From c552dd7a003f82b000cd582e5e3b7fd5531903f1 Mon Sep 17 00:00:00 2001 From: actions Date: Mon, 14 Jun 2021 13:08:06 +0000 Subject: [PATCH] Merge pull request #102 from manuelbuil/update-canal-images Upgrade flannel and calico images --- .../rke2-canal-v3.19.1-build2021061107.tgz | Bin 0 -> 6084 bytes .../v3.19.1-build2021061107/Chart.yaml | 13 + .../templates/NOTES.txt | 3 + .../templates/_helpers.tpl | 7 + .../templates/config.yaml | 67 +++++ .../templates/crd.yaml | 197 +++++++++++++ .../templates/daemonset.yaml | 266 ++++++++++++++++++ .../templates/rbac.yaml | 163 +++++++++++ .../templates/serviceaccount.yaml | 6 + .../v3.19.1-build2021061107/values.yaml | 80 ++++++ index.yaml | 17 ++ 11 files changed, 819 insertions(+) create mode 100755 assets/rke2-canal/rke2-canal-v3.19.1-build2021061107.tgz create mode 100755 charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/Chart.yaml create mode 100755 charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/NOTES.txt create mode 100755 charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/_helpers.tpl create mode 100755 charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/config.yaml create mode 100755 charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/crd.yaml create mode 100755 charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/daemonset.yaml create mode 100755 charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/rbac.yaml create mode 100755 charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/serviceaccount.yaml create mode 100755 charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/values.yaml diff --git a/assets/rke2-canal/rke2-canal-v3.19.1-build2021061107.tgz b/assets/rke2-canal/rke2-canal-v3.19.1-build2021061107.tgz new file mode 100755 index 0000000000000000000000000000000000000000..d43cc84579fb94c64c031ab0adaa12743c9f80ba GIT binary patch literal 6084 zcmV;#7dz-5iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKBja~iqQ=ziu`bm6*{FCM^-kjIXQWL`%{wUodMg4?d(3~`H+Mesk_x`wOak6$QwNNe8LH9c9%rz#)hoe zPfz=_TCLXU$%*~D)oPXhZk?RG|LN$Yb$WFA?)doh-A}Efw@1e(KSAq>>8N}nrHTBh z_1(D2gZqm-B&45FDk^vz)<-oGhS|@zjiX;0N3{TzFKMXl%K=xKFa}*CGB8AaE94D~ zShS$LQCo@?wqdDtsM^iu?d@$Nl;WT0Yo9Rci-wSkX6*(yw?YQ0UGu<7UTsAv*MxGE z_9d=A@pztBs~x~(i7*(gPr#>vgir_uT7WN+XavE*FiA%t&^d6y5%7*Gtr{>A0Srb8 zZYg6h!`cD(OQDd%T#6OwB~>5^Utpsail9pa*@pU2t8sGNXf;~Rqtkk=HfMx$WbGQj z0o+70^x`)_S7d=TaDSWc01`u?s1|b5hGZcxi42fqko2<+HCeP_-D(`2G+M>gZ1I@! zQm#?XiH{H|3}Ci#+6d-C!cr&=|Hu2k?jOEbts+i+Vsv1`0vODJ;atOv5q@(BdWqcp zkpoIq!iz{zzOY}p2=I-v00Nwoh-r`_(r92()2j{j`ZgmBe!>GFauKbNYXvnhKa^pL z2X)V*p|>LHU-jg-?XIF3NA0Z^(!u;d{2Szf9bg`QBmJV5B4Pn>p<#wb0rLe0wlC2j zBd+Pn(mHeP+fZNMF~aMX|Z|vs$I29XdOI zhRGQs^Xus`oiV&y3kHJ(&D_0sdQ3f{iPAzM=uL=r?yQ(LV4%&v%tRs8W;Zl*Dv@hc zAS9sn14CJm0GMn-Y`aDrH99f;jZkfY1{od!lv7O!qyM&JyCqbg37JyT1}!6W92a~} z7m-9K$3PYfi3>N^Gh&vN;1G%cx`W=8ffXqniNO5ILFrLNW(?uO$B~6Y`NB?}vo0uK zd`RTYC?AKIMM|S|OfeJ($TgjB>@o{5WMX4hiv4co&9!$tsNejo4lNh!1^jc$5SUmj z%z9M<{xHn)H8bzjA7F@4mZh%!8D)6xT2~BaFj}9Q(f^t<+{y_udN&Byr{gFLh16}B z6Q*3x5lSk8L!cZK`ho}Q(5$=LCH0rCBS`c}7&3|qj1@*hZEz{0pEYLS-Pf#rb=0lw!%G;I}2()hwiirv(_z9-$-wf|g`Hr@na` zpwg6E3Y2YW&{1w-m_=Y#UA%$}dom!oA!YM{JO~Bl7N6bolKqMJc8pp;r`zq1CMm0X zu0cQUI1!(O(jDI&6I|PpiZE1NOs->bGl15pm(j)Kx(!Ds@0@T>HsO+(%`;wPR)=Zx za*T3KeH>bIKUD-~c`?*h0efq~q7{0fJ&t$*m9b|2Y~Q<6N{`AmG}lBn8J#t6T=%By z={h>i=u|XNJ`<7IGzn#j%ne_qv3&ZgP;WqKX{30CgsXJXG~ikxyfGxcu``vZmjncz z!$w4~Bx^MPkRWb3$cW`s#97>S;Lsc1jtt_|K#0i`k^Z6dUB>u}1lATz%!sw=)JADs z#lmuh3#zo)5$pB;xo4`s(vv&?X z0~o_ffjPoh<9vp`SeX_ekpvrOy)<4G!Vh>V*Z*{hEJUdqI(!OO(0%LwZL946dH1gM zy8d6}`SQgxb^+xGb+=VdV>4kYKO&*v{L@}k7nUt`l($1zBSpO%oBXi`hRw<6p31)CIQi;od$ire1XOlG9(Hc<`4*9zs7{cO;l(-sLuCk)k`gbuhyIOt#3Uu}e8OqQv8CzvRd9Qm%(>?&eUG>DlEvh&>0> zm5!<)CSHXtcxIxEIhvTeiMW!)#gW*of&&tNX<6I=+fRk)Q^G797b!FLtBr6tFi8x= zdb?IcQ=c%lfl!2zSxZ6e^`6Gar><8U{^MCU@R!(!UN=%$cRorl6oD7FuOB82e4Z>6 z)2!8a+c?TT#vY7%8~&a;<-g?I^L4!mEqKSPw4?pT#A3>Djm$K#Ub({O)I~f^fMm|( zVoSrfWE|7!uh$>?SHu3KKb{URd;RIKbJ3qpi#=94s<&Y}?G6Xii^=tLTKGysvZ}WW z11Su~EG&-+pRfW{+r~vfOsm-UOaqw@SbQyD3I(J7W*@GbpVjW}Ifhh#uS}51Ts)sCC7UvSg zAq2ZeH2$f~zVe^qQj60U>Q;&Pf-qD*mJQW7a?l<0uF_9&Ff*rM(ghehy$jP{pEy=k zDB{EgU)WMIo;*gzu&U|PEOyx+J7(d+++XU1cB$vz-5Kh3N{)E zDc))1=9g;R{Hz*OG}lKn)Z{2J?johd>Iz*#PR|@Osad@h#@%cY78bZ_7$Mxs9;%sb z*t(T{5n?+D1J(c*Qbb`Js(TrGAu}ywYte;i9i<;Wj=FjD_EX3rNmvDK_N%eOB1Yu) z_gc+x^;vlpBFdL%(FiS^0%t5G+YB+UpPdg(_&3HV<#v;KVRjhg9fy2VWJ-~&GH-HU zH_y$Xc<(Z%oLv2gbrr)IWCRpgRY6~gUE3|5n`bt>^&@qW4an}+Miumxc(&c*xq0SH zrPxxlCiIK1$B&kT*rFR*E55+CN)k(q+ivshE3|-8q5hFv8>8OMGDF)wb}7`)%`59n ziqj2Vm`|UCN;4e_JSxys;!pnDbMwZWknPs;!i*V=Iu~{;EN~^Gro@u;!%OhPslXq= zkZ$6YEOI2Kr-CK18}kKtvLrlUFRhymPd-`1TRe&Bso;tG^87prgC-KZbEML#`*%KP)~ojJEB-*f)2^#23|SAr{i zqH3`H{-5KMqtkNz*JHV%@H{;de7b5uHsm?-Olbs?|R0ek2&W0~ni zT#N2-5GNVM=|BbNE(l&baFLf4vFY8WjcI@~PV47Dav9ah@i2)d_N?HVby8FWp=v%X zq*!pn?uaP@Ffv1ytk9p8M?$l;QpMElG0T(7Nu08tnajbkl|#>K`p z(>7iGN-#$G;@UQFwFUV%3B(n-yXIs~C?hk5Z7`}NnaP-p90Sb53KUh)WFEq~(C(a> zwRB=|2!si~aEZ=#dL^}SuTBsMt}Z#-fEH<<^bDD}JgsS2?9^> zLqM(~o5M;qED}xUx`&bqN%aPlzr-Li9I*nUmqY{A3S_L<6%dK$7s|C&#|Z>FH(+s% z(!vH@Q$G&XxhIBXk7ST7Vo8{WKeS~!*f^B9>O7bL;5xd23{HZaPg zyZE~~HN*-(&D6HCkTS9`4;SPHK}9lIeRdoP*|z+GFjo_!vSE3E^Evvu4MQ=G+vZ|7 zA~cwUY(wAHc@@yfo4qq;Bi<6TDam8K!A-kDNFIVZPjdeb{YXE6;yAM3@qH0-?J~#n zvV8y-l+zXcH$ot8ZFv&}PTWYc$RG+AHaaaN1jx|L!2bq~jO7)P77z#^P@fCwV+ua$ zP|vDji?bgH-{#x+7;4otlg7yh*x&o51s~u@W zD{hvolP)7lIVLz&X7#$4OkmvFm_S{T)#DbIe5T!ts^2K~8RbMKW}53_mg9EB-4)st zg6z3@jtz4M-Sauk&9f^7G(g%p~U6Als z++5*&yTOApe#(#4E!znerLm7uTfQ4DYmj7BYUb_D&&t^u=2P{+tCATWKJ+<77VH?a z{Wcv@Z*LJOn2|lOZ zEG;zJ3ktPwL2=ZLU?(t+x&%z2A6eZkxW+qOBsr9HO&Kn7WoijqJ3(MJ=QD~G^9jiNn}H30lG>u z;gBG>^E`|<+=tF+u&v_bnprQfggvd6&)4JLtLY1k_h|b!%}B|n%`>w4KJM30%QuJc z##83c>L&I(HGjr0+?e0|;{l>s%`Tf-S&)V;ncL#)w+NG8X$o9LT$PV|>8_D8i_!!- znirm|ODM%cl9kFTP@K>hyTK+issw7TyBXZJH06$}6_Z!sXWd?BFqILfh0XB^at?;-K3=j?zS*|KaYOv3?|dF%d2V1tcOxkE|K3& zk1;?VYjYSwtIwVD zhf=@qK7bv=smA}vS*^MUU?=;A0tO=>K_F3?odAQp3nov~V3(a&b;L=M;_baQ-+rY{ z5%7-dZJ@g(++Ap3URtt%%yo85cFNEKU6OSfEElnRqv1~3@kK0iBP%Ys9{%vWSQb5> z2J(+a2}Ef{4o06(Mwgf8+Y0p{e^&hExN&s)b9x(3vE5_u#n_&(n3&#RY^2C$IZw|o zKYknxE6u7PJ6;~9L#;T65gN3Fuw_^PNLGP2p#W=<%JBuB%nJ+ zxYRoQh`KzQ(4BJAp5@Q>Vx?bNzx-1AV781l*wgve@p<1cAL=z?bk*{M@x%?hiUt{?nWV1fV0=dq49ZJy;8F7`?9A!nBrHl8HE4FfQ z%vqE$BZJzSQ?{+z_Gjd8=zAg`MOyv2-$7Aqw$mS0bg5Wpsq=W*-a+1W`0~YbhVm8; zA{VL%-m@yZS`8;<|4*Wux4bL~=SP>l=W**N@%IKVAGgb>$D>a7nep4qhU$IxyfYm3 z&wJCs*`ug<&bUri&wLNbqv=Iw{Qv(HL}!)F57HQ=1I1T&-3R++Vd2k z_M3SX)U4&{FF1p*^A+#gimZCmGyAVaRa~yS_fhY@J!db(9h;eV-}Z7Z(29M_+do5l zLGGP+mkxAB8D7e+b!1e`LZVr>$f=(7RQ}r)GWGzOj}hmB$K7E?tfx9uwwD!E(Kl~z zuxu~5>Ihs$e(V|A9S_?U#Y&r^ng};_Jt}Q3&}M7?U|UqHjF2*~x8r*i)4nfk^u5$p z2h&RTEyCBY*=YVN3e@YJJ%5&`GXGc3i2sBI;P=&kx89zX>%ZT>KYGpoeTnCu{NGd( zYPACxaGym10!h+trC^xG)^e_eED!gv=5oMhlm|eq+qT>`&e0<-M=!k>$YHn=3=6ru zmLL-8rI7UB?kb2hv%jhUHs|lK7nrsS7s15$9dg9LrtmFLLns1u=n^ImU5;{MEZakx z2PC8)rHDe+hQHV2T(2!Zk7wbeKPi)BGQdr&xVv-ozZO0G@3i z0ad=u)QB6~kcT~*25Xd>DqJB?qwF5s5}n52JzzB5L@GeqtCm!wG@t_;S+T)d5^3QD zsL}b#1-FM?60G8xAij@EWfw}piiD42zUybYJpqU9)$9z3O&=YK z0OKs)TvE2N!4?@~!W>f%pzCh*wee#GO02MSK~b&<8jRGM)sxH4&frE#ruYH;W>7fN z>}~#*tGPsieC-Xbl<+J-8?UrIjH)QtDY3p%jxysl=7FI%&IHK~`a70ialz#lNvw7% zY0XJ_M);QUu#eDlUDf)H-`bE1BX*B`JD#2XgD#sRTRQS@`<YueN()PFQt+C`O`u{9X(3N z#R)P=67u8p^*7GIWQoci0#{Vo!a-X)A~@UFppB%lqECtfY$Cw=xN+)i1)sQE@MZ`S zS7MDpoCT08A`l#G9!4QEph{;vaw2!Hs=~^A&|KA=U6|a#mAA$YU=%TC*kFcU@gHpY zLZVQKAGkSVV%Bu!T+N>F?SEin=_|OGJZEXH*wfm7iT^yc{T{!6Jb~@-;LYWUOp;{R zaFh6f+M1~BhO``SGlQHH2IE4xOob_KKvBNIE5`o!Z?1K5SVc;9m-&^;iT93kC#QBXAa)r(;rR1Mou}f#k3OBgKF|GB`hQAC z^6&Ko-FN@{(cALT!q}n5URB5I^ZL9#ug_of`R@P#0RR6Y KgJ;G7d;kFby#c%c literal 0 HcmV?d00001 diff --git a/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/Chart.yaml b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/Chart.yaml new file mode 100755 index 0000000..2e7426c --- /dev/null +++ b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/Chart.yaml @@ -0,0 +1,13 @@ +apiVersion: v1 +appVersion: v3.19.1 +description: Install Canal Network Plugin. +home: https://www.projectcalico.org/ +keywords: +- canal +maintainers: +- email: charts@rancher.com + name: Rancher Labs +name: rke2-canal +sources: +- https://github.com/rancher/rke2-charts +version: v3.19.1-build2021061107 diff --git a/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/NOTES.txt b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/NOTES.txt new file mode 100755 index 0000000..12a30ff --- /dev/null +++ b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/NOTES.txt @@ -0,0 +1,3 @@ +Canal network plugin has been installed. + +NOTE: It may take few minutes until Canal image install CNI files and node become in ready state. diff --git a/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/_helpers.tpl b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/_helpers.tpl new file mode 100755 index 0000000..b647c75 --- /dev/null +++ b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/_helpers.tpl @@ -0,0 +1,7 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} diff --git a/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/config.yaml b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/config.yaml new file mode 100755 index 0000000..7229863 --- /dev/null +++ b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/config.yaml @@ -0,0 +1,67 @@ +--- +# Source: calico/templates/calico-config.yaml +# This ConfigMap is used to configure a self-hosted Canal installation. +kind: ConfigMap +apiVersion: v1 +metadata: + name: {{ .Release.Name }}-config + namespace: kube-system +data: + # Typha is disabled. + typha_service_name: {{ .Values.calico.typhaServiceName | quote }} + # The interface used by canal for host <-> host communication. + # If left blank, then the interface is chosen using the node's + # default route. + canal_iface: {{ .Values.flannel.iface | quote }} + + # Whether or not to masquerade traffic to destinations not within + # the pod network. + masquerade: {{ .Values.calico.masquerade | quote }} + + # Configure the MTU to use + veth_mtu: {{ .Values.calico.vethuMTU | quote }} + + # The CNI network configuration to install on each node. The special + # values in this config will be automatically populated. + cni_network_config: |- + { + "name": "k8s-pod-network", + "cniVersion": "0.3.1", + "plugins": [ + { + "type": "calico", + "log_level": "info", + "datastore_type": "kubernetes", + "nodename": "__KUBERNETES_NODE_NAME__", + "mtu": __CNI_MTU__, + "ipam": { + "type": "host-local", + "subnet": "usePodCidr" + }, + "policy": { + "type": "k8s" + }, + "kubernetes": { + "kubeconfig": "__KUBECONFIG_FILEPATH__" + } + }, + { + "type": "portmap", + "snat": true, + "capabilities": {"portMappings": true} + }, + { + "type": "bandwidth", + "capabilities": {"bandwidth": true} + } + ] + } + + # Flannel network configuration. Mounted into the flannel container. + net-conf.json: | + { + "Network": {{ coalesce .Values.global.clusterCIDR .Values.podCidr | quote }}, + "Backend": { + "Type": {{ .Values.flannel.backend | quote }} + } + } diff --git a/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/crd.yaml b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/crd.yaml new file mode 100755 index 0000000..0351759 --- /dev/null +++ b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/crd.yaml @@ -0,0 +1,197 @@ +--- +# Source: calico/templates/kdd-crds.yaml + +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: bgpconfigurations.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: BGPConfiguration + plural: bgpconfigurations + singular: bgpconfiguration + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: bgppeers.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: BGPPeer + plural: bgppeers + singular: bgppeer + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: blockaffinities.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: BlockAffinity + plural: blockaffinities + singular: blockaffinity + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: clusterinformations.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: ClusterInformation + plural: clusterinformations + singular: clusterinformation + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: felixconfigurations.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: FelixConfiguration + plural: felixconfigurations + singular: felixconfiguration + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: globalnetworkpolicies.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: GlobalNetworkPolicy + plural: globalnetworkpolicies + singular: globalnetworkpolicy + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: globalnetworksets.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: GlobalNetworkSet + plural: globalnetworksets + singular: globalnetworkset + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: hostendpoints.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: HostEndpoint + plural: hostendpoints + singular: hostendpoint + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: ipamblocks.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: IPAMBlock + plural: ipamblocks + singular: ipamblock + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: ipamconfigs.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: IPAMConfig + plural: ipamconfigs + singular: ipamconfig + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: ipamhandles.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: IPAMHandle + plural: ipamhandles + singular: ipamhandle + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: ippools.crd.projectcalico.org +spec: + scope: Cluster + group: crd.projectcalico.org + version: v1 + names: + kind: IPPool + plural: ippools + singular: ippool + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: networkpolicies.crd.projectcalico.org +spec: + scope: Namespaced + group: crd.projectcalico.org + version: v1 + names: + kind: NetworkPolicy + plural: networkpolicies + singular: networkpolicy + +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: networksets.crd.projectcalico.org +spec: + scope: Namespaced + group: crd.projectcalico.org + version: v1 + names: + kind: NetworkSet + plural: networksets + singular: networkset diff --git a/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/daemonset.yaml b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/daemonset.yaml new file mode 100755 index 0000000..8ee8512 --- /dev/null +++ b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/daemonset.yaml @@ -0,0 +1,266 @@ +--- +# Source: calico/templates/calico-node.yaml +# This manifest installs the canal container, as well +# as the CNI plugins and network config on +# each master and worker node in a Kubernetes cluster. +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: {{ .Release.Name | quote }} + namespace: kube-system + labels: + k8s-app: canal +spec: + selector: + matchLabels: + k8s-app: canal + updateStrategy: + type: RollingUpdate + rollingUpdate: + maxUnavailable: 1 + template: + metadata: + labels: + k8s-app: canal + annotations: + # This, along with the CriticalAddonsOnly toleration below, + # marks the pod as a critical add-on, ensuring it gets + # priority scheduling and that its resources are reserved + # if it ever gets evicted. + scheduler.alpha.kubernetes.io/critical-pod: '' + spec: + nodeSelector: + kubernetes.io/os: linux + hostNetwork: true + tolerations: + # Make sure canal gets scheduled on all nodes. + - effect: NoSchedule + operator: Exists + # Mark the pod as a critical add-on for rescheduling. + - key: CriticalAddonsOnly + operator: Exists + - effect: NoExecute + operator: Exists + serviceAccountName: canal + # Minimize downtime during a rolling upgrade or deletion; tell Kubernetes to do a "force + # deletion": https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods. + terminationGracePeriodSeconds: 0 + priorityClassName: system-node-critical + initContainers: + # This container installs the CNI binaries + # and CNI network config file on each node. + - name: install-cni + image: {{ template "system_default_registry" . }}{{ .Values.calico.cniImage.repository }}:{{ .Values.calico.cniImage.tag }} + command: ["/opt/cni/bin/install"] + env: + # Name of the CNI config file to create. + - name: CNI_CONF_NAME + value: "10-canal.conflist" + # The CNI network config to install on each node. + - name: CNI_NETWORK_CONFIG + valueFrom: + configMapKeyRef: + name: {{ .Release.Name }}-config + key: cni_network_config + # Set the hostname based on the k8s node name. + - name: KUBERNETES_NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + # CNI MTU Config variable + - name: CNI_MTU + valueFrom: + configMapKeyRef: + name: {{ .Release.Name }}-config + key: veth_mtu + # Prevents the container from sleeping forever. + - name: SLEEP + value: "false" + volumeMounts: + - mountPath: /host/opt/cni/bin + name: cni-bin-dir + - mountPath: /host/etc/cni/net.d + name: cni-net-dir + securityContext: + privileged: true + # Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes + # to communicate with Felix over the Policy Sync API. + - name: flexvol-driver + image: {{ template "system_default_registry" . }}{{ .Values.calico.flexvolImage.repository }}:{{ .Values.calico.flexvolImage.tag }} + command: ['/usr/local/bin/flexvol.sh', '-s', '/usr/local/bin/flexvol', '-i', 'flexvoldriver'] + volumeMounts: + - name: flexvol-driver-host + mountPath: /host/driver + securityContext: + privileged: true + containers: + # Runs canal container on each Kubernetes node. This + # container programs network policy and routes on each + # host. + - name: calico-node + command: + - "start_runit" + image: {{ template "system_default_registry" . }}{{ .Values.calico.nodeImage.repository }}:{{ .Values.calico.nodeImage.tag }} + env: + # Use Kubernetes API as the backing datastore. + - name: DATASTORE_TYPE + value: {{ .Values.calico.datastoreType | quote }} + # Configure route aggregation based on pod CIDR. + - name: USE_POD_CIDR + value: {{ .Values.calico.usePodCIDR | quote }} + # Wait for the datastore. + - name: WAIT_FOR_DATASTORE + value: {{ .Values.calico.waitForDatastore | quote }} + # Set based on the k8s node name. + - name: NODENAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + # Don't enable BGP. + - name: CALICO_NETWORKING_BACKEND + value: {{ .Values.calico.networkingBackend | quote }} + # Cluster type to identify the deployment type + - name: CLUSTER_TYPE + value: {{ .Values.calico.clusterType | quote}} + # Period, in seconds, at which felix re-applies all iptables state + - name: FELIX_IPTABLESREFRESHINTERVAL + value: {{ .Values.calico.felixIptablesRefreshInterval | quote}} + - name: FELIX_IPTABLESBACKEND + value: {{ .Values.calico.felixIptablesBackend | quote}} + # No IP address needed. + - name: IP + value: "" + # The default IPv4 pool to create on startup if none exists. Pod IPs will be + # chosen from this range. Changing this value after installation will have + # no effect. This should fall within `--cluster-cidr`. + # - name: CALICO_IPV4POOL_CIDR + # value: "192.168.0.0/16" + # Disable file logging so `kubectl logs` works. + - name: CALICO_DISABLE_FILE_LOGGING + value: "true" + # Set Felix endpoint to host default action to ACCEPT. + - name: FELIX_DEFAULTENDPOINTTOHOSTACTION + value: {{ .Values.calico.felixDefaultEndpointToHostAction | quote }} + # Disable IPv6 on Kubernetes. + - name: FELIX_IPV6SUPPORT + value: {{ .Values.calico.felixIpv6Support | quote }} + # Set Felix logging to "info" + - name: FELIX_LOGSEVERITYSCREEN + value: {{ .Values.calico.felixLogSeverityScreen | quote }} + - name: FELIX_HEALTHENABLED + value: {{ .Values.calico.felixHealthEnabled | quote }} + # enable promentheus metrics + - name: FELIX_PROMETHEUSMETRICSENABLED + value: {{ .Values.calico.felixPrometheusMetricsEnabled | quote }} + - name: FELIX_XDPENABLED + value: {{ .Values.calico.felixXDPEnabled | quote }} + - name: FELIX_FAILSAFEINBOUNDHOSTPORTS + value: {{ .Values.calico.felixFailsafeInboundHostPorts | quote }} + - name: FELIX_FAILSAFEOUTBOUNDHOSTPORTS + value: {{ .Values.calico.felixFailsafeOutboundHostPorts | quote }} + securityContext: + privileged: true + resources: + requests: + cpu: 250m + livenessProbe: + exec: + command: + - /bin/calico-node + - -felix-live + periodSeconds: 10 + initialDelaySeconds: 10 + failureThreshold: 6 + readinessProbe: + httpGet: + path: /readiness + port: 9099 + host: localhost + periodSeconds: 10 + volumeMounts: + - mountPath: /lib/modules + name: lib-modules + readOnly: true + - mountPath: /run/xtables.lock + name: xtables-lock + readOnly: false + - mountPath: /var/run/calico + name: var-run-calico + readOnly: false + - mountPath: /var/lib/calico + name: var-lib-calico + readOnly: false + - name: policysync + mountPath: /var/run/nodeagent + # This container runs flannel using the kube-subnet-mgr backend + # for allocating subnets. + - name: kube-flannel + image: {{ template "system_default_registry" . }}{{ .Values.flannel.image.repository }}:{{ .Values.flannel.image.tag }} + command: + - "/opt/bin/flanneld" + {{- range .Values.flannel.args }} + - {{ . | quote }} + {{- end }} + securityContext: + privileged: true + env: + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: POD_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: FLANNELD_IFACE + valueFrom: + configMapKeyRef: + name: {{ .Release.Name }}-config + key: canal_iface + - name: FLANNELD_IP_MASQ + valueFrom: + configMapKeyRef: + name: {{ .Release.Name }}-config + key: masquerade + volumeMounts: + - mountPath: /run/xtables.lock + name: xtables-lock + readOnly: false + - name: flannel-cfg + mountPath: /etc/kube-flannel/ + volumes: + # Used by canal. + - name: lib-modules + hostPath: + path: /lib/modules + - name: var-run-calico + hostPath: + path: /var/run/calico + - name: var-lib-calico + hostPath: + path: /var/lib/calico + - name: xtables-lock + hostPath: + path: /run/xtables.lock + type: FileOrCreate + # Used by flannel. + - name: flannel-cfg + configMap: + name: {{ .Release.Name }}-config + # Used to install CNI. + - name: cni-bin-dir + hostPath: + path: /opt/cni/bin + - name: cni-net-dir + hostPath: + path: /etc/cni/net.d + # Used to create per-pod Unix Domain Sockets + - name: policysync + hostPath: + type: DirectoryOrCreate + path: /var/run/nodeagent + # Used to install Flex Volume Driver + - name: flexvol-driver-host + hostPath: + type: DirectoryOrCreate + path: {{ .Values.calico.flexVolumePluginDir }}/nodeagent~uds diff --git a/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/rbac.yaml b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/rbac.yaml new file mode 100755 index 0000000..cd39730 --- /dev/null +++ b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/rbac.yaml @@ -0,0 +1,163 @@ +--- +# Source: calico/templates/rbac.yaml + +# Include a clusterrole for the calico-node DaemonSet, +# and bind it to the calico-node serviceaccount. +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: calico-node +rules: + # The CNI plugin needs to get pods, nodes, and namespaces. + - apiGroups: [""] + resources: + - pods + - nodes + - namespaces + verbs: + - get + - apiGroups: [""] + resources: + - endpoints + - services + verbs: + # Used to discover service IPs for advertisement. + - watch + - list + # Used to discover Typhas. + - get + # Pod CIDR auto-detection on kubeadm needs access to config maps. + - apiGroups: [""] + resources: + - configmaps + verbs: + - get + - apiGroups: [""] + resources: + - nodes/status + verbs: + # Needed for clearing NodeNetworkUnavailable flag. + - patch + # Calico stores some configuration information in node annotations. + - update + # Watch for changes to Kubernetes NetworkPolicies. + - apiGroups: ["networking.k8s.io"] + resources: + - networkpolicies + verbs: + - watch + - list + # Used by Calico for policy information. + - apiGroups: [""] + resources: + - pods + - namespaces + - serviceaccounts + verbs: + - list + - watch + # The CNI plugin patches pods/status. + - apiGroups: [""] + resources: + - pods/status + verbs: + - patch + # Calico monitors various CRDs for config. + - apiGroups: ["crd.projectcalico.org"] + resources: + - globalfelixconfigs + - felixconfigurations + - bgppeers + - globalbgpconfigs + - bgpconfigurations + - ippools + - ipamblocks + - globalnetworkpolicies + - globalnetworksets + - networkpolicies + - networksets + - clusterinformations + - hostendpoints + - blockaffinities + verbs: + - get + - list + - watch + # Calico must create and update some CRDs on startup. + - apiGroups: ["crd.projectcalico.org"] + resources: + - ippools + - felixconfigurations + - clusterinformations + verbs: + - create + - update + # Calico stores some configuration information on the node. + - apiGroups: [""] + resources: + - nodes + verbs: + - get + - list + - watch + # These permissions are only requried for upgrade from v2.6, and can + # be removed after upgrade or on fresh installations. + - apiGroups: ["crd.projectcalico.org"] + resources: + - bgpconfigurations + - bgppeers + verbs: + - create + - update + +--- +# Flannel ClusterRole +# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: flannel +rules: + - apiGroups: [""] + resources: + - pods + verbs: + - get + - apiGroups: [""] + resources: + - nodes + verbs: + - list + - watch + - apiGroups: [""] + resources: + - nodes/status + verbs: + - patch +--- +# Bind the flannel ClusterRole to the canal ServiceAccount. +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: canal-flannel +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: flannel +subjects: +- kind: ServiceAccount + name: canal + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: canal-calico +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: calico-node +subjects: +- kind: ServiceAccount + name: canal + namespace: kube-system diff --git a/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/serviceaccount.yaml b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/serviceaccount.yaml new file mode 100755 index 0000000..582d55b --- /dev/null +++ b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/templates/serviceaccount.yaml @@ -0,0 +1,6 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: canal + namespace: kube-system diff --git a/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/values.yaml b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/values.yaml new file mode 100755 index 0000000..a997198 --- /dev/null +++ b/charts/rke2-canal/rke2-canal/v3.19.1-build2021061107/values.yaml @@ -0,0 +1,80 @@ +--- + +# The IPv4 cidr pool to create on startup if none exists. Pod IPs will be +# chosen from this range. +podCidr: "10.42.0.0/16" + +flannel: + # kube-flannel image + image: + repository: rancher/hardened-flannel + tag: v0.14.0-build20210611 + # The interface used by canal for host <-> host communication. + # If left blank, then the interface is chosen using the node's + # default route. + iface: "" + # kube-flannel command arguments + args: + - "--ip-masq" + - "--kube-subnet-mgr" + # Backend for kube-flannel. Backend should not be changed + # at runtime. + backend: "vxlan" + +calico: + # CNI installation image. + cniImage: + repository: rancher/hardened-calico + tag: v3.19.1-build20210611 + # Canal node image. + nodeImage: + repository: rancher/hardened-calico + tag: v3.19.1-build20210611 + # Flexvol Image. + flexvolImage: + repository: rancher/hardened-calico + tag: v3.19.1-build20210611 + # Datastore type for canal. It can be either kuberentes or etcd. + datastoreType: kubernetes + # Wait for datastore to initialize. + waitForDatastore: true + # Configure route aggregation based on pod CIDR. + usePodCIDR: true + # Disable BGP routing. + networkingBackend: none + # Cluster type to identify the deployment type. + clusterType: "k8s,canal" + # Disable file logging so `kubectl logs` works. + disableFileLogging: true + # Disable IPv6 on Kubernetes. + felixIpv6Support: false + # Period, in seconds, at which felix re-applies all iptables state + felixIptablesRefreshInterval: 60 + # iptables backend to use for felix, defaults to auto but can also be set to nft or legacy + felixIptablesBackend: auto + # Set Felix logging to "info". + felixLogSeverityScreen: info + # Enable felix healthcheck. + felixHealthEnabled: true + # Enable prometheus metrics + felixPrometheusMetricsEnabled: true + # Disable XDP Acceleration as we do not support it with our ubi7 base image + felixXDPEnabled: false + # Whether or not to masquerade traffic to destinations not within + # the pod network. + masquerade: true + # Set Felix endpoint to host default action to ACCEPT. + felixDefaultEndpointToHostAction: ACCEPT + # Configure the MTU to use. + vethuMTU: 1450 + # Typha is disabled. + typhaServiceName: none + # Kubelet flex-volume-plugin-dir + flexVolumePluginDir: /var/lib/kubelet/volumeplugins + # calico inbound failsafe ports. Empty string means defaults. Use 'none' to disable failsafe if you have your own rules. + felixFailsafeInboundHostPorts: "" + # calico outbound failsafe ports. Empty string means defaults. Use 'none' to disable failsafe if you have your own rules. + felixFailsafeOutboundHostPorts: "" + +global: + systemDefaultRegistry: "" diff --git a/index.yaml b/index.yaml index 925d3a1..c08fb8b 100755 --- a/index.yaml +++ b/index.yaml @@ -123,6 +123,23 @@ entries: - assets/rke2-calico/rke2-calico-crd-v1.0.001.tgz version: v1.0.001 rke2-canal: + - apiVersion: v1 + appVersion: v3.19.1 + created: "2021-06-14T13:08:06.537376923Z" + description: Install Canal Network Plugin. + digest: 1e0f24a41ba129941eadb74bb8ed9a24f7bba8436097644c9df561d27b4c6f31 + home: https://www.projectcalico.org/ + keywords: + - canal + maintainers: + - email: charts@rancher.com + name: Rancher Labs + name: rke2-canal + sources: + - https://github.com/rancher/rke2-charts + urls: + - assets/rke2-canal/rke2-canal-v3.19.1-build2021061107.tgz + version: v3.19.1-build2021061107 - apiVersion: v1 appVersion: v3.13.3 created: "2021-05-13T00:29:51.973947628Z"