From 95b164e466984ef426f0c90fad033cd7cc9c48ed Mon Sep 17 00:00:00 2001 From: actions Date: Thu, 16 Sep 2021 19:41:35 +0000 Subject: [PATCH] Merge pull request #147 from dereknola/rke2_sept_patches Update rke2-kube-proxy to new images for v1.19, v1.20, v1.21 --- ...-proxy-v1.19.15-rke2r1-build2021091601.tgz | Bin 0 -> 4335 bytes ...-proxy-v1.20.11-rke2r1-build2021091601.tgz | Bin 0 -> 4334 bytes ...e-proxy-v1.21.5-rke2r1-build2021091601.tgz | Bin 0 -> 4332 bytes .../Chart.yaml | 12 ++ .../templates/NOTES.txt | 2 + .../templates/_helpers.tpl | 21 +++ .../templates/config.yaml | 69 +++++++++ .../templates/daemonset.yaml | 78 ++++++++++ .../templates/rbac.yaml | 12 ++ .../templates/serviceaccount.yaml | 5 + .../values.yaml | 142 ++++++++++++++++++ .../Chart.yaml | 12 ++ .../templates/NOTES.txt | 2 + .../templates/_helpers.tpl | 21 +++ .../templates/config.yaml | 69 +++++++++ .../templates/daemonset.yaml | 78 ++++++++++ .../templates/rbac.yaml | 12 ++ .../templates/serviceaccount.yaml | 5 + .../values.yaml | 142 ++++++++++++++++++ .../v1.21.5-rke2r1-build2021091601/Chart.yaml | 12 ++ .../templates/NOTES.txt | 2 + .../templates/_helpers.tpl | 21 +++ .../templates/config.yaml | 69 +++++++++ .../templates/daemonset.yaml | 78 ++++++++++ .../templates/rbac.yaml | 12 ++ .../templates/serviceaccount.yaml | 5 + .../values.yaml | 142 ++++++++++++++++++ index.yaml | 48 ++++++ 28 files changed, 1071 insertions(+) create mode 100755 assets/rke2-kube-proxy-1.19/rke2-kube-proxy-v1.19.15-rke2r1-build2021091601.tgz create mode 100755 assets/rke2-kube-proxy-1.20/rke2-kube-proxy-v1.20.11-rke2r1-build2021091601.tgz create mode 100755 assets/rke2-kube-proxy-1.21/rke2-kube-proxy-v1.21.5-rke2r1-build2021091601.tgz create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/Chart.yaml create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/NOTES.txt create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/_helpers.tpl create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/config.yaml create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/daemonset.yaml create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/rbac.yaml create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/serviceaccount.yaml create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/values.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/Chart.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/NOTES.txt create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/_helpers.tpl create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/config.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/daemonset.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/rbac.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/serviceaccount.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/values.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/Chart.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/NOTES.txt create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/_helpers.tpl create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/config.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/daemonset.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/rbac.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/serviceaccount.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/values.yaml diff --git a/assets/rke2-kube-proxy-1.19/rke2-kube-proxy-v1.19.15-rke2r1-build2021091601.tgz b/assets/rke2-kube-proxy-1.19/rke2-kube-proxy-v1.19.15-rke2r1-build2021091601.tgz new file mode 100755 index 0000000000000000000000000000000000000000..2e976120b0350db676fddaa1deff620f059b0c64 GIT binary patch literal 4335 zcmVDc zVQyr3R8em|NM&qo0PH+#ZyPtZ{XDw4qu^h?B44-l z{eQ(of#%N*0C)TU=xF@psPF&Bqw$0Pe~lJ~VGuk9p0PQ?Oljx1-p5>D8~|v{mEl(D zbqtkjEtpPGV(M&1OSEVL0L$k0I2bW|w?Md<083Mi#yGBaf#A4;LA^o^R{2k$Bm|FP z-=L+wywgGjYTb)AOb%smOf{K$;9)j2&P;* zB1?m^iyP0zyWv@p zfh@8qYFfuPXYWV|Ni$c{>CeGKjvCGyqUPzHZt+{Q3k3~4op@Z%z zUZkKf?oWyq6APqEQMpavJAb4;0{3=#2BbnYgC(w?xoinJxKX zufp`15HWnB05mY=wwmPZI%9eXCTEGWVD~L&$r3Gv!w&^_%5q|p@ic*vzLn1DGsv&Q zLpU1!7Ij2>?ws=22}ib=mGQ`#!HNlzV^POwB329R(`3RVajPRUtsBZTS6o_eYsM?i z&|ZM#*vDud!QP44JA}PaM*kl##^Y?Sia+h(-3V63>+OQ|gkria(H#tTrV#+slH!P> z3DpMPjLzJ0v(RA9G^4~RxN%EHNpa7>^@1mhQd=v(v>Y{xbj6_lzx_Ln5M7{fId4+ zs%IUYb0w{-(#ek1%tcx>)-<(yg&leH65-uCN3Vzfom_ps93OHM!->P6ltnZ_`kK~N z&mNr>cA+%?dzBYwN@xD_zIA5rGL$PB9e{Dw%ybQ{(V1X#r{9J{41*QZ1Hq@Avy}mx zqqKv1%NR8nuEyG^qz#Rx2Bv7Q5hVyUhnXnM0!<*){1ttC+QadgU-NS6eltNfNg};bDNdBO#%))B_P7~a zQ+Qi3!BbM&RH$TWN*5hP%wU(fA;88cuP>3Q^6cBijD2za2n^OxFBK z9li{&MT-KdQlxb`tGeQ9^_0p&L)({-rN5U8-YqUE(IjY0R8M4Q9Tbj+!{H&&|9=aV z%C3m;S^9en;nSy2+h+tQ>)LF_1a(P%*(FjvC zHe@Ttg-flT-F{MNjnayBT`(Oq6gtJ7M{t2dxU+%&&U2xz4`EtZhi2BsVzy^IttGjv zAR%jV<*}?!v|O5kYHJGQhrZ@#;+m}u%$N`crnLDj&kt&yc!^vILYuVUFSi`#W|N`)FH~0{vHC=+oS?=c%`9+_-{3v8OnNGQccfSctC#OHh85MBubhh!<2%H z(y0#(%>fpfcDYY*E_5-2{X%-boJ@H9nPMKdSTTiTP@Hl2)1rE6;3IKSj_J}bl_ zD7!#ihY^yKiq)y}S9OhPR7&L&4q^W#W4|l?*XS>f?q3gq0!0jaqiA%x=L17t=v*1} zF`b(ha>kbKWXsS_h^DisjwMu1swgD)p;0PJ%I4lmCEi%jD3BSXNmI;CQ%<>#iE8?X zL|8L7Ay=eL(FLSJ=b9T#eR*mZxOPUFqt2N0&Y>|=E5GXgILveMwG-J#6p+6E=G6V# zvwNjG=75R|??6x=p4>&T_4}^-EO6`|iPA zX*=*O6@BVjqJnY^7oSYs%-2Z%)_Cr%AEf^K%=#SHw5ERrOoa{fm z?e_oo3luqO6WRO=uY&LK|Iz5=NzeaJPmWI>{QqmT+uM-xHJ1pFe5!q4rtkN*s0;WX|tXX4(6c z>$?Oez!%K27hG=OQ3t=|H;u&zy3QtIvG90|F6-)FbsNc04aRZ&Z{&4`V+%H!T`V> zXxE@kbSWX1-VNZ*ToUQ@S$^M4JTMg}`0xKja2J zeuPq^t%o_cw~#0%&?MMT1ueK1;ij*@P#Z65+5+_kTS(1o8*1(6FI{{O7c~IQ^xb2W z?a*8{U^dC?Cnoht$5ym0kef=kN#1%-axcM6*gnaP7bY!Iy|F&3KY^aqN6Br}-dKgQ z?RiEEYje2IbMqZV8@)H!M{Ym3@ax`r1<|5ZK}H>r*5Y>`Dcp_uoVT2pTy3@mx_x)u zF|r-TeIMrSt*dzI@8%vdW`jocrob(AdE0;S;?nf+S0-wYZklX=#;ZRx+uc|jGp#T1 zHz+iZ05+s7ujnr)Td=C3PtfLSnt`hL3O;7#`?@f}!w9c<^fjoDqC{s^1q zK(_&FAM*CuY=iHzS#p`i?zYuE@;`4M={kUISCTC@o5TIp&-#JS*A&^7m?z77$>tgm zWFdqb>s;5hsI~elGRXEf=yAB6JvQEw_gcXzYp2ya<>^} zzdu)a*l2!Y+r9rw8D>fv{PJIe-LwBY9zN;+{_Dx`^x^#PtF-opj^()-tVX4OzHsY* zg?6WZF26J3m-wj3F>zOX?j?cJo@&NyviPyZW*4K%RO2cS)k0De9SXZ>08~Phdz1Qy zYQ87*4?1Pq5DH;X7(H-rR0dNn2R(uwCJg-s=vjR(*mAPg&botAmC#}JjOp38`)}U9 zc=`U#+3S}FH7LqeTO6)uSdGV4MPZpy8QP|0$GbU7Gy2D>z9 z&Y7b6-fW-?J`Fd=wu+WYQ?2K@KY4h?wW%gc4)VrV7#%D!#;Z;gf%1^WzY&bM8Yn}8 z$l@lbS6Mj&5X=}~uXu9}iCUOwZh68)Pzg(U!d9}Kxo1iJJ&&hST6BIB&5(S2GRw1v)zg;>WoWQnSZZYf_@ux<)2)}a5Svolt5p=x5C^KN#o_5&(c&$ zLu*s(QssoBbPO+VxUr^2+%e!?rNw}j&Y4Qv(f*jZTX*(W7neKjKP*qEUb8&@6erv< zaF^_NxsDg}6&LtcpSveIJx*J^>P}wUU2KOox;|IrDYJNGHM2Nhd)itF!R7oXH`F?f z`$^W%17q-M!1K6lBRo{t{}F9>{jaAi`Ez~;{`vp@!|8A|e5n7wMr+r6ZpAylAZV_1 zs!hAk$(Kstb1qXZ=bha_6NqD%M9bed1zHI#3r?2v@3kuOJJ2en}*_&;Lh9J^vpMN27;-|K+Q+t?ts>2yS}# dgC9M#hxX7O+P{1IzW@LL|NkIxLNNeN006EhZ(INX literal 0 HcmV?d00001 diff --git a/assets/rke2-kube-proxy-1.20/rke2-kube-proxy-v1.20.11-rke2r1-build2021091601.tgz b/assets/rke2-kube-proxy-1.20/rke2-kube-proxy-v1.20.11-rke2r1-build2021091601.tgz new file mode 100755 index 0000000000000000000000000000000000000000..3e2c20bb643ce5e7048996b7e3658693bf753823 GIT binary patch literal 4334 zcmVDc zVQyr3R8em|NM&qo0PH+#ZyPtZ{XD64S=Z-%4e(ed#&F#K{N>~4jzOn)={ zY+n7z{hKtF^IuRKu4D|WQNZ%N^)(s~qtPfN8_}a6MU!ZrTQ_(ijb%c>kHr*WLZ%Z1 zOI%+ootiiZp)si-V_aIsC2BW<8RH^`gbdC6k7hDippFui1pty|7{jISgP+*c1iq_h zrh!p~PSDX?Seu)8Fqm_@D5gYcP!b(DEYB!d?U+_LEx1U>!|`bN{pfT!3jWnA@^xF^ z|5r>DXufO!xZD3nN8=|)eg8imjUW8~YqT&7gWxgnjLi{dN;}8(KIZ!306=4|47WJ@6R%6|eSA$Sb? z1}*jN4I}s8p2MO5bTL^S1D6){j3sD*$rSeDxC3z70yqe!T&8E9cMK&x66<0HRu>3~ zKqiYEcy8HLlq7k+GN6mT%lg^q(&ok&9uru71r<+!7jKd83m8wnhOC_gp8T@ z1!|UJ>ZI(@b@)ys;vfNUENaOF5%@{5^cfROCZ1PCFy$H(iz%VdEHs)N6U$c}$+$EY zSsIjGq=Xno!{~TSsvR_oo-@0sNLBM^luuyB1xA7I^XmMYx&}3~Elrh>Gz}uaa$edB zsRCyj%>vU1UKPfY>~oEb1hfk#VOSBrTFYdDnyWO1(MdKm0S!p2S+XQse+;kK4bO@U zWRXo#(>lIBdrLw{nz@ore-0jU)Nnre84{%t_J=eekgd?kCwRs!Fcb39g65LIYHnf1 zbi;h+EX=IX_}U(YVyg0ajZ zMTsPT>k-d|GWaXwHipq+NUK4VFH(UW(rCyNIj!#oo3`4$upJIB8q^rZ$DT>>7+xvz zA_awUe^RuVSRh@B%54JQ`4jaKxVOtQAQh?^EOGtRWlP8z*M{uOg0GRL2s321&hsgS zn1NI>bhHnB9CAxU@y=MyWXiR)du#Rz*3R3Wtoy<4H7ZM^uRfM z6{gRGh~Xmzpn)m3)g))v8PiKJIZK=cyKgy5mS`y)zAv~_mJ^$drwNSot#nSGL4F$^ z!qMpWs3Y1l=ak1zII_j8j7QE4R!oo_i#kRVv07lCCKD!!TOFBc-B6~v;?jCsGhT6q z_5viwK1TBh_D;;+A?%GZ`u}(_9%p-1{Ama8MzAtoZx^g56w_^q?qIkxjR2UI6h{cdh&Qo1-{@5j2eeLCOEKRb&v=F4mb&h^^zTC?w4s+wcNVgTB zpVbRVi{~6av2b=dfhkpp*19;L^LJ%ZwF*W~X6j>7szQ3Npj73t&vgC?Mzi{78cZcb zJH>Izd2W$=3GNX32`;*4C7R^dnsA%fHa5U!B(%l^`O0Y*US7N|1InM0Va8=8#%?Ko zem<#!)~7Qm(t4sn5F~=5wCDAdVkn#A{;bf(Rtf)l!KuPvVo5V~skPb0G=*gV^x0uj zJ?rS4D`{PoPIjzjF4Cg0rm5X4?8u{+2yfRpdOiH_%tT=pXab?;FX`h;r&5`$V>mHEP}M?JAylTn z9~(WLO)jeXXJ3^Wo+8*9e0j!YYbFPQpXEmuSs7CBFdw-qr6T9}`;RQJdVn8QV3p!@ z3aruiiQ_)`Hxp!&B+_e@;zVg{+;;UBkDIYI zg|`(GJSC+~g-VvDbkR{Xj*gD-qV50o`vGLgWX+${ z;mhz^v?!1&MOv4$sw=KmPpK?4w0#L#`bW9o-QtoGO@hWm^+a~oLE&gP93BGw|Mx(t z?1~7VrGLZ_e*gXV?K1+Db!|4|g62b&;5AO0RU{i3q&O|+gPg!%!DK2ZF4RbI5I7Ni zVEEN7PAe^Xjl{557}T!N+k<^2Qq%{aH0)Ki%^vK}oKaWZE3+5XW#v>bxjZbZXoM*m z8?qJS!lhQvZa*osMrp;mE|?A)3Z3H4Be=jJ+}S{X=ebbVhcGRyLo;h*G21hq){tdJVj0e-DA`ZBhX_ywXrZ{I{CT3}rnosix;EJRm=C8@$pB5+zNMVM@V8 z>C}gY<^YRKyWA%@7rL0iej&ZzaZ=gvkT?#*;Q>uXmO@s?E}F?yWnvABjmwS=MqOZuXZN}#3?t8HM3xdoM@tcsxV$uM(u(AZG9N%?hq#p#!p<+r?qjywrC(VRB6l^L{32ufe?3vQdclrkhbXSvqg`X#F3efQw5 zv>oTZwANI!G)Jip``jVCRdFyEYRW|Hif4)-&ppXYoO5IKI)+D&{-0gc{F7S${>NgL z3ue&_UcY(!;wrK?_Op51cmF#)9`^2kPEL;>?ti{Y`?0B$7K{pW^v7vT2ny;CPWB(( zcKiRk1&SQCiERFvSHbuA|7djbr04&qC&wob{{J=F?QKZ;noER7KGnV})Au`FCfi34 ze)td&AfG|xH&KyK(9zcHT*K#7O3dKVf0@CfPs2oEu>SI>kpN}7^>Z}^GUs<@cInpU2|6P=jFfSVCK`OwoNVl!?qTKJE#1w zHus0tYrEsWU(GM^66l`ze{yuxum4VuPDT&$|7)}`41?YqKnkC<^C}I1{>1Q)FaU4| z+BIksT}sI1cP8R$uo}6m?vX?2Jhr*LtpiA_AN~RF3uO^Ld~hfm2l;_N$7e}`xow@N zcPVa!q)qrfCxEFx+`o&A18Fdl)_MM&crCz9zU`y++gpFoltW9AEhLHwGzs=oK?|-$xasRJ)W(aNwm`kX7E<%thFbgiOBdh6MGZhRefJn; zJ2aOKm`(EfiAjCZu@!9#*2%PoO9DQF0r#H&&r+ zd!Et4+8pll+nfi5ySayq*`QIqDR4_&-u7QSzcfAkm5JJ;nOzR8$ z4GPU8fDI|jEBedH7OZOMBec2Nrpc{3uu1;1zMt+mc+yKQxk{LkA*x(;C5m1K*}=5T-Yvwq<7HAS{1=E?G2vbhEX zSqS0AI@fhAYOVf?OmmmA$+jNr^SKsOToY|SXf?Q z!naFYAHui(8Z>@dlWQY&R+cCUTvp_LLvhObm1t!b}7Mm=6PTb8>; zd8afT8XXn(PP9pJ{&aVPEJ2o!@0uZvEPW%zx;K-q%({?+n{q26RI=P4T@Hqw!7dG& zbEc@iHyh}JPs7czt)ivURO@-}Paa-!ZK}zVgS_??MhALe zpA4NP2`O}ofph_0Z?__gI^)t+=09kbpx*{v`6rh#91SZtCD0e}tuVJl(s()NvouxG z(Aw0xR5{@&9m9(oZmg*hcMNz}X)&OsbEeXEv_EI=)}6i8#pO=>56cs(S1gY|#tC-} z+$H;6uH(gg$pyaA=kAG4kJA>fx|7#-7u%tYuFn;D$}C=4%`DE>p0-v(a5?|k4Yf|= zewOv~z!-cQ@H{Tt2oDwZe?;3||LZABzRd5yKmFf-I313L5B2}oXziNMt$61b1kIIB zwQ2V``BDjd#%0Royt6xK0&(n;X!-l5Kr4Y|!O3#|gH}a;2fLs;c4~2}iTfPgC2xx9 zADCGG4^KGEt4_jvI62tacKd%>b1<*M&xr*0`Tyvs=l|p3X!P*!zkHRp)m?fU!A%c; c@S}(J&>q@D`*&~u7XSeN|7b_UAplMQ021_OlmGw# literal 0 HcmV?d00001 diff --git a/assets/rke2-kube-proxy-1.21/rke2-kube-proxy-v1.21.5-rke2r1-build2021091601.tgz b/assets/rke2-kube-proxy-1.21/rke2-kube-proxy-v1.21.5-rke2r1-build2021091601.tgz new file mode 100755 index 0000000000000000000000000000000000000000..cdba48cc00cc9dfc800635a2d20dd4890c056d75 GIT binary patch literal 4332 zcmVDc zVQyr3R8em|NM&qo0PH+#ZyPtZ{XDcF#PjG*xd?anf_|{ z*}VFb`!{JU=Rct~T*(+#qk!dk>uWR~MJFMdh#mzgnnd&5y0HssEE590FQy0+vYaSb z;`&eug!9_YAjz`09N2kM4@ULEvFWvh7 zzha_5^XCSDyZwK3G=4Vj`~UH1^yvRzqJ?1?1W$oyY>qHf+Ig;bGS?Re02*^;xK(-` zL*-iwrc;!dI@{3_Et&wpviaQ}M!eoH5H2Rb(o~}{j;UQBIHq7wuTXs9e~poz(FwOGClLWV<_p7SQj&}x1N5`3iXO7H5#dFrd0;2u!g4ycEL@_D0m9jTnLyVWXyal zP_qzz>S0FPLC5@w_U6Dc6`-ObLZ%q0!`+Sib5=#-*{y z(xB`jCB!fqM#p1P?VwrooY_T1s+vEed;&8rFbaI1SLff_wX{v;zX%GRH^U_vG z6*$vq7MMoxrZARdpKD|!pj|Kt!;1LTS|$_JT%|FLPO_m1Xh2%ck|mk?Q+UH}cvfT} zi)@OT*75DxdlEv@%$0QdbMTO(hV#jfkSL9?KcoSHY=urf!82}wnUI$jG?xTca|<&r z5264dV>c7j=SpJ?N8@Lw-*_>&?1@oh0!phn`h^riCCuU>Xq+>h3i7BnaG0^1Fh?DF zA<2)nk3HWlzZa9s7)D2<;j^(5khEfXhN`g6*WRB`I$A0X|NMt{SFb+&e0K33jAa%n zNF@1tk9aPW!JiqoF^m>NS`DInkqYdPMnj&+X?-`?wAJo~?QnS2pvEvh_Dq7O@J5jr zDJYEllcL4M0_jpzZWH*gr@xp%VTia(M6_^q^mh^-!WG#&DWelqSA1KnHn8smmWrG$%ajyrkccU!2hQQE zFnuOO3=b552BzFrlbl^=OfSLYEO8d>zU3@gqNQ;7vEWWwPHZxsCNR>s(m8zw`DJ(r zN26b(j%Y8OQyx3v$QH9Q9yv2uF+p-H>KIMLYJq*4Oqe8Yb!4V>Lz(7^OY3dTc*Pmo z3y>W97|kQtJ288Qus6!+|Kr7Yob6TdryaZ-!OD2OU9g@|Ot&SvgW=9J0$^HF98ol( z+Q6I9nOkla8qAqylsE-9ZpkPq?isjV@MKYHYvq@gqXx53g-D&fSXCqoxOOE1l^3*# zMGhB}pRW8INCdn|M3Le-Pj$)pp-Z&-(#zvmnq+}#AxMqu9R2KkxtCEK=Ei}MZYw}P zt5=d1&pCc#;p}n(Q>qZHb#XxFAIhX^6^xwB)W@V$h4fxQsmf!Y>HK#X&FY_NFqIJP z6vrv&xkc_JxI^eCxagjhXp&!R!fjsL*Z`Z6&>9ouE2mv}eet#oD1S(X8JCq9yQTQ? z<)jK)zn@8w))NhaAQ2p;J+G$}L)jen7lk&qO8D0cP89|dOPZ-mt<5f`DJ%n^&kmF7 zSx4twN$aX~vST%Kkrs_LP3>M`M;^UIc)!lk>*0SVSHEA5kGYBA#NkiMBAOt5P3x*> zkIo9aP@4a}%8N6lGyi$tIz=OcZ8;CJ<`=nm)dEDwWAPh7%J6RV`E%LS_2< zzR}a!? ztkL+H<3934%No^}N=8s&qGnzbRr;Yl9H03$FQ@J|6J(Pl(p#0{L}_c>cJ(KZo3S;8 zw-pmSC8bS;N|vT{(NQ#xj-ugUe0*4bJ{}y64%Y0c6Nz&7aia z%kWyXD3B^eT9>n`E3Q^gsVp?KeF<6mTe;xf;*t_gg2qJkM0VCe;b=G<9s>RU*FdT4 ziU^;jzr_%K`|Y>wGXj)#Z8qbA=0la>HBOsVBpVr|I4$OboWNkgWGW~w)JSm{YeR9_-JYQCHn7vlrE6AU|*$ywVF2B~6iGO2I|x z)Q5)V0EeTtGy2dmrrSb`fu>X>=-<1Aq^cP3>uZKW^B8I(DG&*Z!BmO$PCh?Ddwgrr(DNGHT^>( zteKmTE7GRu0#c!K%?+l$Jhcm4JEP1|XH0tM(3q)}Uv+;R<~jM=iR>c^NZ)^R>VD(d zy;i!qQK`6ez}x!{TO zaWV{Nn<06~^V)NQRsjW$JPA0_oHn+V8MI0WN?#ufZkxN5G9)@@xz^nJC92|m_u#Iy z9p}EZ)>N}JN2w0`+#$SIaWEHZ%0%pnXNn*%J;_U)b7S>7h9^({-`&*wb6WrY$6}TX zX3-4ZzI*@bDzZ2Bvw7Ti|2sVH-~XPRKHmR+nf85CC@mOO=IGDUm=F}zAHD29yzTb? z4+|7IY7^P~Gp~a0@&D22A8l_sg{_*lm9YDJHH6v&)Eq|CApDc5%i zPJl0&WiPqjBJPH?+rYarZapD+xZw36%7^B#;*ZOJ$H~m^pV~IH^iSJb4DOurzuMd% zTd(bo|9&<9jF&+7#Q&3{qkjE&dUW#m{^yIdFbsp<8$b%5wDl?tfd0hrk1zmmC)zb= z6J1KkK7Dd18z=dJKgefEg1K!SsCOxD zgrrUQJ|}>wKi$8Jj00&flGcI#op>$4O}_23_1jy2(vx`i)6_)Ug$93*@HKZIZVhl-x^j6ShxsW`o&^;vQowKrCwYk|d+REm`n$P@jM<=3Jt}ZZU0(NJyu36${FRB?qnjq%pYiGs&2~4|#!TxQ{0$1t zD}W6t%RBnZ$rh|?=mFYXZPVmd9oQs)U0+al9K7k?B)$WyuY>LUwlTYl(;s2eoai=S z?Ni=9n{Du2HcKwk*j=}}SN`YiGhGL;?M|}AW^=f|`dL5l`I;iz67ytvG1=S$f-Hn^ zW1aiD7PVG?MW(q-*<@Rf^?BcQu-_(g2V9?Ik>(evz-_D3T9_VE=c!=e7c4AqFyZSZ zt`FgBe-9czugSHMIx9^G@adD|U80r4)vm4ldd;Q3zN>?h%P}vnE@PN6VX*9$Xs?xC zzI8v_c=Dw3SoeF4pLp*2yiIvidc*P{L(8h7Q?MzDa$+pcIWhlUG6%g?Dyvi zj~mSgw%z-`lwqc%!O#CS*ggBdrQA=6gc_ zqEn^~p%4az(F6BLWiaJ(&?D$!!q9Jkp4aDsEhlU3tUD-G2_07Nn4W*V|MuO>S0CP< zy?J#|gQ8ru#qkQS;p!3acdoCs%Hmchz>K3vFLBoG?QZT@qu!uHnlQVFoysE0#T4ah zF#mHQN+i|7+;O5D!KY8{VuWy`=66Pvk~W4dn>V?uRI|BG-Jy1|C=XfuBf*HPfifhBEN+5& zm6bC9!Hn_siZ|DgsD+8^0!N5cwE3G@YgE6gpCG+xg6EKQX(v^KRa zRZcic$MEWg8*6IB9RuD~S`29EoT;=O?T?web!TsNakNXnZ+xsnZ^0q)7DA|F6TeGq1I{KkFtIr z7=up(p2uYy;jzO0k7&E=e?4W%pYuEL`~Urie*J$s91S1q|1Z(nHJ@AY&QA!ME1hc7 z?sM{`68M74l*@T%chCgl*d@{O2Tp-j0?UGv<@`IXiu?|CL3QlZ;#L#)Il4>U6w}`@ zvHoA4aF|z}g!y=Ku(R#<|FY&_UWK0%3GVa%(NWL;$HUR+_|gBrMBC~vy^Y|ehd=t! aV|#3m?Xms4xBm+O0RR8il(3rsP5=N4ERmN0 literal 0 HcmV?d00001 diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/Chart.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/Chart.yaml new file mode 100755 index 0000000..f8a5b0c --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/Chart.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +appVersion: v1.19.15-rke2r1 +description: Install Kube Proxy. +keywords: +- kube-proxy +maintainers: +- email: charts@rancher.com + name: Rancher Labs +name: rke2-kube-proxy +sources: +- https://github.com/rancher/rke2-charts +version: v1.19.15-rke2r1-build2021091601 diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/NOTES.txt b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/NOTES.txt new file mode 100755 index 0000000..2da0e24 --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/NOTES.txt @@ -0,0 +1,2 @@ +Kube-proxy has been installed. + diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/_helpers.tpl b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/_helpers.tpl new file mode 100755 index 0000000..cb64d1f --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/_helpers.tpl @@ -0,0 +1,21 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} +{{- define "rke2_data_dir" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s" .Values.global.rke2DataDir -}} +{{- else -}} +{{- "/var/lib/rancher/rke2" -}} +{{- end -}} +{{- end -}} +{{- define "kubeproxy_kubeconfig" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s/agent/kubeproxy.kubeconfig" .Values.global.rke2DataDir -}} +{{- else -}} +{{- printf "%s" .Values.clientConnection.kubeconfig -}} +{{- end -}} +{{- end -}} diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/config.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/config.yaml new file mode 100755 index 0000000..f8bb5cc --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/config.yaml @@ -0,0 +1,69 @@ +--- +apiVersion: v1 +data: + config.conf: |- + apiVersion: kubeproxy.config.k8s.io/v1alpha1 + bindAddress: {{ .Values.bindAddress | quote }} + clientConnection: + acceptContentTypes: {{ .Values.clientConnection.acceptContentTypes | quote }} + burst: {{ .Values.clientConnection.burst }} + contentType: {{ .Values.clientConnection.contentType | quote }} + kubeconfig: {{ include "kubeproxy_kubeconfig" . | quote }} + qps: {{ .Values.clientConnection.qps }} + clusterCIDR: {{ coalesce .Values.global.clusterCIDR .Values.clusterCIDR | quote }} + configSyncPeriod: {{ .Values.configSyncPeriod }} + conntrack: + maxPerCore: {{ .Values.conntrack.maxPerCore }} + min: {{ .Values.conntrack.min }} + tcpCloseWaitTimeout: {{ .Values.conntrack.tcpCloseWaitTimeout | quote }} + tcpEstablishedTimeout: {{ .Values.conntrack.tcpEstablishedTimeout | quote }} + detectLocalMode: {{ .Values.detectLocalMode | quote }} + enableProfiling: {{ .Values.enableProfiling }} + healthzBindAddress: {{ .Values.healthzBindAddress | quote }} + hostnameOverride: {{ .Values.hostnameOverride | quote }} + iptables: + masqueradeAll: {{ .Values.iptables.masqueradeAll }} + masqueradeBit: {{ .Values.iptables.masqueradeBit }} + {{ if .Values.iptables.minSyncPeriod }} + minSyncPeriod: {{ .Values.iptables.minSyncPeriod }} + {{ end }} + syncPeriod: {{ .Values.iptables.syncPeriod }} + ipvs: + excludeCIDRs: {{ .Values.ipvs.excludeCIDRs | quote }} + {{ if .Values.ipvs.minSyncPeriod }} + minSyncPeriod: {{ .Values.ipvs.minSyncPeriod }} + {{ end }} + scheduler: {{ .Values.ipvs.scheduler | quote }} + strictARP: {{ .Values.ipvs.strictARP }} + syncPeriod: {{ .Values.ipvs.syncPeriod }} + {{ if .Values.ipvs.tcpFinTimeout }} + tcpFinTimeout: {{ .Values.ipvs.tcpFinTimeout }} + {{ end }} + {{ if .Values.ipvs.tcpTimeout }} + tcpTimeout: {{ .Values.ipvs.tcpTimeout }} + {{ end }} + {{ if .Values.ipvs.udpTimeout }} + udpTimeout: {{ .Values.ipvs.udpTimeout }} + {{ end }} + kind: KubeProxyConfiguration + metricsBindAddress: {{ .Values.metricsBindAddress | quote }} + mode: {{ .Values.proxy.mode | quote }} + nodePortAddresses: null + oomScoreAdj: {{ .Values.oomScoreAdj }} + portRange: {{ .Values.proxy.portRange | quote }} + showHiddenMetricsForVersion: {{ .Values.showHiddenMetricsForVersion | quote }} + udpIdleTimeout: {{ .Values.udpTimeout | quote }} + featureGates: + {{- range $key, $value := .Values.featureGates }} + {{ $key }}: {{ $value }} + {{- end }} + winkernel: + enableDSR: false + networkName: "" + sourceVip: "" +kind: ConfigMap +metadata: + labels: + app: kube-proxy + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/daemonset.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/daemonset.yaml new file mode 100755 index 0000000..1267df8 --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/daemonset.yaml @@ -0,0 +1,78 @@ +apiVersion: apps/v1 +kind: DaemonSet +metadata: + labels: + k8s-app: kube-proxy + name: kube-proxy + namespace: kube-system +spec: + selector: + matchLabels: + k8s-app: kube-proxy + template: + metadata: + labels: + k8s-app: kube-proxy + spec: + containers: + - command: + - /usr/local/bin/kube-proxy + - --config=/var/lib/kube-proxy/config.conf + - --hostname-override=$(NODE_NAME) + env: + - name: NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: {{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} + imagePullPolicy: IfNotPresent + name: kube-proxy + securityContext: + privileged: true + volumeMounts: + - mountPath: /var/lib/kube-proxy + name: kube-proxy + - mountPath: {{ template "rke2_data_dir" . }}/agent + name: rke2config + readOnly: true + - mountPath: /run/xtables.lock + name: xtables-lock + - mountPath: /lib/modules + name: lib-modules + readOnly: true + dnsPolicy: ClusterFirst + hostNetwork: true + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: kube-proxy + serviceAccountName: kube-proxy + terminationGracePeriodSeconds: 30 + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - operator: Exists + volumes: + - hostPath: + path: {{ template "rke2_data_dir" . }}/agent + type: "" + name: rke2config + - configMap: + name: kube-proxy + name: kube-proxy + - hostPath: + path: /run/xtables.lock + type: FileOrCreate + name: xtables-lock + - hostPath: + path: /lib/modules + type: "" + name: lib-modules + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/rbac.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/rbac.yaml new file mode 100755 index 0000000..d98f84c --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/rbac.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: rke2:node-proxier +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:node-proxier +subjects: +- kind: ServiceAccount + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/serviceaccount.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/serviceaccount.yaml new file mode 100755 index 0000000..59408a2 --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +kind: ServiceAccount +apiVersion: v1 +metadata: + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/values.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/values.yaml new file mode 100755 index 0000000..a2ad527 --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.15-rke2r1-build2021091601/values.yaml @@ -0,0 +1,142 @@ +--- + +# image for kubeproxy +image: + repository: rancher/hardened-kubernetes + tag: v1.19.15-rke2r1-build20210916 + +# The IP address for the proxy server to serve on +# (set to '0.0.0.0' for all IPv4 interfaces and '::' for all IPv6 interfaces) +bindAddress: 0.0.0.0 + +# If true cleanup iptables and ipvs rules and exit. +cleanup: + +# The CIDR range of pods in the cluster. +# When configured, traffic sent to a Service cluster IP from outside this range +# will be masqueraded and traffic sent from pods to an external +# LoadBalancer IP will be directed to the respective cluster IP instead +clusterCIDR: 10.42.0.0/16 + +# The path to the configuration file. +config: + +# How often configuration from the apiserver is refreshed. Must be greater than 0. +configSyncPeriod: 15m0s + +conntrack: + # Maximum number of NAT connections to track per CPU core (0 to leave the limit as-is and ignore conntrack-min). + maxPerCore: 32768 + # Minimum number of conntrack entries to allocate, regardless of conntrack-max-per-core (set conntrack-max-per-core=0 to leave the limit as-is). + min: 131072 + # NAT timeout for TCP connections in the CLOSE_WAIT state + tcpTimeoutCloseWait: 1h0m0s + # Idle timeout for established TCP connections (0 to leave as-is) + tcpTimeoutEstablished: 24h0m0s + +# Mode to use to detect local traffic +detectLocalMode: + +# A set of key=value pairs that describe feature gates for alpha/experimental features: +featureGates: + +# The IP address with port for the health check server to serve on +# (set to '0.0.0.0:10256' for all IPv4 interfaces and '[::]:10256' for all IPv6 interfaces). Set empty to disable. +healthzBindAddress: 0.0.0.0:10256 + +# help for kube-proxy +help: + +# If non-empty, will use this string as identification instead of the actual hostname. +hostnameOverride: + +iptables: + # If using the pure iptables proxy, SNAT all traffic sent via Service cluster IPs (this not commonly needed) + masqueradeAll: + # If using the pure iptables proxy, the bit of the fwmark space to mark packets requiring SNAT with. Must be within the range [0, 31]. + masqueradeBit: 14 + # The minimum interval of how often the iptables rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The maximum interval of how often iptables rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + +ipvs: + # A comma-separated list of CIDR's which the ipvs proxier should not touch when cleaning up IPVS rules. + excludeCidrs: + # The minimum interval of how often the ipvs rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The ipvs scheduler type when proxy mode is ipvs + scheduler: + # Enable strict ARP by setting arp_ignore to 1 and arp_announce to 2 + strictArp: + # The maximum interval of how often ipvs rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + # The timeout for idle IPVS TCP connections, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpTimeout: + # The timeout for IPVS TCP connections after receiving a FIN packet, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpfinTimeout: + # The timeout for IPVS UDP packets, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + udpTimeout: + + +clientConnection: + # Burst to use while talking with kubernetes apiserver + apiBurst: 10 + # Content type of requests sent to apiserver. + apiContentType: + # QPS to use while talking with kubernetes apiserver + qps: 5 + # Path to kubeconfig file with authorization information (the master location is set by the master flag). + kubeconfig: /var/lib/rancher/rke2/agent/kubeproxy.kubeconfig + +# Maximum number of seconds between log flushes +logFlushFrequency: 5s + + + +# The address of the Kubernetes API server (overrides any value in kubeconfig) +master: + +# The IP address with port for the metrics server to serve on +# (set to '0.0.0.0:10249' for all IPv4 interfaces and '[::]:10249' for all IPv6 interfaces). Set empty to disable. +metricsBindAddress: 127.0.0.1:10249 + +# A string slice of values which specify the addresses to use for NodePorts. +# Values may be valid IP blocks (e.g. 1.2.3.0/24, 1.2.3.4/32). The default empty string slice ([]) means to use all local addresses. +nodeportAddresses: + +# The oom-score-adj value for kube-proxy process. Values must be within the range [-1000, 1000] +oomScoreAdj: -999 + +# If true enables profiling via web interface on /debug/pprof handler. +profiling: + +proxy: + # Which proxy mode to use: 'userspace' (older) or 'iptables' (faster) or 'ipvs'. + # If blank, use the best-available proxy (currently iptables). + # If the iptables proxy is selected, regardless of how, but the system's + # kernel or iptables versions are insufficient, this always falls back to the userspace proxy. + mode: +# Range of host ports (beginPort-endPort, single port or beginPort+offset, inclusive) +# that may be consumed in order to proxy service traffic. +# If (unspecified, 0, or 0-0) then ports will be randomly chosen. + portRange: + +# The previous version for which you want to show hidden metrics. +# Only the previous minor version is meaningful, other values will not be allowed. +# The format is ., e.g.: '1.16'. The purpose of this format is make +# sure you have the opportunity to notice if the next release hides additional metrics, +# rather than being surprised when they are permanently removed in the release after that. +showHiddenMetricsForVersion: + +# How long an idle UDP connection will be kept open (e.g. '250ms', '2s'). +# Must be greater than 0. Only applicable for proxy-mode=userspace +udpTimeout: 250ms + +# Print version information and quit +version: + +# If set, write the default configuration values to this file and exit. +writeConfigTo: +global: + systemDefaultRegistry: "" diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/Chart.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/Chart.yaml new file mode 100755 index 0000000..e3d720d --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/Chart.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +appVersion: v1.20.11-rke2r1 +description: Install Kube Proxy. +keywords: +- kube-proxy +maintainers: +- email: charts@rancher.com + name: Rancher Labs +name: rke2-kube-proxy +sources: +- https://github.com/rancher/rke2-charts +version: v1.20.11-rke2r1-build2021091601 diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/NOTES.txt b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/NOTES.txt new file mode 100755 index 0000000..2da0e24 --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/NOTES.txt @@ -0,0 +1,2 @@ +Kube-proxy has been installed. + diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/_helpers.tpl b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/_helpers.tpl new file mode 100755 index 0000000..cb64d1f --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/_helpers.tpl @@ -0,0 +1,21 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} +{{- define "rke2_data_dir" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s" .Values.global.rke2DataDir -}} +{{- else -}} +{{- "/var/lib/rancher/rke2" -}} +{{- end -}} +{{- end -}} +{{- define "kubeproxy_kubeconfig" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s/agent/kubeproxy.kubeconfig" .Values.global.rke2DataDir -}} +{{- else -}} +{{- printf "%s" .Values.clientConnection.kubeconfig -}} +{{- end -}} +{{- end -}} diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/config.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/config.yaml new file mode 100755 index 0000000..f8bb5cc --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/config.yaml @@ -0,0 +1,69 @@ +--- +apiVersion: v1 +data: + config.conf: |- + apiVersion: kubeproxy.config.k8s.io/v1alpha1 + bindAddress: {{ .Values.bindAddress | quote }} + clientConnection: + acceptContentTypes: {{ .Values.clientConnection.acceptContentTypes | quote }} + burst: {{ .Values.clientConnection.burst }} + contentType: {{ .Values.clientConnection.contentType | quote }} + kubeconfig: {{ include "kubeproxy_kubeconfig" . | quote }} + qps: {{ .Values.clientConnection.qps }} + clusterCIDR: {{ coalesce .Values.global.clusterCIDR .Values.clusterCIDR | quote }} + configSyncPeriod: {{ .Values.configSyncPeriod }} + conntrack: + maxPerCore: {{ .Values.conntrack.maxPerCore }} + min: {{ .Values.conntrack.min }} + tcpCloseWaitTimeout: {{ .Values.conntrack.tcpCloseWaitTimeout | quote }} + tcpEstablishedTimeout: {{ .Values.conntrack.tcpEstablishedTimeout | quote }} + detectLocalMode: {{ .Values.detectLocalMode | quote }} + enableProfiling: {{ .Values.enableProfiling }} + healthzBindAddress: {{ .Values.healthzBindAddress | quote }} + hostnameOverride: {{ .Values.hostnameOverride | quote }} + iptables: + masqueradeAll: {{ .Values.iptables.masqueradeAll }} + masqueradeBit: {{ .Values.iptables.masqueradeBit }} + {{ if .Values.iptables.minSyncPeriod }} + minSyncPeriod: {{ .Values.iptables.minSyncPeriod }} + {{ end }} + syncPeriod: {{ .Values.iptables.syncPeriod }} + ipvs: + excludeCIDRs: {{ .Values.ipvs.excludeCIDRs | quote }} + {{ if .Values.ipvs.minSyncPeriod }} + minSyncPeriod: {{ .Values.ipvs.minSyncPeriod }} + {{ end }} + scheduler: {{ .Values.ipvs.scheduler | quote }} + strictARP: {{ .Values.ipvs.strictARP }} + syncPeriod: {{ .Values.ipvs.syncPeriod }} + {{ if .Values.ipvs.tcpFinTimeout }} + tcpFinTimeout: {{ .Values.ipvs.tcpFinTimeout }} + {{ end }} + {{ if .Values.ipvs.tcpTimeout }} + tcpTimeout: {{ .Values.ipvs.tcpTimeout }} + {{ end }} + {{ if .Values.ipvs.udpTimeout }} + udpTimeout: {{ .Values.ipvs.udpTimeout }} + {{ end }} + kind: KubeProxyConfiguration + metricsBindAddress: {{ .Values.metricsBindAddress | quote }} + mode: {{ .Values.proxy.mode | quote }} + nodePortAddresses: null + oomScoreAdj: {{ .Values.oomScoreAdj }} + portRange: {{ .Values.proxy.portRange | quote }} + showHiddenMetricsForVersion: {{ .Values.showHiddenMetricsForVersion | quote }} + udpIdleTimeout: {{ .Values.udpTimeout | quote }} + featureGates: + {{- range $key, $value := .Values.featureGates }} + {{ $key }}: {{ $value }} + {{- end }} + winkernel: + enableDSR: false + networkName: "" + sourceVip: "" +kind: ConfigMap +metadata: + labels: + app: kube-proxy + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/daemonset.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/daemonset.yaml new file mode 100755 index 0000000..1267df8 --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/daemonset.yaml @@ -0,0 +1,78 @@ +apiVersion: apps/v1 +kind: DaemonSet +metadata: + labels: + k8s-app: kube-proxy + name: kube-proxy + namespace: kube-system +spec: + selector: + matchLabels: + k8s-app: kube-proxy + template: + metadata: + labels: + k8s-app: kube-proxy + spec: + containers: + - command: + - /usr/local/bin/kube-proxy + - --config=/var/lib/kube-proxy/config.conf + - --hostname-override=$(NODE_NAME) + env: + - name: NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: {{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} + imagePullPolicy: IfNotPresent + name: kube-proxy + securityContext: + privileged: true + volumeMounts: + - mountPath: /var/lib/kube-proxy + name: kube-proxy + - mountPath: {{ template "rke2_data_dir" . }}/agent + name: rke2config + readOnly: true + - mountPath: /run/xtables.lock + name: xtables-lock + - mountPath: /lib/modules + name: lib-modules + readOnly: true + dnsPolicy: ClusterFirst + hostNetwork: true + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: kube-proxy + serviceAccountName: kube-proxy + terminationGracePeriodSeconds: 30 + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - operator: Exists + volumes: + - hostPath: + path: {{ template "rke2_data_dir" . }}/agent + type: "" + name: rke2config + - configMap: + name: kube-proxy + name: kube-proxy + - hostPath: + path: /run/xtables.lock + type: FileOrCreate + name: xtables-lock + - hostPath: + path: /lib/modules + type: "" + name: lib-modules + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/rbac.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/rbac.yaml new file mode 100755 index 0000000..d98f84c --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/rbac.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: rke2:node-proxier +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:node-proxier +subjects: +- kind: ServiceAccount + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/serviceaccount.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/serviceaccount.yaml new file mode 100755 index 0000000..59408a2 --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +kind: ServiceAccount +apiVersion: v1 +metadata: + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/values.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/values.yaml new file mode 100755 index 0000000..0a64e5b --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.11-rke2r1-build2021091601/values.yaml @@ -0,0 +1,142 @@ +--- + +# image for kubeproxy +image: + repository: rancher/hardened-kubernetes + tag: v1.20.11-rke2r1-build20210916 + +# The IP address for the proxy server to serve on +# (set to '0.0.0.0' for all IPv4 interfaces and '::' for all IPv6 interfaces) +bindAddress: 0.0.0.0 + +# If true cleanup iptables and ipvs rules and exit. +cleanup: + +# The CIDR range of pods in the cluster. +# When configured, traffic sent to a Service cluster IP from outside this range +# will be masqueraded and traffic sent from pods to an external +# LoadBalancer IP will be directed to the respective cluster IP instead +clusterCIDR: 10.42.0.0/16 + +# The path to the configuration file. +config: + +# How often configuration from the apiserver is refreshed. Must be greater than 0. +configSyncPeriod: 15m0s + +conntrack: + # Maximum number of NAT connections to track per CPU core (0 to leave the limit as-is and ignore conntrack-min). + maxPerCore: 32768 + # Minimum number of conntrack entries to allocate, regardless of conntrack-max-per-core (set conntrack-max-per-core=0 to leave the limit as-is). + min: 131072 + # NAT timeout for TCP connections in the CLOSE_WAIT state + tcpTimeoutCloseWait: 1h0m0s + # Idle timeout for established TCP connections (0 to leave as-is) + tcpTimeoutEstablished: 24h0m0s + +# Mode to use to detect local traffic +detectLocalMode: + +# A set of key=value pairs that describe feature gates for alpha/experimental features: +featureGates: + +# The IP address with port for the health check server to serve on +# (set to '0.0.0.0:10256' for all IPv4 interfaces and '[::]:10256' for all IPv6 interfaces). Set empty to disable. +healthzBindAddress: 0.0.0.0:10256 + +# help for kube-proxy +help: + +# If non-empty, will use this string as identification instead of the actual hostname. +hostnameOverride: + +iptables: + # If using the pure iptables proxy, SNAT all traffic sent via Service cluster IPs (this not commonly needed) + masqueradeAll: + # If using the pure iptables proxy, the bit of the fwmark space to mark packets requiring SNAT with. Must be within the range [0, 31]. + masqueradeBit: 14 + # The minimum interval of how often the iptables rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The maximum interval of how often iptables rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + +ipvs: + # A comma-separated list of CIDR's which the ipvs proxier should not touch when cleaning up IPVS rules. + excludeCidrs: + # The minimum interval of how often the ipvs rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The ipvs scheduler type when proxy mode is ipvs + scheduler: + # Enable strict ARP by setting arp_ignore to 1 and arp_announce to 2 + strictArp: + # The maximum interval of how often ipvs rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + # The timeout for idle IPVS TCP connections, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpTimeout: + # The timeout for IPVS TCP connections after receiving a FIN packet, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpfinTimeout: + # The timeout for IPVS UDP packets, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + udpTimeout: + + +clientConnection: + # Burst to use while talking with kubernetes apiserver + apiBurst: 10 + # Content type of requests sent to apiserver. + apiContentType: + # QPS to use while talking with kubernetes apiserver + qps: 5 + # Path to kubeconfig file with authorization information (the master location is set by the master flag). + kubeconfig: /var/lib/rancher/rke2/agent/kubeproxy.kubeconfig + +# Maximum number of seconds between log flushes +logFlushFrequency: 5s + + + +# The address of the Kubernetes API server (overrides any value in kubeconfig) +master: + +# The IP address with port for the metrics server to serve on +# (set to '0.0.0.0:10249' for all IPv4 interfaces and '[::]:10249' for all IPv6 interfaces). Set empty to disable. +metricsBindAddress: 127.0.0.1:10249 + +# A string slice of values which specify the addresses to use for NodePorts. +# Values may be valid IP blocks (e.g. 1.2.3.0/24, 1.2.3.4/32). The default empty string slice ([]) means to use all local addresses. +nodeportAddresses: + +# The oom-score-adj value for kube-proxy process. Values must be within the range [-1000, 1000] +oomScoreAdj: -999 + +# If true enables profiling via web interface on /debug/pprof handler. +profiling: + +proxy: + # Which proxy mode to use: 'userspace' (older) or 'iptables' (faster) or 'ipvs'. + # If blank, use the best-available proxy (currently iptables). + # If the iptables proxy is selected, regardless of how, but the system's + # kernel or iptables versions are insufficient, this always falls back to the userspace proxy. + mode: +# Range of host ports (beginPort-endPort, single port or beginPort+offset, inclusive) +# that may be consumed in order to proxy service traffic. +# If (unspecified, 0, or 0-0) then ports will be randomly chosen. + portRange: + +# The previous version for which you want to show hidden metrics. +# Only the previous minor version is meaningful, other values will not be allowed. +# The format is ., e.g.: '1.16'. The purpose of this format is make +# sure you have the opportunity to notice if the next release hides additional metrics, +# rather than being surprised when they are permanently removed in the release after that. +showHiddenMetricsForVersion: + +# How long an idle UDP connection will be kept open (e.g. '250ms', '2s'). +# Must be greater than 0. Only applicable for proxy-mode=userspace +udpTimeout: 250ms + +# Print version information and quit +version: + +# If set, write the default configuration values to this file and exit. +writeConfigTo: +global: + systemDefaultRegistry: "" diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/Chart.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/Chart.yaml new file mode 100755 index 0000000..cb6e38e --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/Chart.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +appVersion: v1.21.5-rke2r1 +description: Install Kube Proxy. +keywords: +- kube-proxy +maintainers: +- email: charts@rancher.com + name: Rancher Labs +name: rke2-kube-proxy +sources: +- https://github.com/rancher/rke2-charts +version: v1.21.5-rke2r1-build2021091601 diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/NOTES.txt b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/NOTES.txt new file mode 100755 index 0000000..2da0e24 --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/NOTES.txt @@ -0,0 +1,2 @@ +Kube-proxy has been installed. + diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/_helpers.tpl b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/_helpers.tpl new file mode 100755 index 0000000..cb64d1f --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/_helpers.tpl @@ -0,0 +1,21 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} +{{- define "rke2_data_dir" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s" .Values.global.rke2DataDir -}} +{{- else -}} +{{- "/var/lib/rancher/rke2" -}} +{{- end -}} +{{- end -}} +{{- define "kubeproxy_kubeconfig" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s/agent/kubeproxy.kubeconfig" .Values.global.rke2DataDir -}} +{{- else -}} +{{- printf "%s" .Values.clientConnection.kubeconfig -}} +{{- end -}} +{{- end -}} diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/config.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/config.yaml new file mode 100755 index 0000000..f8bb5cc --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/config.yaml @@ -0,0 +1,69 @@ +--- +apiVersion: v1 +data: + config.conf: |- + apiVersion: kubeproxy.config.k8s.io/v1alpha1 + bindAddress: {{ .Values.bindAddress | quote }} + clientConnection: + acceptContentTypes: {{ .Values.clientConnection.acceptContentTypes | quote }} + burst: {{ .Values.clientConnection.burst }} + contentType: {{ .Values.clientConnection.contentType | quote }} + kubeconfig: {{ include "kubeproxy_kubeconfig" . | quote }} + qps: {{ .Values.clientConnection.qps }} + clusterCIDR: {{ coalesce .Values.global.clusterCIDR .Values.clusterCIDR | quote }} + configSyncPeriod: {{ .Values.configSyncPeriod }} + conntrack: + maxPerCore: {{ .Values.conntrack.maxPerCore }} + min: {{ .Values.conntrack.min }} + tcpCloseWaitTimeout: {{ .Values.conntrack.tcpCloseWaitTimeout | quote }} + tcpEstablishedTimeout: {{ .Values.conntrack.tcpEstablishedTimeout | quote }} + detectLocalMode: {{ .Values.detectLocalMode | quote }} + enableProfiling: {{ .Values.enableProfiling }} + healthzBindAddress: {{ .Values.healthzBindAddress | quote }} + hostnameOverride: {{ .Values.hostnameOverride | quote }} + iptables: + masqueradeAll: {{ .Values.iptables.masqueradeAll }} + masqueradeBit: {{ .Values.iptables.masqueradeBit }} + {{ if .Values.iptables.minSyncPeriod }} + minSyncPeriod: {{ .Values.iptables.minSyncPeriod }} + {{ end }} + syncPeriod: {{ .Values.iptables.syncPeriod }} + ipvs: + excludeCIDRs: {{ .Values.ipvs.excludeCIDRs | quote }} + {{ if .Values.ipvs.minSyncPeriod }} + minSyncPeriod: {{ .Values.ipvs.minSyncPeriod }} + {{ end }} + scheduler: {{ .Values.ipvs.scheduler | quote }} + strictARP: {{ .Values.ipvs.strictARP }} + syncPeriod: {{ .Values.ipvs.syncPeriod }} + {{ if .Values.ipvs.tcpFinTimeout }} + tcpFinTimeout: {{ .Values.ipvs.tcpFinTimeout }} + {{ end }} + {{ if .Values.ipvs.tcpTimeout }} + tcpTimeout: {{ .Values.ipvs.tcpTimeout }} + {{ end }} + {{ if .Values.ipvs.udpTimeout }} + udpTimeout: {{ .Values.ipvs.udpTimeout }} + {{ end }} + kind: KubeProxyConfiguration + metricsBindAddress: {{ .Values.metricsBindAddress | quote }} + mode: {{ .Values.proxy.mode | quote }} + nodePortAddresses: null + oomScoreAdj: {{ .Values.oomScoreAdj }} + portRange: {{ .Values.proxy.portRange | quote }} + showHiddenMetricsForVersion: {{ .Values.showHiddenMetricsForVersion | quote }} + udpIdleTimeout: {{ .Values.udpTimeout | quote }} + featureGates: + {{- range $key, $value := .Values.featureGates }} + {{ $key }}: {{ $value }} + {{- end }} + winkernel: + enableDSR: false + networkName: "" + sourceVip: "" +kind: ConfigMap +metadata: + labels: + app: kube-proxy + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/daemonset.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/daemonset.yaml new file mode 100755 index 0000000..1267df8 --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/daemonset.yaml @@ -0,0 +1,78 @@ +apiVersion: apps/v1 +kind: DaemonSet +metadata: + labels: + k8s-app: kube-proxy + name: kube-proxy + namespace: kube-system +spec: + selector: + matchLabels: + k8s-app: kube-proxy + template: + metadata: + labels: + k8s-app: kube-proxy + spec: + containers: + - command: + - /usr/local/bin/kube-proxy + - --config=/var/lib/kube-proxy/config.conf + - --hostname-override=$(NODE_NAME) + env: + - name: NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: {{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} + imagePullPolicy: IfNotPresent + name: kube-proxy + securityContext: + privileged: true + volumeMounts: + - mountPath: /var/lib/kube-proxy + name: kube-proxy + - mountPath: {{ template "rke2_data_dir" . }}/agent + name: rke2config + readOnly: true + - mountPath: /run/xtables.lock + name: xtables-lock + - mountPath: /lib/modules + name: lib-modules + readOnly: true + dnsPolicy: ClusterFirst + hostNetwork: true + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: kube-proxy + serviceAccountName: kube-proxy + terminationGracePeriodSeconds: 30 + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - operator: Exists + volumes: + - hostPath: + path: {{ template "rke2_data_dir" . }}/agent + type: "" + name: rke2config + - configMap: + name: kube-proxy + name: kube-proxy + - hostPath: + path: /run/xtables.lock + type: FileOrCreate + name: xtables-lock + - hostPath: + path: /lib/modules + type: "" + name: lib-modules + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/rbac.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/rbac.yaml new file mode 100755 index 0000000..d98f84c --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/rbac.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: rke2:node-proxier +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:node-proxier +subjects: +- kind: ServiceAccount + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/serviceaccount.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/serviceaccount.yaml new file mode 100755 index 0000000..59408a2 --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +kind: ServiceAccount +apiVersion: v1 +metadata: + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/values.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/values.yaml new file mode 100755 index 0000000..80db34c --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.5-rke2r1-build2021091601/values.yaml @@ -0,0 +1,142 @@ +--- + +# image for kubeproxy +image: + repository: rancher/hardened-kubernetes + tag: v1.21.5-rke2r1-build20210916 + +# The IP address for the proxy server to serve on +# (set to '0.0.0.0' for all IPv4 interfaces and '::' for all IPv6 interfaces) +bindAddress: 0.0.0.0 + +# If true cleanup iptables and ipvs rules and exit. +cleanup: + +# The CIDR range of pods in the cluster. +# When configured, traffic sent to a Service cluster IP from outside this range +# will be masqueraded and traffic sent from pods to an external +# LoadBalancer IP will be directed to the respective cluster IP instead +clusterCIDR: 10.42.0.0/16 + +# The path to the configuration file. +config: + +# How often configuration from the apiserver is refreshed. Must be greater than 0. +configSyncPeriod: 15m0s + +conntrack: + # Maximum number of NAT connections to track per CPU core (0 to leave the limit as-is and ignore conntrack-min). + maxPerCore: 32768 + # Minimum number of conntrack entries to allocate, regardless of conntrack-max-per-core (set conntrack-max-per-core=0 to leave the limit as-is). + min: 131072 + # NAT timeout for TCP connections in the CLOSE_WAIT state + tcpTimeoutCloseWait: 1h0m0s + # Idle timeout for established TCP connections (0 to leave as-is) + tcpTimeoutEstablished: 24h0m0s + +# Mode to use to detect local traffic +detectLocalMode: + +# A set of key=value pairs that describe feature gates for alpha/experimental features: +featureGates: + +# The IP address with port for the health check server to serve on +# (set to '0.0.0.0:10256' for all IPv4 interfaces and '[::]:10256' for all IPv6 interfaces). Set empty to disable. +healthzBindAddress: 0.0.0.0:10256 + +# help for kube-proxy +help: + +# If non-empty, will use this string as identification instead of the actual hostname. +hostnameOverride: + +iptables: + # If using the pure iptables proxy, SNAT all traffic sent via Service cluster IPs (this not commonly needed) + masqueradeAll: + # If using the pure iptables proxy, the bit of the fwmark space to mark packets requiring SNAT with. Must be within the range [0, 31]. + masqueradeBit: 14 + # The minimum interval of how often the iptables rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The maximum interval of how often iptables rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + +ipvs: + # A comma-separated list of CIDR's which the ipvs proxier should not touch when cleaning up IPVS rules. + excludeCidrs: + # The minimum interval of how often the ipvs rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The ipvs scheduler type when proxy mode is ipvs + scheduler: + # Enable strict ARP by setting arp_ignore to 1 and arp_announce to 2 + strictArp: + # The maximum interval of how often ipvs rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + # The timeout for idle IPVS TCP connections, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpTimeout: + # The timeout for IPVS TCP connections after receiving a FIN packet, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpfinTimeout: + # The timeout for IPVS UDP packets, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + udpTimeout: + + +clientConnection: + # Burst to use while talking with kubernetes apiserver + apiBurst: 10 + # Content type of requests sent to apiserver. + apiContentType: + # QPS to use while talking with kubernetes apiserver + qps: 5 + # Path to kubeconfig file with authorization information (the master location is set by the master flag). + kubeconfig: /var/lib/rancher/rke2/agent/kubeproxy.kubeconfig + +# Maximum number of seconds between log flushes +logFlushFrequency: 5s + + + +# The address of the Kubernetes API server (overrides any value in kubeconfig) +master: + +# The IP address with port for the metrics server to serve on +# (set to '0.0.0.0:10249' for all IPv4 interfaces and '[::]:10249' for all IPv6 interfaces). Set empty to disable. +metricsBindAddress: 127.0.0.1:10249 + +# A string slice of values which specify the addresses to use for NodePorts. +# Values may be valid IP blocks (e.g. 1.2.3.0/24, 1.2.3.4/32). The default empty string slice ([]) means to use all local addresses. +nodeportAddresses: + +# The oom-score-adj value for kube-proxy process. Values must be within the range [-1000, 1000] +oomScoreAdj: -999 + +# If true enables profiling via web interface on /debug/pprof handler. +profiling: + +proxy: + # Which proxy mode to use: 'userspace' (older) or 'iptables' (faster) or 'ipvs'. + # If blank, use the best-available proxy (currently iptables). + # If the iptables proxy is selected, regardless of how, but the system's + # kernel or iptables versions are insufficient, this always falls back to the userspace proxy. + mode: +# Range of host ports (beginPort-endPort, single port or beginPort+offset, inclusive) +# that may be consumed in order to proxy service traffic. +# If (unspecified, 0, or 0-0) then ports will be randomly chosen. + portRange: + +# The previous version for which you want to show hidden metrics. +# Only the previous minor version is meaningful, other values will not be allowed. +# The format is ., e.g.: '1.16'. The purpose of this format is make +# sure you have the opportunity to notice if the next release hides additional metrics, +# rather than being surprised when they are permanently removed in the release after that. +showHiddenMetricsForVersion: + +# How long an idle UDP connection will be kept open (e.g. '250ms', '2s'). +# Must be greater than 0. Only applicable for proxy-mode=userspace +udpTimeout: 250ms + +# Print version information and quit +version: + +# If set, write the default configuration values to this file and exit. +writeConfigTo: +global: + systemDefaultRegistry: "" diff --git a/index.yaml b/index.yaml index 372fb33..c0bda7f 100755 --- a/index.yaml +++ b/index.yaml @@ -1344,6 +1344,22 @@ entries: - assets/rke2-ingress-nginx/rke2-ingress-nginx-1.36.300.tgz version: 1.36.300 rke2-kube-proxy: + - apiVersion: v1 + appVersion: v1.21.5-rke2r1 + created: "2021-09-16T19:41:35.138181182Z" + description: Install Kube Proxy. + digest: 332cfbc92617b75b09f42a76a384dcd1274589fc268da0d18c15468345b4d080 + keywords: + - kube-proxy + maintainers: + - email: charts@rancher.com + name: Rancher Labs + name: rke2-kube-proxy + sources: + - https://github.com/rancher/rke2-charts + urls: + - assets/rke2-kube-proxy-1.21/rke2-kube-proxy-v1.21.5-rke2r1-build2021091601.tgz + version: v1.21.5-rke2r1-build2021091601 - apiVersion: v1 appVersion: v1.21.4-rke2r4 created: "2021-09-09T18:47:55.919680911Z" @@ -1600,6 +1616,22 @@ entries: urls: - assets/rke2-kube-proxy/rke2-kube-proxy-v1.21.0-build2021041301.tgz version: v1.21.0-build2021041301 + - apiVersion: v1 + appVersion: v1.20.11-rke2r1 + created: "2021-09-16T19:41:35.126132998Z" + description: Install Kube Proxy. + digest: 8c9050013520ba80d02815d4710b3c2e14f26a42158aaf92bc869c6566b7604e + keywords: + - kube-proxy + maintainers: + - email: charts@rancher.com + name: Rancher Labs + name: rke2-kube-proxy + sources: + - https://github.com/rancher/rke2-charts + urls: + - assets/rke2-kube-proxy-1.20/rke2-kube-proxy-v1.20.11-rke2r1-build2021091601.tgz + version: v1.20.11-rke2r1-build2021091601 - apiVersion: v1 appVersion: v1.20.10-rke2r1 created: "2021-08-21T00:08:35.122181687Z" @@ -1872,6 +1904,22 @@ entries: urls: - assets/rke2-kube-proxy/rke2-kube-proxy-v1.19.801.tgz version: v1.19.801 + - apiVersion: v1 + appVersion: v1.19.15-rke2r1 + created: "2021-09-16T19:41:35.124629388Z" + description: Install Kube Proxy. + digest: 313cb3d6a6a5fe494f7b59a9ab23bef297036ae83ea19ee46ceda6d7bc376e4c + keywords: + - kube-proxy + maintainers: + - email: charts@rancher.com + name: Rancher Labs + name: rke2-kube-proxy + sources: + - https://github.com/rancher/rke2-charts + urls: + - assets/rke2-kube-proxy-1.19/rke2-kube-proxy-v1.19.15-rke2r1-build2021091601.tgz + version: v1.19.15-rke2r1-build2021091601 - apiVersion: v1 appVersion: v1.19.14-rke2r1 created: "2021-08-21T00:08:35.121501387Z"