {{ .Values.deployment.tmpDir.sizeLimit }}
|
||||||
|
{{- if (and (not .Values.deployment.serviceAccount.automountServiceAccountToken) (or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name)) }}
|
||||||
|
- name: {{ template "kong.serviceAccountTokenName" . }}
|
||||||
|
{{- /* Due to GKE versions (e.g. v1.23.15-gke.1900) we need to handle pre-release part of the version as well.
|
||||||
|
See the related documentation of semver module that Helm depends on for semverCompare:
|
||||||
|
https://github.com/Masterminds/semver#working-with-prerelease-versions
|
||||||
|
Related Helm issue: https://github.com/helm/helm/issues/3810 */}}
|
||||||
|
{{- if semverCompare ">=1.20.0-0" .Capabilities.KubeVersion.Version }}
|
||||||
|
projected:
|
||||||
|
sources:
|
||||||
|
- serviceAccountToken:
|
||||||
|
expirationSeconds: 3607
|
||||||
|
path: token
|
||||||
|
- configMap:
|
||||||
|
items:
|
||||||
|
- key: ca.crt
|
||||||
|
path: ca.crt
|
||||||
|
name: kube-root-ca.crt
|
||||||
|
- downwardAPI:
|
||||||
|
items:
|
||||||
|
- fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
path: namespace
|
||||||
|
{{- else }}
|
||||||
|
secret:
|
||||||
|
secretName: {{ template "kong.serviceAccountTokenName" . }}
|
||||||
|
items:
|
||||||
|
- key: token
|
||||||
|
path: token
|
||||||
|
- key: ca.crt
|
||||||
|
path: ca.crt
|
||||||
|
- key: namespace
|
||||||
|
path: namespace
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
{{- if and ( .Capabilities.APIVersions.Has "cert-manager.io/v1" ) .Values.certificates.enabled -}}
|
{{- if and ( .Capabilities.APIVersions.Has "cert-manager.io/v1" ) .Values.certificates.enabled -}}
|
||||||
{{- if .Values.certificates.cluster.enabled }}
|
{{- if .Values.certificates.cluster.enabled }}
|
||||||
- name: {{ include "kong.fullname" . }}-cluster-cert
|
- name: {{ include "kong.fullname" . }}-cluster-cert
|
||||||
|
|
|
@ -302,39 +302,4 @@ spec:
|
||||||
volumes:
|
volumes:
|
||||||
{{- include "kong.volumes" . | nindent 8 -}}
|
{{- include "kong.volumes" . | nindent 8 -}}
|
||||||
{{- include "kong.userDefinedVolumes" . | nindent 8 -}}
|
{{- include "kong.userDefinedVolumes" . | nindent 8 -}}
|
||||||
{{- if (and (not .Values.deployment.serviceAccount.automountServiceAccountToken) (or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name)) }}
|
|
||||||
- name: {{ template "kong.serviceAccountTokenName" . }}
|
|
||||||
{{- /* Due to GKE versions (e.g. v1.23.15-gke.1900) we need to handle pre-release part of the version as well.
|
|
||||||
See the related documentation of semver module that Helm depends on for semverCompare:
|
|
||||||
https://github.com/Masterminds/semver#working-with-prerelease-versions
|
|
||||||
Related Helm issue: https://github.com/helm/helm/issues/3810 */}}
|
|
||||||
{{- if semverCompare ">=1.20.0-0" .Capabilities.KubeVersion.Version }}
|
|
||||||
projected:
|
|
||||||
sources:
|
|
||||||
- serviceAccountToken:
|
|
||||||
expirationSeconds: 3607
|
|
||||||
path: token
|
|
||||||
- configMap:
|
|
||||||
items:
|
|
||||||
- key: ca.crt
|
|
||||||
path: ca.crt
|
|
||||||
name: kube-root-ca.crt
|
|
||||||
- downwardAPI:
|
|
||||||
items:
|
|
||||||
- fieldRef:
|
|
||||||
apiVersion: v1
|
|
||||||
fieldPath: metadata.namespace
|
|
||||||
path: namespace
|
|
||||||
{{- else }}
|
|
||||||
secret:
|
|
||||||
secretName: {{ template "kong.serviceAccountTokenName" . }}
|
|
||||||
items:
|
|
||||||
- key: token
|
|
||||||
path: token
|
|
||||||
- key: ca.crt
|
|
||||||
path: ca.crt
|
|
||||||
- key: namespace
|
|
||||||
path: namespace
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -29,6 +29,9 @@ spec:
|
||||||
{{- range $key, $value := .Values.migrations.annotations }}
|
{{- range $key, $value := .Values.migrations.annotations }}
|
||||||
{{ $key }}: {{ $value | quote }}
|
{{ $key }}: {{ $value | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
{{- if (and (not .Values.deployment.serviceAccount.automountServiceAccountToken) (or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name)) }}
|
||||||
|
kuma.io/service-account-token-volume: {{ template "kong.serviceAccountTokenName" . }}
|
||||||
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
spec:
|
spec:
|
||||||
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
||||||
|
|
|
@ -31,6 +31,9 @@ spec:
|
||||||
{{- range $key, $value := .Values.migrations.annotations }}
|
{{- range $key, $value := .Values.migrations.annotations }}
|
||||||
{{ $key }}: {{ $value | quote }}
|
{{ $key }}: {{ $value | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
{{- if (and (not .Values.deployment.serviceAccount.automountServiceAccountToken) (or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name)) }}
|
||||||
|
kuma.io/service-account-token-volume: {{ template "kong.serviceAccountTokenName" . }}
|
||||||
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
spec:
|
spec:
|
||||||
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
||||||
|
|
|
@ -39,6 +39,9 @@ spec:
|
||||||
{{- range $key, $value := .Values.migrations.annotations }}
|
{{- range $key, $value := .Values.migrations.annotations }}
|
||||||
{{ $key }}: {{ $value | quote }}
|
{{ $key }}: {{ $value | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
{{- if (and (not .Values.deployment.serviceAccount.automountServiceAccountToken) (or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name)) }}
|
||||||
|
kuma.io/service-account-token-volume: {{ template "kong.serviceAccountTokenName" . }}
|
||||||
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
spec:
|
spec:
|
||||||
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
||||||
|
|
|
@ -6,4 +6,4 @@ dependencies:
|
||||||
repository: https://charts.redpanda.com
|
repository: https://charts.redpanda.com
|
||||||
version: 0.1.5
|
version: 0.1.5
|
||||||
digest: sha256:dd7afd55f6eb7e9b3a91b0e5eeda47138e23c255b32d277ad4cb3a7ad3ec1b1f
|
digest: sha256:dd7afd55f6eb7e9b3a91b0e5eeda47138e23c255b32d277ad4cb3a7ad3ec1b1f
|
||||||
generated: "2023-08-29T23:24:16.635099387Z"
|
generated: "2023-08-31T03:08:33.366208928Z"
|
||||||
|
|
|
@ -37,4 +37,4 @@ name: redpanda
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/redpanda-data/helm-charts
|
- https://github.com/redpanda-data/helm-charts
|
||||||
type: application
|
type: application
|
||||||
version: 5.2.0
|
version: 5.3.0
|
||||||
|
|
|
@ -0,0 +1,463 @@
|
||||||
|
{{/*
|
||||||
|
Licensed to the Apache Software Foundation (ASF) under one or more
|
||||||
|
contributor license agreements. See the NOTICE file distributed with
|
||||||
|
this work for additional information regarding copyright ownership.
|
||||||
|
The ASF licenses this file to You under the Apache License, Version 2.0
|
||||||
|
(the "License"); you may not use this file except in compliance with
|
||||||
|
the License. You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/}}
|
||||||
|
|
||||||
|
{{- define "configmap-content-no-seed" -}}
|
||||||
|
{{- /*
|
||||||
|
configmap content without seed list.
|
||||||
|
*/ -}}
|
||||||
|
{{- $root := . }}
|
||||||
|
{{- $values := .Values }}
|
||||||
|
|
||||||
|
{{- /*
|
||||||
|
It's impossible to do a rolling upgrade from not-tls-enabled rpc to tls-enabled rpc.
|
||||||
|
*/ -}}
|
||||||
|
{{- $check := list
|
||||||
|
(include "redpanda-atleast-23-1-2" .|fromJson).bool
|
||||||
|
(include "redpanda-22-3-atleast-22-3-13" .|fromJson).bool
|
||||||
|
(include "redpanda-22-2-atleast-22-2-10" .|fromJson).bool
|
||||||
|
-}}
|
||||||
|
{{- $wantedRPCTLS := (include "rpc-tls-enabled" . | fromJson).bool -}}
|
||||||
|
{{- if and (not (mustHas true $check)) $wantedRPCTLS -}}
|
||||||
|
{{- fail (printf "Redpanda version v%s does not support TLS on the RPC port. Please upgrade. See technical service bulletin 2023-01." (include "redpanda.semver" .)) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $cm := lookup "v1" "ConfigMap" .Release.Namespace (include "redpanda.fullname" .) -}}
|
||||||
|
{{- $redpandaYAML := dig "data" "redpanda.yaml" "" $cm | fromYaml -}}
|
||||||
|
{{- $currentRPCTLS := dig "redpanda" "rpc_server_tls" "enabled" false $redpandaYAML -}}
|
||||||
|
{{- /* Lookup will return an empty map when running `helm template` or when `--dry-run` is passed. */ -}}
|
||||||
|
{{- if (and .Release.IsUpgrade $cm) -}}
|
||||||
|
{{- if ne $currentRPCTLS $wantedRPCTLS -}}
|
||||||
|
{{- if eq (get .Values "force" | default false) false -}}
|
||||||
|
{{- fail (join "\n" (list
|
||||||
|
(printf "\n\nError: Cannot do a rolling restart to enable or disable tls at the RPC layer: changing listeners.rpc.tls.enabled (redpanda.yaml:repdanda.rpc_server_tls.enabled) from %v to %v" $currentRPCTLS $wantedRPCTLS)
|
||||||
|
"***WARNING The following instructions will result in a short period of downtime."
|
||||||
|
"To accept this risk, run the upgrade again adding `--force=true` and do the following:\n"
|
||||||
|
"While helm is upgrading the release, manually delete ALL the pods:"
|
||||||
|
(printf " kubectl -n %s delete pod -l app.kubernetes.io/component=redpanda-statefulset" .Release.Namespace)
|
||||||
|
"\nIf you got here thinking rpc tls was already enabled, see technical service bulletin 2023-01."
|
||||||
|
))
|
||||||
|
-}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- $users := list -}}
|
||||||
|
{{- if (include "sasl-enabled" . | fromJson).bool -}}
|
||||||
|
{{- range $user := .Values.auth.sasl.users -}}
|
||||||
|
{{- $users = append $users $user.name -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
bootstrap.yaml: |
|
||||||
|
kafka_enable_authorization: {{ (include "sasl-enabled" . | fromJson).bool }}
|
||||||
|
enable_sasl: {{ (include "sasl-enabled" . | fromJson).bool }}
|
||||||
|
enable_rack_awareness: {{ .Values.rackAwareness.enabled }}
|
||||||
|
{{- if $users }}
|
||||||
|
superusers: {{ toJson $users }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with (dig "cluster" dict .Values.config) }}
|
||||||
|
{{- range $key, $element := .}}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- include "tunable" . }}
|
||||||
|
{{- if and (not (hasKey .Values.config.cluster "storage_min_free_bytes")) ((include "redpanda-atleast-22-2-0" . | fromJson).bool) }}
|
||||||
|
storage_min_free_bytes: {{ include "storage-min-free-bytes" . }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if and (include "is-licensed" . | fromJson).bool .Values.storage.tieredConfig.cloud_storage_enabled }}
|
||||||
|
{{- $tieredStorageConfig := deepCopy .Values.storage.tieredConfig }}
|
||||||
|
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_cache_directory" }}
|
||||||
|
{{- if not (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
||||||
|
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_credentials_source"}}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $key, $element := $tieredStorageConfig}}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
redpanda.yaml: |
|
||||||
|
config_file: /etc/redpanda/redpanda.yaml
|
||||||
|
{{- if .Values.logging.usageStats.enabled }}
|
||||||
|
{{- with (dig "usageStats" "organization" "" .Values.logging) }}
|
||||||
|
organization: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with (dig "usageStats" "clusterId" "" .Values.logging) }}
|
||||||
|
cluster_id: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
redpanda:
|
||||||
|
{{- if (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
||||||
|
empty_seed_starts_cluster: false
|
||||||
|
{{- end }}
|
||||||
|
kafka_enable_authorization: {{ (include "sasl-enabled" . | fromJson).bool }}
|
||||||
|
enable_sasl: {{ (include "sasl-enabled" . | fromJson).bool }}
|
||||||
|
{{- if $users }}
|
||||||
|
superusers: {{ toJson $users }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with (dig "cluster" dict .Values.config) }}
|
||||||
|
{{- range $key, $element := . }}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with (dig "tunable" dict .Values.config) }}
|
||||||
|
{{- range $key, $element := .}}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if not (hasKey .Values.config.cluster "storage_min_free_bytes") }}
|
||||||
|
storage_min_free_bytes: {{ include "storage-min-free-bytes" . }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with dig "node" dict .Values.config }}
|
||||||
|
{{- range $key, $element := .}}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* LISTENERS */}}
|
||||||
|
{{- /* Admin API */}}
|
||||||
|
{{- $service := .Values.listeners.admin }}
|
||||||
|
admin:
|
||||||
|
- name: internal
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $service.port }}
|
||||||
|
{{- range $name, $listener := $service.external }}
|
||||||
|
{{- if and $listener.port $name }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $listener.port }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
admin_api_tls:
|
||||||
|
{{- if (include "admin-internal-tls-enabled" . | fromJson).bool }}
|
||||||
|
- name: internal
|
||||||
|
enabled: true
|
||||||
|
cert_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.crt
|
||||||
|
key_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.key
|
||||||
|
require_client_auth: {{ $service.tls.requireClientAuth }}
|
||||||
|
{{- $cert := get .Values.tls.certs $service.tls.cert }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: /etc/tls/certs/{{ $service.tls.cert }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $service.external }}
|
||||||
|
{{- $k := dict "Values" $values "listener" $listener }}
|
||||||
|
{{- if (include "admin-external-tls-enabled" $k | fromJson).bool }}
|
||||||
|
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
||||||
|
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
||||||
|
{{- $certName := include "admin-external-tls-cert" $k }}
|
||||||
|
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
||||||
|
{{- $cert := get $values.tls.certs $certName }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined" $certName)}}
|
||||||
|
{{- end }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
enabled: true
|
||||||
|
cert_file: {{ $certPath }}/tls.crt
|
||||||
|
key_file: {{ $certPath }}/tls.key
|
||||||
|
require_client_auth: {{ $mtls }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: {{ $certPath }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* Kafka API */}}
|
||||||
|
{{- $kafkaService := .Values.listeners.kafka }}
|
||||||
|
kafka_api:
|
||||||
|
- name: internal
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $kafkaService.port }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $kafkaService.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "sasl" $kafkaService.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $kafkaService.external }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $listener.port }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "sasl" $listener.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
kafka_api_tls:
|
||||||
|
{{- if (include "kafka-internal-tls-enabled" . | fromJson).bool }}
|
||||||
|
- name: internal
|
||||||
|
enabled: true
|
||||||
|
cert_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/tls.crt
|
||||||
|
key_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/tls.key
|
||||||
|
require_client_auth: {{ $kafkaService.tls.requireClientAuth }}
|
||||||
|
{{- $cert := get .Values.tls.certs $kafkaService.tls.cert }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $kafkaService.external }}
|
||||||
|
{{- $k := dict "Values" $values "listener" $listener }}
|
||||||
|
{{- if (include "kafka-external-tls-enabled" $k | fromJson).bool }}
|
||||||
|
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
||||||
|
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
||||||
|
{{- $certName := include "kafka-external-tls-cert" $k }}
|
||||||
|
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
||||||
|
{{- $cert := get $values.tls.certs $certName }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined" $certName)}}
|
||||||
|
{{- end }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
enabled: true
|
||||||
|
cert_file: {{ $certPath }}/tls.crt
|
||||||
|
key_file: {{ $certPath }}/tls.key
|
||||||
|
require_client_auth: {{ $mtls }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: {{ $certPath }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* RPC Server */}}
|
||||||
|
{{- $service = .Values.listeners.rpc }}
|
||||||
|
rpc_server:
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $service.port }}
|
||||||
|
{{- if (include "rpc-tls-enabled" . | fromJson).bool }}
|
||||||
|
rpc_server_tls:
|
||||||
|
enabled: true
|
||||||
|
cert_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.crt
|
||||||
|
key_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.key
|
||||||
|
require_client_auth: {{ $service.tls.requireClientAuth }}
|
||||||
|
{{- $cert := get .Values.tls.certs $service.tls.cert }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: /etc/tls/certs/{{ $service.tls.cert }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
seed_servers:
|
||||||
|
{{- with $root.tempConfigMapServerList -}}
|
||||||
|
{{- . | trim | nindent 8 }}
|
||||||
|
{{- end -}}
|
||||||
|
{{- if and (include "is-licensed" . | fromJson).bool .Values.storage.tieredConfig.cloud_storage_enabled }}
|
||||||
|
{{- $tieredStorageConfig := deepCopy .Values.storage.tieredConfig }}
|
||||||
|
{{- if not (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
||||||
|
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_credentials_source"}}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $key, $element := $tieredStorageConfig}}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* Schema Registry API */}}
|
||||||
|
{{- if and .Values.listeners.schemaRegistry.enabled (include "redpanda-22-2-x-without-sasl" $root | fromJson).bool }}
|
||||||
|
{{- $schemaRegistryService := .Values.listeners.schemaRegistry }}
|
||||||
|
schema_registry:
|
||||||
|
schema_registry_api:
|
||||||
|
- name: internal
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $schemaRegistryService.port }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $schemaRegistryService.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "http_basic" $schemaRegistryService.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $schemaRegistryService.external }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
address: 0.0.0.0
|
||||||
|
{{- /*
|
||||||
|
when upgrading from an older version that had a missing port, fail if we cannot guess a default
|
||||||
|
this should work in all cases as the older versions would have failed with multiple listeners anyway
|
||||||
|
*/}}
|
||||||
|
{{- if and (empty $listener.port) (ne (len $schemaRegistryService.external) 1) }}
|
||||||
|
{{- fail "missing required port for schemaRegistry listener $listener.name" }}
|
||||||
|
{{- end }}
|
||||||
|
port: {{ $listener.port | default 8084 }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "http_basic" $listener.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
schema_registry_api_tls:
|
||||||
|
{{- if (include "schemaRegistry-internal-tls-enabled" . | fromJson).bool }}
|
||||||
|
- name: internal
|
||||||
|
enabled: true
|
||||||
|
cert_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/tls.crt
|
||||||
|
key_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/tls.key
|
||||||
|
require_client_auth: {{ $schemaRegistryService.tls.requireClientAuth }}
|
||||||
|
{{- $cert := get .Values.tls.certs $schemaRegistryService.tls.cert }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $schemaRegistryService.external }}
|
||||||
|
{{- $k := dict "Values" $values "listener" $listener }}
|
||||||
|
{{- if (include "schemaRegistry-external-tls-enabled" $k | fromJson).bool }}
|
||||||
|
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
||||||
|
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
||||||
|
{{- $certName := include "schemaRegistry-external-tls-cert" $k }}
|
||||||
|
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
||||||
|
{{- $cert := get $values.tls.certs $certName }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
enabled: true
|
||||||
|
cert_file: {{ $certPath }}/tls.crt
|
||||||
|
key_file: {{ $certPath }}/tls.key
|
||||||
|
require_client_auth: {{ $mtls }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: {{ $certPath }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* HTTP Proxy */}}
|
||||||
|
{{- if and .Values.listeners.http.enabled (include "redpanda-22-2-x-without-sasl" $root | fromJson).bool }}
|
||||||
|
{{- $HTTPService := .Values.listeners.http }}
|
||||||
|
pandaproxy:
|
||||||
|
pandaproxy_api:
|
||||||
|
- name: internal
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $HTTPService.port }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $HTTPService.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "http_basic" $HTTPService.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $HTTPService.external }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $listener.port }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "http_basic" $listener.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
pandaproxy_api_tls:
|
||||||
|
{{- if (include "http-internal-tls-enabled" . | fromJson).bool }}
|
||||||
|
- name: internal
|
||||||
|
enabled: true
|
||||||
|
cert_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/tls.crt
|
||||||
|
key_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/tls.key
|
||||||
|
require_client_auth: {{ $HTTPService.tls.requireClientAuth }}
|
||||||
|
{{- $cert := get .Values.tls.certs $HTTPService.tls.cert }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $HTTPService.external }}
|
||||||
|
{{- $k := dict "Values" $values "listener" $listener }}
|
||||||
|
{{- if (include "http-external-tls-enabled" $k | fromJson).bool }}
|
||||||
|
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
||||||
|
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
||||||
|
{{- $certName := include "http-external-tls-cert" $k }}
|
||||||
|
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
||||||
|
{{- $cert := get $values.tls.certs $certName }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
enabled: true
|
||||||
|
cert_file: {{ $certPath }}/tls.crt
|
||||||
|
key_file: {{ $certPath }}/tls.key
|
||||||
|
require_client_auth: {{ $mtls }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: {{ $certPath }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* END LISTENERS */}}
|
||||||
|
|
||||||
|
rpk:
|
||||||
|
{{- with (dig "rpk" dict .Values.config) }}
|
||||||
|
{{- . | toYaml | nindent 6}}
|
||||||
|
{{- end }}
|
||||||
|
enable_usage_stats: {{ .Values.logging.usageStats.enabled }}
|
||||||
|
overprovisioned: {{ dig "cpu" "overprovisioned" false .Values.resources }}
|
||||||
|
enable_memory_locking: {{ dig "memory" "enable_memory_locking" false .Values.resources }}
|
||||||
|
{{- if hasKey .Values.tuning "tune_aio_events" }}
|
||||||
|
tune_aio_events: {{ .Values.tuning.tune_aio_events }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if hasKey .Values.tuning "tune_clocksource" }}
|
||||||
|
tune_clocksource: {{ .Values.tuning.tune_clocksource }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if hasKey .Values.tuning "tune_ballast_file" }}
|
||||||
|
tune_ballast_file: {{ .Values.tuning.tune_ballast_file }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if hasKey .Values.tuning "ballast_file_path" }}
|
||||||
|
ballast_file_path: {{ .Values.tuning.ballast_file_path }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if hasKey .Values.tuning "ballast_file_size" }}
|
||||||
|
ballast_file_size: {{ .Values.tuning.ballast_file_size }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if hasKey .Values.tuning "well_known_io" }}
|
||||||
|
well_known_io: {{ .Values.tuning.well_known_io }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- define "configmap-server-list" -}}
|
||||||
|
{{- $root := . }}
|
||||||
|
{{- range (include "seed-server-list" $root | mustFromJson) }}
|
||||||
|
- host:
|
||||||
|
address: {{ . }}
|
||||||
|
port: {{ $root.Values.listeners.rpc.port }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- define "configmap-with-server-list" -}}
|
||||||
|
{{- $root := . }}
|
||||||
|
{{- $serverList := (include "configmap-server-list" $root ) -}}
|
||||||
|
{{- $r := set $root "tempConfigMapServerList" ( $serverList ) }}
|
||||||
|
{{ include "configmap-content-no-seed" $r }}
|
||||||
|
{{- end -}}
|
|
@ -14,47 +14,6 @@ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
See the License for the specific language governing permissions and
|
See the License for the specific language governing permissions and
|
||||||
limitations under the License.
|
limitations under the License.
|
||||||
*/}}
|
*/}}
|
||||||
{{- $root := . }}
|
|
||||||
{{- $values := .Values }}
|
|
||||||
|
|
||||||
{{- /*
|
|
||||||
It's impossible to do a rolling upgrade from not-tls-enabled rpc to tls-enabled rpc.
|
|
||||||
*/ -}}
|
|
||||||
{{- $check := list
|
|
||||||
(include "redpanda-atleast-23-1-2" .|fromJson).bool
|
|
||||||
(include "redpanda-22-3-atleast-22-3-13" .|fromJson).bool
|
|
||||||
(include "redpanda-22-2-atleast-22-2-10" .|fromJson).bool
|
|
||||||
-}}
|
|
||||||
{{- $wantedRPCTLS := (include "rpc-tls-enabled" . | fromJson).bool -}}
|
|
||||||
{{- if and (not (mustHas true $check)) $wantedRPCTLS -}}
|
|
||||||
{{- fail (printf "Redpanda version v%s does not support TLS on the RPC port. Please upgrade. See technical service bulletin 2023-01." (include "redpanda.semver" .)) -}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- $cm := lookup "v1" "ConfigMap" .Release.Namespace (include "redpanda.fullname" .) -}}
|
|
||||||
{{- $redpandaYAML := dig "data" "redpanda.yaml" "" $cm | fromYaml -}}
|
|
||||||
{{- $currentRPCTLS := dig "redpanda" "rpc_server_tls" "enabled" false $redpandaYAML -}}
|
|
||||||
{{- /* Lookup will return an empty map when running `helm template` or when `--dry-run` is passed. */ -}}
|
|
||||||
{{- if (and .Release.IsUpgrade $cm) -}}
|
|
||||||
{{- if ne $currentRPCTLS $wantedRPCTLS -}}
|
|
||||||
{{- if eq (get .Values "force" | default false) false -}}
|
|
||||||
{{- fail (join "\n" (list
|
|
||||||
(printf "\n\nError: Cannot do a rolling restart to enable or disable tls at the RPC layer: changing listeners.rpc.tls.enabled (redpanda.yaml:repdanda.rpc_server_tls.enabled) from %v to %v" $currentRPCTLS $wantedRPCTLS)
|
|
||||||
"***WARNING The following instructions will result in a short period of downtime."
|
|
||||||
"To accept this risk, run the upgrade again adding `--force=true` and do the following:\n"
|
|
||||||
"While helm is upgrading the release, manually delete ALL the pods:"
|
|
||||||
(printf " kubectl -n %s delete pod -l app.kubernetes.io/component=redpanda-statefulset" .Release.Namespace)
|
|
||||||
"\nIf you got here thinking rpc tls was already enabled, see technical service bulletin 2023-01."
|
|
||||||
))
|
|
||||||
-}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- $users := list -}}
|
|
||||||
{{- if (include "sasl-enabled" . | fromJson).bool -}}
|
|
||||||
{{- range $user := .Values.auth.sasl.users -}}
|
|
||||||
{{- $users = append $users $user.name -}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
|
@ -66,388 +25,4 @@ metadata:
|
||||||
{{- . | nindent 4 }}
|
{{- . | nindent 4 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
data:
|
data:
|
||||||
bootstrap.yaml: |
|
{{ include "configmap-with-server-list" . | trim }}
|
||||||
kafka_enable_authorization: {{ (include "sasl-enabled" . | fromJson).bool }}
|
|
||||||
enable_sasl: {{ (include "sasl-enabled" . | fromJson).bool }}
|
|
||||||
enable_rack_awareness: {{ .Values.rackAwareness.enabled }}
|
|
||||||
{{- if $users }}
|
|
||||||
superusers: {{ toJson $users }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with (dig "cluster" dict .Values.config) }}
|
|
||||||
{{- range $key, $element := .}}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- include "tunable" . }}
|
|
||||||
{{- if and (not (hasKey .Values.config.cluster "storage_min_free_bytes")) ((include "redpanda-atleast-22-2-0" . | fromJson).bool) }}
|
|
||||||
storage_min_free_bytes: {{ include "storage-min-free-bytes" . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if and (include "is-licensed" . | fromJson).bool .Values.storage.tieredConfig.cloud_storage_enabled }}
|
|
||||||
{{- $tieredStorageConfig := deepCopy .Values.storage.tieredConfig }}
|
|
||||||
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_cache_directory" }}
|
|
||||||
{{- if not (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
|
||||||
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_credentials_source"}}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $key, $element := $tieredStorageConfig}}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
redpanda.yaml: |
|
|
||||||
config_file: /etc/redpanda/redpanda.yaml
|
|
||||||
{{- if .Values.logging.usageStats.enabled }}
|
|
||||||
{{- with (dig "usageStats" "organization" "" .Values.logging) }}
|
|
||||||
organization: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with (dig "usageStats" "clusterId" "" .Values.logging) }}
|
|
||||||
cluster_id: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
redpanda:
|
|
||||||
{{- if (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
|
||||||
empty_seed_starts_cluster: false
|
|
||||||
{{- end }}
|
|
||||||
kafka_enable_authorization: {{ (include "sasl-enabled" . | fromJson).bool }}
|
|
||||||
enable_sasl: {{ (include "sasl-enabled" . | fromJson).bool }}
|
|
||||||
{{- if $users }}
|
|
||||||
superusers: {{ toJson $users }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with (dig "cluster" dict .Values.config) }}
|
|
||||||
{{- range $key, $element := . }}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with (dig "tunable" dict .Values.config) }}
|
|
||||||
{{- range $key, $element := .}}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if not (hasKey .Values.config.cluster "storage_min_free_bytes") }}
|
|
||||||
storage_min_free_bytes: {{ include "storage-min-free-bytes" . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with dig "node" dict .Values.config }}
|
|
||||||
{{- range $key, $element := .}}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* LISTENERS */}}
|
|
||||||
{{- /* Admin API */}}
|
|
||||||
{{- $service := .Values.listeners.admin }}
|
|
||||||
admin:
|
|
||||||
- name: internal
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $service.port }}
|
|
||||||
{{- range $name, $listener := $service.external }}
|
|
||||||
{{- if and $listener.port $name }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $listener.port }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
admin_api_tls:
|
|
||||||
{{- if (include "admin-internal-tls-enabled" . | fromJson).bool }}
|
|
||||||
- name: internal
|
|
||||||
enabled: true
|
|
||||||
cert_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.crt
|
|
||||||
key_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.key
|
|
||||||
require_client_auth: {{ $service.tls.requireClientAuth }}
|
|
||||||
{{- $cert := get .Values.tls.certs $service.tls.cert }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: /etc/tls/certs/{{ $service.tls.cert }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $service.external }}
|
|
||||||
{{- $k := dict "Values" $values "listener" $listener }}
|
|
||||||
{{- if (include "admin-external-tls-enabled" $k | fromJson).bool }}
|
|
||||||
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
|
||||||
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
|
||||||
{{- $certName := include "admin-external-tls-cert" $k }}
|
|
||||||
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
|
||||||
{{- $cert := get $values.tls.certs $certName }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined" $certName)}}
|
|
||||||
{{- end }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
enabled: true
|
|
||||||
cert_file: {{ $certPath }}/tls.crt
|
|
||||||
key_file: {{ $certPath }}/tls.key
|
|
||||||
require_client_auth: {{ $mtls }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: {{ $certPath }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* Kafka API */}}
|
|
||||||
{{- $kafkaService := .Values.listeners.kafka }}
|
|
||||||
kafka_api:
|
|
||||||
- name: internal
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $kafkaService.port }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $kafkaService.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "sasl" $kafkaService.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $kafkaService.external }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $listener.port }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "sasl" $listener.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
kafka_api_tls:
|
|
||||||
{{- if (include "kafka-internal-tls-enabled" . | fromJson).bool }}
|
|
||||||
- name: internal
|
|
||||||
enabled: true
|
|
||||||
cert_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/tls.crt
|
|
||||||
key_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/tls.key
|
|
||||||
require_client_auth: {{ $kafkaService.tls.requireClientAuth }}
|
|
||||||
{{- $cert := get .Values.tls.certs $kafkaService.tls.cert }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $kafkaService.external }}
|
|
||||||
{{- $k := dict "Values" $values "listener" $listener }}
|
|
||||||
{{- if (include "kafka-external-tls-enabled" $k | fromJson).bool }}
|
|
||||||
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
|
||||||
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
|
||||||
{{- $certName := include "kafka-external-tls-cert" $k }}
|
|
||||||
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
|
||||||
{{- $cert := get $values.tls.certs $certName }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined" $certName)}}
|
|
||||||
{{- end }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
enabled: true
|
|
||||||
cert_file: {{ $certPath }}/tls.crt
|
|
||||||
key_file: {{ $certPath }}/tls.key
|
|
||||||
require_client_auth: {{ $mtls }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: {{ $certPath }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* RPC Server */}}
|
|
||||||
{{- $service = .Values.listeners.rpc }}
|
|
||||||
rpc_server:
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $service.port }}
|
|
||||||
{{- if (include "rpc-tls-enabled" . | fromJson).bool }}
|
|
||||||
rpc_server_tls:
|
|
||||||
enabled: true
|
|
||||||
cert_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.crt
|
|
||||||
key_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.key
|
|
||||||
require_client_auth: {{ $service.tls.requireClientAuth }}
|
|
||||||
{{- $cert := get .Values.tls.certs $service.tls.cert }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: /etc/tls/certs/{{ $service.tls.cert }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
seed_servers:
|
|
||||||
{{- range (include "seed-server-list" . | mustFromJson) }}
|
|
||||||
- host:
|
|
||||||
address: {{ . }}
|
|
||||||
port: {{ $values.listeners.rpc.port }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if and (include "is-licensed" . | fromJson).bool .Values.storage.tieredConfig.cloud_storage_enabled }}
|
|
||||||
{{- $tieredStorageConfig := deepCopy .Values.storage.tieredConfig }}
|
|
||||||
{{- if not (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
|
||||||
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_credentials_source"}}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $key, $element := $tieredStorageConfig}}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* Schema Registry API */}}
|
|
||||||
{{- if and .Values.listeners.schemaRegistry.enabled (include "redpanda-22-2-x-without-sasl" $root | fromJson).bool }}
|
|
||||||
{{- $schemaRegistryService := .Values.listeners.schemaRegistry }}
|
|
||||||
schema_registry:
|
|
||||||
schema_registry_api:
|
|
||||||
- name: internal
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $schemaRegistryService.port }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $schemaRegistryService.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "http_basic" $schemaRegistryService.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $schemaRegistryService.external }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
address: 0.0.0.0
|
|
||||||
{{- /*
|
|
||||||
when upgrading from an older version that had a missing port, fail if we cannot guess a default
|
|
||||||
this should work in all cases as the older versions would have failed with multiple listeners anyway
|
|
||||||
*/}}
|
|
||||||
{{- if and (empty $listener.port) (ne (len $schemaRegistryService.external) 1) }}
|
|
||||||
{{- fail "missing required port for schemaRegistry listener $listener.name" }}
|
|
||||||
{{- end }}
|
|
||||||
port: {{ $listener.port | default 8084 }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "http_basic" $listener.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
schema_registry_api_tls:
|
|
||||||
{{- if (include "schemaRegistry-internal-tls-enabled" . | fromJson).bool }}
|
|
||||||
- name: internal
|
|
||||||
enabled: true
|
|
||||||
cert_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/tls.crt
|
|
||||||
key_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/tls.key
|
|
||||||
require_client_auth: {{ $schemaRegistryService.tls.requireClientAuth }}
|
|
||||||
{{- $cert := get .Values.tls.certs $schemaRegistryService.tls.cert }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $schemaRegistryService.external }}
|
|
||||||
{{- $k := dict "Values" $values "listener" $listener }}
|
|
||||||
{{- if (include "schemaRegistry-external-tls-enabled" $k | fromJson).bool }}
|
|
||||||
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
|
||||||
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
|
||||||
{{- $certName := include "schemaRegistry-external-tls-cert" $k }}
|
|
||||||
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
|
||||||
{{- $cert := get $values.tls.certs $certName }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
enabled: true
|
|
||||||
cert_file: {{ $certPath }}/tls.crt
|
|
||||||
key_file: {{ $certPath }}/tls.key
|
|
||||||
require_client_auth: {{ $mtls }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: {{ $certPath }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* HTTP Proxy */}}
|
|
||||||
{{- if and .Values.listeners.http.enabled (include "redpanda-22-2-x-without-sasl" $root | fromJson).bool }}
|
|
||||||
{{- $HTTPService := .Values.listeners.http }}
|
|
||||||
pandaproxy:
|
|
||||||
pandaproxy_api:
|
|
||||||
- name: internal
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $HTTPService.port }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $HTTPService.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "http_basic" $HTTPService.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $HTTPService.external }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $listener.port }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "http_basic" $listener.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
pandaproxy_api_tls:
|
|
||||||
{{- if (include "http-internal-tls-enabled" . | fromJson).bool }}
|
|
||||||
- name: internal
|
|
||||||
enabled: true
|
|
||||||
cert_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/tls.crt
|
|
||||||
key_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/tls.key
|
|
||||||
require_client_auth: {{ $HTTPService.tls.requireClientAuth }}
|
|
||||||
{{- $cert := get .Values.tls.certs $HTTPService.tls.cert }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $HTTPService.external }}
|
|
||||||
{{- $k := dict "Values" $values "listener" $listener }}
|
|
||||||
{{- if (include "http-external-tls-enabled" $k | fromJson).bool }}
|
|
||||||
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
|
||||||
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
|
||||||
{{- $certName := include "http-external-tls-cert" $k }}
|
|
||||||
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
|
||||||
{{- $cert := get $values.tls.certs $certName }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
enabled: true
|
|
||||||
cert_file: {{ $certPath }}/tls.crt
|
|
||||||
key_file: {{ $certPath }}/tls.key
|
|
||||||
require_client_auth: {{ $mtls }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: {{ $certPath }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* END LISTENERS */}}
|
|
||||||
|
|
||||||
rpk:
|
|
||||||
{{- with (dig "rpk" dict .Values.config) }}
|
|
||||||
{{- . | toYaml | nindent 6}}
|
|
||||||
{{- end }}
|
|
||||||
enable_usage_stats: {{ .Values.logging.usageStats.enabled }}
|
|
||||||
overprovisioned: {{ dig "cpu" "overprovisioned" false .Values.resources }}
|
|
||||||
enable_memory_locking: {{ dig "memory" "enable_memory_locking" false .Values.resources }}
|
|
||||||
{{- if hasKey .Values.tuning "tune_aio_events" }}
|
|
||||||
tune_aio_events: {{ .Values.tuning.tune_aio_events }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if hasKey .Values.tuning "tune_clocksource" }}
|
|
||||||
tune_clocksource: {{ .Values.tuning.tune_clocksource }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if hasKey .Values.tuning "tune_ballast_file" }}
|
|
||||||
tune_ballast_file: {{ .Values.tuning.tune_ballast_file }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if hasKey .Values.tuning "ballast_file_path" }}
|
|
||||||
ballast_file_path: {{ .Values.tuning.ballast_file_path }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if hasKey .Values.tuning "ballast_file_size" }}
|
|
||||||
ballast_file_size: {{ .Values.tuning.ballast_file_size }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if hasKey .Values.tuning "well_known_io" }}
|
|
||||||
well_known_io: {{ .Values.tuning.well_known_io }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
|
@ -57,7 +57,7 @@ spec:
|
||||||
labels: {{ (include "statefulset-pod-labels" .) | nindent 8 }}
|
labels: {{ (include "statefulset-pod-labels" .) | nindent 8 }}
|
||||||
redpanda.com/poddisruptionbudget: {{ template "redpanda.name" . }}
|
redpanda.com/poddisruptionbudget: {{ template "redpanda.name" . }}
|
||||||
annotations:
|
annotations:
|
||||||
checksum/config: {{ include (print $.Template.BasePath "/configmap.yaml") . | sha256sum }}
|
checksum/config: {{ include "configmap-content-no-seed" . | sha256sum }}
|
||||||
{{- with $.Values.statefulset.annotations }}
|
{{- with $.Values.statefulset.annotations }}
|
||||||
{{- toYaml . | nindent 8 }}
|
{{- toYaml . | nindent 8 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
||||||
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
||||||
catalog.cattle.io/release-name: speedscale-operator
|
catalog.cattle.io/release-name: speedscale-operator
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
appVersion: 1.3.320
|
appVersion: 1.3.335
|
||||||
description: Stress test your APIs with real world scenarios. Collect and replay
|
description: Stress test your APIs with real world scenarios. Collect and replay
|
||||||
traffic without scripting.
|
traffic without scripting.
|
||||||
home: https://speedscale.com
|
home: https://speedscale.com
|
||||||
|
@ -24,4 +24,4 @@ maintainers:
|
||||||
- email: support@speedscale.com
|
- email: support@speedscale.com
|
||||||
name: Speedscale Support
|
name: Speedscale Support
|
||||||
name: speedscale-operator
|
name: speedscale-operator
|
||||||
version: 1.3.28
|
version: 1.3.29
|
||||||
|
|
|
@ -101,10 +101,10 @@ _See [helm upgrade](https://helm.sh/docs/helm/helm_upgrade/) for command documen
|
||||||
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
||||||
incompatible breaking change needing manual actions.
|
incompatible breaking change needing manual actions.
|
||||||
|
|
||||||
### Upgrade to 1.3.28
|
### Upgrade to 1.3.29
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
kubectl apply --server-side -f https://raw.githubusercontent.com/speedscale/operator-helm/main/1.3.28/templates/crds/trafficreplays.yaml
|
kubectl apply --server-side -f https://raw.githubusercontent.com/speedscale/operator-helm/main/1.3.29/templates/crds/trafficreplays.yaml
|
||||||
```
|
```
|
||||||
|
|
||||||
### Upgrade to 1.1.0
|
### Upgrade to 1.1.0
|
||||||
|
|
|
@ -101,10 +101,10 @@ _See [helm upgrade](https://helm.sh/docs/helm/helm_upgrade/) for command documen
|
||||||
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
||||||
incompatible breaking change needing manual actions.
|
incompatible breaking change needing manual actions.
|
||||||
|
|
||||||
### Upgrade to 1.3.28
|
### Upgrade to 1.3.29
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
kubectl apply --server-side -f https://raw.githubusercontent.com/speedscale/operator-helm/main/1.3.28/templates/crds/trafficreplays.yaml
|
kubectl apply --server-side -f https://raw.githubusercontent.com/speedscale/operator-helm/main/1.3.29/templates/crds/trafficreplays.yaml
|
||||||
```
|
```
|
||||||
|
|
||||||
### Upgrade to 1.1.0
|
### Upgrade to 1.1.0
|
||||||
|
|
|
@ -20,7 +20,7 @@ clusterName: "my-cluster"
|
||||||
# Speedscale components image settings.
|
# Speedscale components image settings.
|
||||||
image:
|
image:
|
||||||
registry: gcr.io/speedscale
|
registry: gcr.io/speedscale
|
||||||
tag: v1.3.320
|
tag: v1.3.335
|
||||||
pullPolicy: Always
|
pullPolicy: Always
|
||||||
|
|
||||||
# Log level for Speedscale components.
|
# Log level for Speedscale components.
|
||||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
||||||
catalog.cattle.io/kube-version: '>=1.19.0-0'
|
catalog.cattle.io/kube-version: '>=1.19.0-0'
|
||||||
catalog.cattle.io/release-name: k8s-triliovault-operator
|
catalog.cattle.io/release-name: k8s-triliovault-operator
|
||||||
apiVersion: v2
|
apiVersion: v2
|
||||||
appVersion: 3.1.1
|
appVersion: 3.1.2
|
||||||
dependencies:
|
dependencies:
|
||||||
- condition: observability.enabled
|
- condition: observability.enabled
|
||||||
name: observability
|
name: observability
|
||||||
|
@ -21,4 +21,4 @@ maintainers:
|
||||||
name: k8s-triliovault-operator
|
name: k8s-triliovault-operator
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/trilioData/k8s-triliovault-operator
|
- https://github.com/trilioData/k8s-triliovault-operator
|
||||||
version: 3.1.1
|
version: 3.1.2
|
||||||
|
|
|
@ -56,4 +56,4 @@ Once all the pods are in running state, you can access the TVK UI from your brow
|
||||||
For more details on how to access the TVK UI, follow this guide: https://docs.trilio.io/kubernetes/management-console-ui/accessing-the-ui
|
For more details on how to access the TVK UI, follow this guide: https://docs.trilio.io/kubernetes/management-console-ui/accessing-the-ui
|
||||||
|
|
||||||
You can start backup and restore of your application using TVK. For more details on how to do that, please follow our
|
You can start backup and restore of your application using TVK. For more details on how to do that, please follow our
|
||||||
getting started guide: https://docs.trilio.io/kubernetes/getting-started-3/getting-started-with-management-console
|
getting started guide: https://docs.trilio.io/kubernetes/advanced-configuration/management-console
|
||||||
|
|
|
@ -4,7 +4,7 @@ operator-webhook-init:
|
||||||
repository: operator-webhook-init
|
repository: operator-webhook-init
|
||||||
k8s-triliovault-operator:
|
k8s-triliovault-operator:
|
||||||
repository: k8s-triliovault-operator
|
repository: k8s-triliovault-operator
|
||||||
tag: "3.1.1"
|
tag: "3.1.2"
|
||||||
# create image pull secrets and specify the name here.
|
# create image pull secrets and specify the name here.
|
||||||
imagePullSecret: ""
|
imagePullSecret: ""
|
||||||
priorityClassName: ""
|
priorityClassName: ""
|
||||||
|
@ -174,8 +174,8 @@ podLabels:
|
||||||
linkerd.io/inject: disabled
|
linkerd.io/inject: disabled
|
||||||
relatedImages:
|
relatedImages:
|
||||||
tags:
|
tags:
|
||||||
tvk: "3.1.1"
|
tvk: "3.1.2"
|
||||||
event: "3.1.1"
|
event: "3.1.2"
|
||||||
control-plane:
|
control-plane:
|
||||||
image: "control-plane"
|
image: "control-plane"
|
||||||
metamover:
|
metamover:
|
||||||
|
|
278
index.yaml
278
index.yaml
|
@ -25046,6 +25046,34 @@ entries:
|
||||||
- assets/jenkins/jenkins-4.2.9.tgz
|
- assets/jenkins/jenkins-4.2.9.tgz
|
||||||
version: 4.2.9
|
version: 4.2.9
|
||||||
k8s-triliovault-operator:
|
k8s-triliovault-operator:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: TrilioVault for Kubernetes Operator
|
||||||
|
catalog.cattle.io/kube-version: '>=1.19.0-0'
|
||||||
|
catalog.cattle.io/release-name: k8s-triliovault-operator
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: 3.1.2
|
||||||
|
created: "2023-09-01T15:03:24.560392195Z"
|
||||||
|
dependencies:
|
||||||
|
- condition: observability.enabled
|
||||||
|
name: observability
|
||||||
|
repository: file://./charts/observability
|
||||||
|
version: ^0.1.0
|
||||||
|
description: K8s-TrilioVault-Operator is an operator designed to manage the K8s-TrilioVault
|
||||||
|
Application Lifecycle.
|
||||||
|
digest: 712d5508b98bcf391b45099ea68fe8823adfbca55e1450586c66778b7bcf9a82
|
||||||
|
home: https://github.com/trilioData/k8s-triliovault-operator
|
||||||
|
icon: https://www.trilio.io/wp-content/uploads/2021/01/Trilio-2020-logo-RGB-gray-green.png
|
||||||
|
kubeVersion: '>=1.19.0-0'
|
||||||
|
maintainers:
|
||||||
|
- email: prafull.ladha@trilio.io
|
||||||
|
name: prafull11
|
||||||
|
name: k8s-triliovault-operator
|
||||||
|
sources:
|
||||||
|
- https://github.com/trilioData/k8s-triliovault-operator
|
||||||
|
urls:
|
||||||
|
- assets/trilio/k8s-triliovault-operator-3.1.2.tgz
|
||||||
|
version: 3.1.2
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: TrilioVault for Kubernetes Operator
|
catalog.cattle.io/display-name: TrilioVault for Kubernetes Operator
|
||||||
|
@ -26683,6 +26711,58 @@ entries:
|
||||||
- assets/kasten/k10-4.5.900.tgz
|
- assets/kasten/k10-4.5.900.tgz
|
||||||
version: 4.5.900
|
version: 4.5.900
|
||||||
kafka:
|
kafka:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: Apache Kafka
|
||||||
|
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||||
|
catalog.cattle.io/release-name: kafka
|
||||||
|
category: Infrastructure
|
||||||
|
images: |
|
||||||
|
- name: jmx-exporter
|
||||||
|
image: docker.io/bitnami/jmx-exporter:0.19.0-debian-11-r57
|
||||||
|
- name: kafka-exporter
|
||||||
|
image: docker.io/bitnami/kafka-exporter:1.7.0-debian-11-r93
|
||||||
|
- name: kafka
|
||||||
|
image: docker.io/bitnami/kafka:3.5.1-debian-11-r35
|
||||||
|
- name: kubectl
|
||||||
|
image: docker.io/bitnami/kubectl:1.25.13-debian-11-r5
|
||||||
|
- name: os-shell
|
||||||
|
image: docker.io/bitnami/os-shell:11-debian-11-r51
|
||||||
|
licenses: Apache-2.0
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: 3.5.1
|
||||||
|
created: "2023-09-01T15:03:16.825486077Z"
|
||||||
|
dependencies:
|
||||||
|
- condition: zookeeper.enabled
|
||||||
|
name: zookeeper
|
||||||
|
repository: file://./charts/zookeeper
|
||||||
|
version: 12.x.x
|
||||||
|
- name: common
|
||||||
|
repository: file://./charts/common
|
||||||
|
tags:
|
||||||
|
- bitnami-common
|
||||||
|
version: 2.x.x
|
||||||
|
description: Apache Kafka is a distributed streaming platform designed to build
|
||||||
|
real-time pipelines and can be used as a message broker or as a replacement
|
||||||
|
for a log aggregation solution for big data applications.
|
||||||
|
digest: b4aa6f0626e742d2165b0fbb347a0f25c6d5116b7dfd46cbb98545be6be3759b
|
||||||
|
home: https://bitnami.com
|
||||||
|
icon: https://svn.apache.org/repos/asf/comdev/project-logos/originals/kafka.svg
|
||||||
|
keywords:
|
||||||
|
- kafka
|
||||||
|
- zookeeper
|
||||||
|
- streaming
|
||||||
|
- producer
|
||||||
|
- consumer
|
||||||
|
maintainers:
|
||||||
|
- name: VMware, Inc.
|
||||||
|
url: https://github.com/bitnami/charts
|
||||||
|
name: kafka
|
||||||
|
sources:
|
||||||
|
- https://github.com/bitnami/charts/tree/main/bitnami/kafka
|
||||||
|
urls:
|
||||||
|
- assets/bitnami/kafka-25.1.5.tgz
|
||||||
|
version: 25.1.5
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: Apache Kafka
|
catalog.cattle.io/display-name: Apache Kafka
|
||||||
|
@ -29165,6 +29245,33 @@ entries:
|
||||||
- assets/elastic/kibana-7.17.3.tgz
|
- assets/elastic/kibana-7.17.3.tgz
|
||||||
version: 7.17.3
|
version: 7.17.3
|
||||||
kong:
|
kong:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: Kong Gateway
|
||||||
|
catalog.cattle.io/release-name: kong
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: "3.3"
|
||||||
|
created: "2023-09-01T15:03:22.032680464Z"
|
||||||
|
dependencies:
|
||||||
|
- condition: postgresql.enabled
|
||||||
|
name: postgresql
|
||||||
|
repository: file://./charts/postgresql
|
||||||
|
version: 11.9.13
|
||||||
|
description: The Cloud-Native Ingress and API-management
|
||||||
|
digest: de6bbed8ac0dfb2bd3d25612417db8e3c4ea24b6fe036e029a992adeecd4959c
|
||||||
|
home: https://konghq.com/
|
||||||
|
icon: https://s3.amazonaws.com/downloads.kong/universe/assets/icon-kong-inc-large.png
|
||||||
|
maintainers:
|
||||||
|
- email: harry@konghq.com
|
||||||
|
name: hbagdi
|
||||||
|
- email: traines@konghq.com
|
||||||
|
name: rainest
|
||||||
|
name: kong
|
||||||
|
sources:
|
||||||
|
- https://github.com/Kong/charts/tree/main/charts/kong
|
||||||
|
urls:
|
||||||
|
- assets/kong/kong-2.26.5.tgz
|
||||||
|
version: 2.26.5
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: Kong Gateway
|
catalog.cattle.io/display-name: Kong Gateway
|
||||||
|
@ -43689,6 +43796,50 @@ entries:
|
||||||
- assets/bitnami/redis-17.3.7.tgz
|
- assets/bitnami/redis-17.3.7.tgz
|
||||||
version: 17.3.7
|
version: 17.3.7
|
||||||
redpanda:
|
redpanda:
|
||||||
|
- annotations:
|
||||||
|
artifacthub.io/images: |
|
||||||
|
- name: redpanda
|
||||||
|
image: docker.redpanda.com/redpandadata/redpanda:v23.2.7
|
||||||
|
- name: busybox
|
||||||
|
image: busybox:latest
|
||||||
|
- name: mintel/docker-alpine-bash-curl-jq
|
||||||
|
image: mintel/docker-alpine-bash-curl-jq:latest
|
||||||
|
artifacthub.io/license: Apache-2.0
|
||||||
|
artifacthub.io/links: |
|
||||||
|
- name: Documentation
|
||||||
|
url: https://docs.redpanda.com
|
||||||
|
- name: "Helm (>= 3.6.0)"
|
||||||
|
url: https://helm.sh/docs/intro/install/
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: Redpanda
|
||||||
|
catalog.cattle.io/kube-version: '>=1.21-0'
|
||||||
|
catalog.cattle.io/release-name: redpanda
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: v23.2.7
|
||||||
|
created: "2023-09-01T15:03:23.741247578Z"
|
||||||
|
dependencies:
|
||||||
|
- condition: console.enabled
|
||||||
|
name: console
|
||||||
|
repository: file://./charts/console
|
||||||
|
version: '>=0.5 <1.0'
|
||||||
|
- condition: connectors.enabled
|
||||||
|
name: connectors
|
||||||
|
repository: file://./charts/connectors
|
||||||
|
version: '>=0.1.2 <1.0'
|
||||||
|
description: Redpanda is the real-time engine for modern apps.
|
||||||
|
digest: 61dcd3ac0abe8dd9ab74e3bd57a84ac317bfd29fe27709b8850f60fa2194ec82
|
||||||
|
icon: https://images.ctfassets.net/paqvtpyf8rwu/3cYHw5UzhXCbKuR24GDFGO/73fb682e6157d11c10d5b2b5da1d5af0/skate-stand-panda.svg
|
||||||
|
kubeVersion: '>=1.21-0'
|
||||||
|
maintainers:
|
||||||
|
- name: redpanda-data
|
||||||
|
url: https://github.com/orgs/redpanda-data/people
|
||||||
|
name: redpanda
|
||||||
|
sources:
|
||||||
|
- https://github.com/redpanda-data/helm-charts
|
||||||
|
type: application
|
||||||
|
urls:
|
||||||
|
- assets/redpanda/redpanda-5.3.0.tgz
|
||||||
|
version: 5.3.0
|
||||||
- annotations:
|
- annotations:
|
||||||
artifacthub.io/images: |
|
artifacthub.io/images: |
|
||||||
- name: redpanda
|
- name: redpanda
|
||||||
|
@ -46455,6 +46606,48 @@ entries:
|
||||||
- assets/redpanda/redpanda-2.1.7.tgz
|
- assets/redpanda/redpanda-2.1.7.tgz
|
||||||
version: 2.1.7
|
version: 2.1.7
|
||||||
s3gw:
|
s3gw:
|
||||||
|
- annotations:
|
||||||
|
app.aquarist-labs.io/name: s3gw
|
||||||
|
artifacthub.io/category: storage
|
||||||
|
artifacthub.io/links: |
|
||||||
|
- name: homepage
|
||||||
|
url: https://s3gw.io/
|
||||||
|
- name: support
|
||||||
|
url: https://github.com/aquarist-labs/s3gw/issues
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: S3 Gateway
|
||||||
|
catalog.cattle.io/experimental: "true"
|
||||||
|
catalog.cattle.io/kube-version: '>=1.14'
|
||||||
|
catalog.cattle.io/namespace: s3gw
|
||||||
|
catalog.cattle.io/release-name: s3gw
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: latest
|
||||||
|
created: "2023-09-01T15:03:14.160391249Z"
|
||||||
|
description: 'Easy-to-use Open Source and Cloud Native S3 service for use on Rancher''s
|
||||||
|
Kubernetes. '
|
||||||
|
digest: a160a0c536d48ee0cd0eb81afc5c374958d3e85b87f40c019f060e2be7f43048
|
||||||
|
home: https://github.com/aquarist-labs/s3gw
|
||||||
|
icon: https://s3gw.io/img/logo-xl.png
|
||||||
|
keywords:
|
||||||
|
- storage
|
||||||
|
- s3
|
||||||
|
kubeVersion: '>=1.14'
|
||||||
|
maintainers:
|
||||||
|
- email: s3gw@suse.com
|
||||||
|
name: s3gw maintainers
|
||||||
|
url: https://github.com/orgs/aquarist-labs/projects/5
|
||||||
|
name: s3gw
|
||||||
|
sources:
|
||||||
|
- https://github.com/aquarist-labs/s3gw-charts
|
||||||
|
- https://github.com/aquarist-labs/s3gw
|
||||||
|
- https://github.com/aquarist-labs/ceph
|
||||||
|
- https://github.com/aquarist-labs/s3gw-ui
|
||||||
|
- https://github.com/aquarist-labs/s3gw-cosi-driver
|
||||||
|
- https://github.com/kubernetes-sigs/container-object-storage-interface-provisioner-sidecar
|
||||||
|
type: application
|
||||||
|
urls:
|
||||||
|
- assets/aquarist-labs/s3gw-0.20.0.tgz
|
||||||
|
version: 0.20.0
|
||||||
- annotations:
|
- annotations:
|
||||||
app.aquarist-labs.io/name: s3gw
|
app.aquarist-labs.io/name: s3gw
|
||||||
artifacthub.io/category: storage
|
artifacthub.io/category: storage
|
||||||
|
@ -48318,6 +48511,37 @@ entries:
|
||||||
- assets/bitnami/spark-6.3.8.tgz
|
- assets/bitnami/spark-6.3.8.tgz
|
||||||
version: 6.3.8
|
version: 6.3.8
|
||||||
speedscale-operator:
|
speedscale-operator:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: Speedscale Operator
|
||||||
|
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
||||||
|
catalog.cattle.io/release-name: speedscale-operator
|
||||||
|
apiVersion: v1
|
||||||
|
appVersion: 1.3.335
|
||||||
|
created: "2023-09-01T15:03:23.838581351Z"
|
||||||
|
description: Stress test your APIs with real world scenarios. Collect and replay
|
||||||
|
traffic without scripting.
|
||||||
|
digest: e8b2a8598ca6040fc58ce49429404a9b1c449f3f04cf14a0464f0d002fd06d02
|
||||||
|
home: https://speedscale.com
|
||||||
|
icon: https://raw.githubusercontent.com/speedscale/assets/main/logo/gold_logo_only.png
|
||||||
|
keywords:
|
||||||
|
- speedscale
|
||||||
|
- test
|
||||||
|
- testing
|
||||||
|
- regression
|
||||||
|
- reliability
|
||||||
|
- load
|
||||||
|
- replay
|
||||||
|
- network
|
||||||
|
- traffic
|
||||||
|
kubeVersion: '>= 1.17.0-0'
|
||||||
|
maintainers:
|
||||||
|
- email: support@speedscale.com
|
||||||
|
name: Speedscale Support
|
||||||
|
name: speedscale-operator
|
||||||
|
urls:
|
||||||
|
- assets/speedscale/speedscale-operator-1.3.29.tgz
|
||||||
|
version: 1.3.29
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: Speedscale Operator
|
catalog.cattle.io/display-name: Speedscale Operator
|
||||||
|
@ -54753,6 +54977,60 @@ entries:
|
||||||
- assets/hashicorp/vault-0.22.0.tgz
|
- assets/hashicorp/vault-0.22.0.tgz
|
||||||
version: 0.22.0
|
version: 0.22.0
|
||||||
wordpress:
|
wordpress:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: WordPress
|
||||||
|
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||||
|
catalog.cattle.io/release-name: wordpress
|
||||||
|
category: CMS
|
||||||
|
images: |
|
||||||
|
- name: apache-exporter
|
||||||
|
image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r32
|
||||||
|
- name: os-shell
|
||||||
|
image: docker.io/bitnami/os-shell:11-debian-11-r54
|
||||||
|
- name: wordpress
|
||||||
|
image: docker.io/bitnami/wordpress:6.3.1-debian-11-r2
|
||||||
|
licenses: Apache-2.0
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: 6.3.1
|
||||||
|
created: "2023-09-01T15:03:18.6233484Z"
|
||||||
|
dependencies:
|
||||||
|
- condition: memcached.enabled
|
||||||
|
name: memcached
|
||||||
|
repository: file://./charts/memcached
|
||||||
|
version: 6.x.x
|
||||||
|
- condition: mariadb.enabled
|
||||||
|
name: mariadb
|
||||||
|
repository: file://./charts/mariadb
|
||||||
|
version: 13.x.x
|
||||||
|
- name: common
|
||||||
|
repository: file://./charts/common
|
||||||
|
tags:
|
||||||
|
- bitnami-common
|
||||||
|
version: 2.x.x
|
||||||
|
description: WordPress is the world's most popular blogging and content management
|
||||||
|
platform. Powerful yet simple, everyone from students to global corporations
|
||||||
|
use it to build beautiful, functional websites.
|
||||||
|
digest: 67809561f34f3fa58fd45d6c0bb791d6c3a92bc590ee1d9c7c6e84ab6fa53731
|
||||||
|
home: https://bitnami.com
|
||||||
|
icon: https://s.w.org/style/images/about/WordPress-logotype-simplified.png
|
||||||
|
keywords:
|
||||||
|
- application
|
||||||
|
- blog
|
||||||
|
- cms
|
||||||
|
- http
|
||||||
|
- php
|
||||||
|
- web
|
||||||
|
- wordpress
|
||||||
|
maintainers:
|
||||||
|
- name: VMware, Inc.
|
||||||
|
url: https://github.com/bitnami/charts
|
||||||
|
name: wordpress
|
||||||
|
sources:
|
||||||
|
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
|
||||||
|
urls:
|
||||||
|
- assets/bitnami/wordpress-17.1.6.tgz
|
||||||
|
version: 17.1.6
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: WordPress
|
catalog.cattle.io/display-name: WordPress
|
||||||
|
|
Loading…
Reference in New Issue