From 1016444edc2a2f365601cc705211674d3fbcd0b0 Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:04:33 -0300 Subject: [PATCH 01/13] clean release.yaml --- release.yaml | 11 +---------- 1 file changed, 1 insertion(+), 10 deletions(-) diff --git a/release.yaml b/release.yaml index 464223860a..8b13789179 100644 --- a/release.yaml +++ b/release.yaml @@ -1,10 +1 @@ -rancher-logging: - - 103.1.3+up4.8.0 -rancher-logging-crd: - - 103.1.3+up4.8.0 -rancher-monitoring: - - 103.2.0+up57.0.3 -rancher-monitoring-crd: - - 103.2.0+up57.0.3 -prometheus-federator: - - 103.1.0+up0.4.2 + From 0a94ff013d8c86ae03cb9c41f8df73e0dd1223f9 Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:06:39 -0300 Subject: [PATCH 02/13] forward-port fleet 102.2.6+up0.8.5 --- assets/fleet/fleet-102.2.6+up0.8.5.tgz | Bin 0 -> 5232 bytes charts/fleet/102.2.6+up0.8.5/Chart.yaml | 23 ++++ charts/fleet/102.2.6+up0.8.5/README.md | 30 +++++ .../102.2.6+up0.8.5/charts/gitjob/.helmignore | 23 ++++ .../102.2.6+up0.8.5/charts/gitjob/Chart.yaml | 5 + .../charts/gitjob/templates/_helpers.tpl | 7 ++ .../charts/gitjob/templates/clusterrole.yaml | 38 ++++++ .../gitjob/templates/clusterrolebinding.yaml | 12 ++ .../charts/gitjob/templates/deployment.yaml | 51 ++++++++ .../charts/gitjob/templates/leases.yaml | 23 ++++ .../charts/gitjob/templates/service.yaml | 12 ++ .../gitjob/templates/serviceaccount.yaml | 4 + .../102.2.6+up0.8.5/charts/gitjob/values.yaml | 31 +++++ .../102.2.6+up0.8.5/templates/_helpers.tpl | 22 ++++ .../102.2.6+up0.8.5/templates/configmap.yaml | 25 ++++ .../102.2.6+up0.8.5/templates/deployment.yaml | 102 ++++++++++++++++ .../job_cleanup_clusterregistrations.yaml | 29 +++++ .../fleet/102.2.6+up0.8.5/templates/rbac.yaml | 114 ++++++++++++++++++ .../templates/serviceaccount.yaml | 12 ++ charts/fleet/102.2.6+up0.8.5/values.yaml | 83 +++++++++++++ index.yaml | 27 +++++ release.yaml | 3 +- 22 files changed, 675 insertions(+), 1 deletion(-) create mode 100644 assets/fleet/fleet-102.2.6+up0.8.5.tgz create mode 100644 charts/fleet/102.2.6+up0.8.5/Chart.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/README.md create mode 100644 charts/fleet/102.2.6+up0.8.5/charts/gitjob/.helmignore create mode 100644 charts/fleet/102.2.6+up0.8.5/charts/gitjob/Chart.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/_helpers.tpl create mode 100644 charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/clusterrole.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/clusterrolebinding.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/deployment.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/leases.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/service.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/serviceaccount.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/charts/gitjob/values.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/templates/_helpers.tpl create mode 100644 charts/fleet/102.2.6+up0.8.5/templates/configmap.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/templates/deployment.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/templates/job_cleanup_clusterregistrations.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/templates/rbac.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/templates/serviceaccount.yaml create mode 100644 charts/fleet/102.2.6+up0.8.5/values.yaml diff --git a/assets/fleet/fleet-102.2.6+up0.8.5.tgz b/assets/fleet/fleet-102.2.6+up0.8.5.tgz new file mode 100644 index 0000000000000000000000000000000000000000..a64d0f8621a3a087f37f88af7c091c51890ae9c9 GIT binary patch literal 5232 zcmV-$6p!m4iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH<$a~rvl`+0svA9YvW^@+oWUOv`l?-WUPoXECLk~f!1r4(?c zNy5SavjB!NSJD0UD?Da6GaQPtB-59K*eb6Ek4B@>=x#L7;D{mW&e4QO9nMI?zWWNP z+wFGucX#doyWMX6|GnM4z3+Ov`#asn|iX-6{tO+s`uX>1Xp)O18K z9)Kh~nxJf~hM!ZEG(oNj8$e6T3|oyACp3+c%WQ;zl*s zmSRd{RPFIp4j^Kg(kNAEaVS-r_6SQSq}K?;Q@Kijet6)=-w*E@zC?yZVcU?wPj5g{ z`g0Cy+7C#Y7N6blRk#<#m?DpnM--?P+>`&%#8uaKPl zpAwd#`dSKLh5X+==yvP!e{bhtBmdWtXhOy~s4YytT-@>q05lm7VCvQYfNgS?F?J>x zjb;OQJ9;nlnM8$L2LTx)*Kb#XZQFWZ3VaJ*3z>^akT|AFORK&>PY}{<$Y=x~&rd;& zY|bCDAxe%K6&#+u1%+~o5|T`57$PXtFhPmI7My%0Ny>08I?!c=kw^ynySqC^EMC~= zAJ0z*&}yy51`|LYi5O$BD=bIq=-Vb8*Ar=rEiQ=jbpW%^}2@$6skl`4~n*!bIGF7-{5Sr%ZvGh>XQ{ zYNZAO6C_d(k!UyfM-z;$DSyi~%Bj`uy}iW3|KkMp1SQNw1~-Ij&;kf!;-;WsmI_`Y zqyUv-L`O42Fe-tOAu<&Pbj*dsBiHb})a2Aw7{G`yg{Iphkr}i{QY1zZ8N7i=1d(Yo z4{F9ExS@Ii!;Hrak1=IpW(*ThnrIAzE%?2e5s6yPfN~(fvt)?Uwnn4<%w!n+BpRx7 z0b_|o!ws340cc6bMq3dMI5lwfglLEbD*i%4L^6dyfC-U?ZmPM^cJgB!k&M~N?(OAW znL3_cC;XQTGdxB{W&`N;yUL8$aPXhiUm%s@^UU*9u;o4-e-ApHA2Ws0XuY5Q>&KKR zbt7c_)8NNUvY!S&nu-0%fQm$t5Kx#BNi@d5sIoMRMM5Z7ASBQfNE}O43Y8n!4Q0#@ z!Hml;1k-cC#hJsP*FOlm=D*IX?Ou2O=Rw~ZZDF_5>u>k|!+gDRpZnXPnnv59A9lz@ zL|70Eh0tc!QzL1-$uR(9CI$doa5+IJ%)1h5Lj+^hMrMjI2Et>Dr3G4WVqViRBT9^c za&OOgd(p`;hs$DrH5TAgpd+`+Elj(%ZE?;ES}ZYCZ3pk?=(SoF z!l7NLcB#d&v6H+p51J-rs>GJxJt=&>C|x z7Ln?hrPLm0G{z1WF}4*ljLf(@!PZt_vMy|nkOR2AGZ0VxIx=OT2{rP`P+l-J3k|-P z_)A75R^+?Z+ujkqw|5q*A10Of(*w>gQK&Lkfu_M zs{9ecnG|L_psZky1T*Bq*woULXChNHlDaJ;M${CpbqlgXsLq0Pamc}p@EK9J) zeG%bib@{zkylpw$>vtHUQ9zlIUK6488PStqD@wC7gXSRE0^iR7TKiqqG8wLuqjDd% zA`}q(r(@0mbaaw-?6~uMJxg%_$5dLjn0=5(RvHCCLdUYSA74~&M+^ziQcvBd+JDae z*O;V?XjGl639{7eKy~_TTY**npYHx{&HmrrKiJ*a|LaJ%w{4?YC`V{HF?r<`&6PL9 zW-Vyn-36v19YOfB+bTLin>!L31#HnQm6YodwEj(XT8{#NOkwfSn&X2!Uidq>z3sdV z{^(pTRRwGGU!g^f%(dd)`e>{mR@;H8;sk=rE{R$rM{k6@W`e{mKYcg;&!pJDZ_u|6$Z?Z*d z;2AB`I{76dtW~E>BO1!NrZSBnP1YP%3F`adhY!4EJ}DN3hWD=x_n$nnR}6VMC2FgcWX<)&S?Hy3kM|OWq-jHQC^WfmSnAOvR)Mh`3P6sCNv4QUjsMig0mj-zU>&$q6h0{OY9U+D1l>B-6E)!F%nv%@!s zmnT=pC%^sp=IY|)^78HbHy2lzAFdAHoV>rhsN-X_E&P%RjfLjF-w6kIcLj{v7QW#O zpe1=Pi_4SqtCRQt{qf|ZLHP9WPmS0;5PZI$T#lbRzG%SccbAuEhIapRKLYo* zzjz9O_a7e6+8=j(*_d;`<2@5`_VMcM?EJ&)tK+xliwMj;jh(O5?b*rs+YiSNV9Xq7 z==`T&MhNR@ZbIki@bdE1@ZZl@?>-zaEZEXDp`~59GjDkDCHsd0FFIs6btf9{>_K_CX&VxgcUGKYRKPm6F6TZ#t~3DkM~` zc3)XKmL$f->g^aAYHX*uv({#+EQ%2AO@JYegv7SZwikk^;KgS4(R)&Njk&rR{Q^-h z(J-aXt-<#=EsC19w2ru*taU4QU0(9##%#%!^@qNT#_UR4c1~qEt|sjTbLpxImC$ zDPsXnEllRIVC=oZTFb(Br|hSf-o#07^+=%ZjLAVPPTC&=Z0Xc2_K~Yq!941vj3MPQ zi|E9T?9k#TFu9QPj3OhB2zARP-nwW7-`FmuGvLJAun%P zx$}E_8=kw6sjzem_b3`YbrCf&*cUNXB!rA9zn`7#Sf7b2*24~8ix28s)JE^t)7HuZ zs8aHkEn^HP^d2M$*R-5Pp!I#r@H-D)pO5d39hjJx;wr4 z{onomUUy^vts^zw|EjH(2Z-uN$;QX`S6Zci_bc$*Cb$02PY#dYorFpJRr*+U|MOs{ z9{=0h-`U*%UrXBZ0rkH_mVkW*BnVs%Ri)T^6%mFZ6eTgvgNqUyiw{Z0G))=KA2G0@ zKYyGM+rl>e&mef2t8zd-rW^-zpk(gd@<446CgE`@fXO$jU?4^#l#nTu3KC%hh^(Xl zABbBGwlnY|!IdUlLn1iU!p6Gli4@s*;zykib|fMj8^nbM!PzW_>CWD4yqqP@HViWj zR0Cm3z?e=^d5j25=y(D#jwRX<;2b-H$doENhvcyV{7fRvW^m()=e?a6=e_5Fd4`^) zc-1-8aQZa&Lp=nmReLhH&n72)DkrI zk+wM>6wz%p__RtWI5ZO>QDsbT`-w5MLH@}!T{1=6mQkqE$fKDFo_e3Y880BNwJ8gjhtG zeN@HHjp-S=mW0t?Ep;tX{v3-4Zg8lm#=m@@2R1rqO6jSLA3`5mh&CG0)K)?8#s;OE z`54(i?pW{_8YX0lKy~P*YR7c^DN`B<9G$)m15Xwgcxp!<1o@}Is3e5kXyAJnO>Njj z-v}6@3zNRVA{yDoZy%i>yQobgeG-#9V))rFsqlwE5d8J8e+~ZCVeBHm!<^#`% z?5?+(kvn_Cv}yadNpcWv-V}XX#MHLkA%c5P#l-=)+c$*j`O7)(uTJs(Jdn#!&5$1| z|6Q}n11!(}8q_NLzqfx-zyI0Y-QVc{b)*$<{nQ@cIVvo07dS364xhwO!H_7YoQzJf zZyczg^72pZNuO^$>`n5iY5hO0I+{*h8)|G3chRZ?2ma2=G}7T z?qC0Ck2UpsE_4gn9-JPBOX8o@tJ?mMuHy8c6w6RPoC)4i2Udvt;b(TlvjM^2y zF#AatIa3@~`x1MC-3)U%xKzYTz!~fB#r$)O<*yrq1pY~^55SN`wI8}ySsJ!uix80=xyZxI?~s;{o~lE z?K$Q-Z~S-#Gr!$qcfZZ|dlsG^uifW?#S1;~&u2g0zy6=+HHa1Kzkkr%tJ{CQ{muFR zTGAumf5;c&7rpx6O^VjzB5O*mR|nRV7JXC9j1e1;iH|7eUH&*uxQZIE$}OJOWU|D-_L88eXDU!YixU?ja8`z|zMU8oD(Z_VM*4k-x51 z&E-9BnnwjU2Xd|MtsVyLs?}ZbPwH=dp~sJq|M%;EclrORCxNT%|NUP5{Qsc8w|W0* zE$Mk;RvzZ~X^1yj?vQY-x6JME{Lv@*5S}6C))GJPZR*F)_;G$;rwTF z{=b%V-+lbmc7G~l{$5OO7EH8G+pqHXDNKa{%s-{jA`)x>mq%y0YA14x`pj3fRjb>H ziuM1k>GhA69<=_S7!9;){dW)Q`~P0Ix4Hkfmh`xIoNuMAHtD%j)A|o5$P)LK^Rx7^ zYW?r+)Z_p5`g2y5F~OlMXi%EYrn+PQb?67-@K@Qf|K=H!amW0Vf2t|( z%mEEabe*O4*GN_HGE_Hd@G=~d>)>Um6Z5x_bR4|=-(U-VCX$Lw!Q0~#6@;l2#=s9k q8YAhr>Qa0P!l{ZxjGb>ix0|#{o3u&yrT+^60RR6}y!RUbegFVeEluqJ literal 0 HcmV?d00001 diff --git a/charts/fleet/102.2.6+up0.8.5/Chart.yaml b/charts/fleet/102.2.6+up0.8.5/Chart.yaml new file mode 100644 index 0000000000..29fcc37ddd --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/Chart.yaml @@ -0,0 +1,23 @@ +annotations: + catalog.cattle.io/auto-install: fleet-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/experimental: "true" + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.16.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-fleet-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: clusters.fleet.cattle.io/v1alpha1 + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: fleet +apiVersion: v2 +appVersion: 0.8.5 +dependencies: +- condition: gitops.enabled + name: gitjob + repository: file://./charts/gitjob + version: 0.8.8 +description: Fleet Manager - GitOps at Scale +icon: https://charts.rancher.io/assets/logos/fleet.svg +name: fleet +version: 102.2.6+up0.8.5 diff --git a/charts/fleet/102.2.6+up0.8.5/README.md b/charts/fleet/102.2.6+up0.8.5/README.md new file mode 100644 index 0000000000..2f2a4c302a --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/README.md @@ -0,0 +1,30 @@ +# Fleet Helm Chart + +Fleet is GitOps at scale. Fleet is designed to manage multiple clusters. + +## What is Fleet? + +* Cluster engine: Fleet is a container management and deployment engine designed to offer users more control on the local cluster and constant monitoring through GitOps. Fleet focuses not only on the ability to scale, but it also gives users a high degree of control and visibility to monitor exactly what is installed on the cluster. + +* Deployment management: Fleet can manage deployments from git of raw Kubernetes YAML, Helm charts, Kustomize, or any combination of the three. Regardless of the source, all resources are dynamically turned into Helm charts, and Helm is used as the engine to deploy all resources in the cluster. As a result, users can enjoy a high degree of control, consistency, and auditability of their clusters. + +## Introduction + +This chart deploys Fleet on a Kubernetes cluster. It also deploys some of its dependencies as subcharts. + +The documentation is centralized in the [doc website](https://fleet.rancher.io/). + +## Prerequisites + +Get helm if you don't have it. Helm 3 is just a CLI. + + +## Install Fleet + +Install the Fleet Helm charts (there are two because we separate out CRDs for ultimate flexibility.): + +``` +$ helm repo add fleet https://rancher.github.io/fleet-helm-charts/ +$ helm -n cattle-fleet-system install --create-namespace --wait fleet-crd fleet/fleet-crd +$ helm -n cattle-fleet-system install --create-namespace --wait fleet fleet/fleet +``` \ No newline at end of file diff --git a/charts/fleet/102.2.6+up0.8.5/charts/gitjob/.helmignore b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/.helmignore new file mode 100644 index 0000000000..691fa13d6a --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/.helmignore @@ -0,0 +1,23 @@ +# Patterns to ignore when building packages. +# This supports shell glob matching, relative path matching, and +# negation (prefixed with !). Only one pattern per line. +.DS_Store +# Common VCS dirs +.git/ +.gitignore +.bzr/ +.bzrignore +.hg/ +.hgignore +.svn/ +# Common backup files +*.swp +*.bak +*.tmp +*.orig +*~ +# Various IDEs +.project +.idea/ +*.tmproj +.vscode/ \ No newline at end of file diff --git a/charts/fleet/102.2.6+up0.8.5/charts/gitjob/Chart.yaml b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/Chart.yaml new file mode 100644 index 0000000000..ffbc70a1b6 --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/Chart.yaml @@ -0,0 +1,5 @@ +apiVersion: v2 +appVersion: 0.8.8 +description: Controller that run jobs based on git events +name: gitjob +version: 0.8.8 diff --git a/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/_helpers.tpl b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/_helpers.tpl new file mode 100644 index 0000000000..f652b5643d --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/_helpers.tpl @@ -0,0 +1,7 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} \ No newline at end of file diff --git a/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/clusterrole.yaml b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/clusterrole.yaml new file mode 100644 index 0000000000..bcad90164f --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/clusterrole.yaml @@ -0,0 +1,38 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: gitjob +rules: + - apiGroups: + - "batch" + resources: + - 'jobs' + verbs: + - '*' + - apiGroups: + - "" + resources: + - 'pods' + verbs: + - 'list' + - 'get' + - 'watch' + - apiGroups: + - "" + resources: + - 'secrets' + verbs: + - '*' + - apiGroups: + - "" + resources: + - 'configmaps' + verbs: + - '*' + - apiGroups: + - "gitjob.cattle.io" + resources: + - "gitjobs" + - "gitjobs/status" + verbs: + - "*" \ No newline at end of file diff --git a/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/clusterrolebinding.yaml b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/clusterrolebinding.yaml new file mode 100644 index 0000000000..0bf07c4ef8 --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/clusterrolebinding.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: gitjob-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: gitjob +subjects: + - kind: ServiceAccount + name: gitjob + namespace: {{ .Release.Namespace }} \ No newline at end of file diff --git a/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/deployment.yaml b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/deployment.yaml new file mode 100644 index 0000000000..e7bbe5f20a --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/deployment.yaml @@ -0,0 +1,51 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: gitjob +spec: + selector: + matchLabels: + app: "gitjob" + template: + metadata: + labels: + app: "gitjob" + spec: + serviceAccountName: gitjob + containers: + - image: "{{ template "system_default_registry" . }}{{ .Values.gitjob.repository }}:{{ .Values.gitjob.tag }}" + name: gitjob + args: + {{- if .Values.debug }} + - --debug + {{- end }} + - --tekton-image + - "{{ template "system_default_registry" . }}{{ .Values.tekton.repository }}:{{ .Values.tekton.tag }}" + env: + - name: NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + {{- if .Values.proxy }} + - name: HTTP_PROXY + value: {{ .Values.proxy }} + - name: HTTPS_PROXY + value: {{ .Values.proxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} + {{- end }} + {{- if .Values.debug }} + - name: CATTLE_DEV_MODE + value: "true" + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} diff --git a/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/leases.yaml b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/leases.yaml new file mode 100644 index 0000000000..51f9339509 --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/leases.yaml @@ -0,0 +1,23 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: gitjob +rules: + - apiGroups: + - "coordination.k8s.io" + resources: + - "leases" + verbs: + - "*" +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: gitjob +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: gitjob +subjects: + - kind: ServiceAccount + name: gitjob diff --git a/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/service.yaml b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/service.yaml new file mode 100644 index 0000000000..bf57c1b55c --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/service.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +kind: Service +metadata: + name: gitjob +spec: + ports: + - name: http-80 + port: 80 + protocol: TCP + targetPort: 8080 + selector: + app: "gitjob" \ No newline at end of file diff --git a/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/serviceaccount.yaml b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/serviceaccount.yaml new file mode 100644 index 0000000000..5f8aecb045 --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/templates/serviceaccount.yaml @@ -0,0 +1,4 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: gitjob diff --git a/charts/fleet/102.2.6+up0.8.5/charts/gitjob/values.yaml b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/values.yaml new file mode 100644 index 0000000000..85a398423e --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/charts/gitjob/values.yaml @@ -0,0 +1,31 @@ +gitjob: + repository: rancher/gitjob + tag: v0.8.8 + +tekton: + repository: rancher/tekton-utils + tag: v0.1.44 + +global: + cattle: + systemDefaultRegistry: "" + +# http[s] proxy server +# proxy: http://@:: + +# comma separated list of domains or ip addresses that will not use the proxy +noProxy: 127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.svc,.cluster.local + +nodeSelector: + kubernetes.io/os: linux + +tolerations: + - key: cattle.io/os + operator: "Equal" + value: "linux" + effect: NoSchedule + +# PriorityClassName assigned to deployment. +priorityClassName: "" + +debug: false diff --git a/charts/fleet/102.2.6+up0.8.5/templates/_helpers.tpl b/charts/fleet/102.2.6+up0.8.5/templates/_helpers.tpl new file mode 100644 index 0000000000..6cd96c3ace --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/templates/_helpers.tpl @@ -0,0 +1,22 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} \ No newline at end of file diff --git a/charts/fleet/102.2.6+up0.8.5/templates/configmap.yaml b/charts/fleet/102.2.6+up0.8.5/templates/configmap.yaml new file mode 100644 index 0000000000..07f1b5924d --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/templates/configmap.yaml @@ -0,0 +1,25 @@ +apiVersion: v1 +kind: ConfigMap +metadata: + name: fleet-controller +data: + config: | + { + "systemDefaultRegistry": "{{ template "system_default_registry" . }}", + "agentImage": "{{ template "system_default_registry" . }}{{.Values.agentImage.repository}}:{{.Values.agentImage.tag}}", + "agentImagePullPolicy": "{{ .Values.agentImage.imagePullPolicy }}", + "apiServerURL": "{{.Values.apiServerURL}}", + "apiServerCA": "{{b64enc .Values.apiServerCA}}", + "agentCheckinInterval": "{{.Values.agentCheckinInterval}}", + "ignoreClusterRegistrationLabels": {{.Values.ignoreClusterRegistrationLabels}}, + "bootstrap": { + "paths": "{{.Values.bootstrap.paths}}", + "repo": "{{.Values.bootstrap.repo}}", + "secret": "{{.Values.bootstrap.secret}}", + "branch": "{{.Values.bootstrap.branch}}", + "namespace": "{{.Values.bootstrap.namespace}}", + "agentNamespace": "{{.Values.bootstrap.agentNamespace}}", + }, + "webhookReceiverURL": "{{.Values.webhookReceiverURL}}", + "githubURLPrefix": "{{.Values.githubURLPrefix}}" + } diff --git a/charts/fleet/102.2.6+up0.8.5/templates/deployment.yaml b/charts/fleet/102.2.6+up0.8.5/templates/deployment.yaml new file mode 100644 index 0000000000..164340c444 --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/templates/deployment.yaml @@ -0,0 +1,102 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: fleet-controller +spec: + selector: + matchLabels: + app: fleet-controller + template: + metadata: + labels: + app: fleet-controller + spec: + containers: + - env: + - name: NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: FLEET_PROPAGATE_DEBUG_SETTINGS_TO_AGENTS + value: {{ quote .Values.propagateDebugSettingsToAgents }} + {{- if .Values.clusterEnqueueDelay }} + - name: FLEET_CLUSTER_ENQUEUE_DELAY + value: {{ .Values.clusterEnqueueDelay }} + {{- end }} + {{- if .Values.proxy }} + - name: HTTP_PROXY + value: {{ .Values.proxy }} + - name: HTTPS_PROXY + value: {{ .Values.proxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} + {{- end }} + {{- if .Values.cpuPprof }} + - name: FLEET_CPU_PPROF_DIR + value: /tmp/pprof/ + {{- end }} + {{- if .Values.cpuPprof }} + - name: FLEET_CPU_PPROF_PERIOD + value: {{ quote .Values.cpuPprof.period }} + {{- end }} + {{- if .Values.debug }} + - name: CATTLE_DEV_MODE + value: "true" + {{- end }} + image: '{{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }}' + name: fleet-controller + imagePullPolicy: "{{ .Values.image.imagePullPolicy }}" + command: + - fleetcontroller + {{- if not .Values.gitops.enabled }} + - --disable-gitops + {{- end }} + {{- if not .Values.bootstrap.enabled }} + - --disable-bootstrap + {{- end }} + {{- if .Values.debug }} + - --debug + - --debug-level + - {{ quote .Values.debugLevel }} + {{- else }} + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + privileged: false + capabilities: + drop: + - ALL + {{- end }} + volumeMounts: + - mountPath: /tmp + name: tmp + {{- if .Values.cpuPprof }} + - mountPath: /tmp/pprof + name: pprof + {{- end }} + volumes: + - name: tmp + emptyDir: {} + {{- if .Values.cpuPprof }} + - name: pprof {{ toYaml .Values.cpuPprof.volumeConfiguration | nindent 10 }} + {{- end }} + + serviceAccountName: fleet-controller + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + +{{- if not .Values.debug }} + securityContext: + runAsNonRoot: true + runAsUser: 1000 + runAsGroup: 1000 +{{- end }} diff --git a/charts/fleet/102.2.6+up0.8.5/templates/job_cleanup_clusterregistrations.yaml b/charts/fleet/102.2.6+up0.8.5/templates/job_cleanup_clusterregistrations.yaml new file mode 100644 index 0000000000..fa59cc575f --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/templates/job_cleanup_clusterregistrations.yaml @@ -0,0 +1,29 @@ +{{- if .Values.migrations.clusterRegistrationCleanup }} +--- +apiVersion: batch/v1 +kind: Job +metadata: + name: fleet-cleanup-clusterregistrations + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +spec: + template: + metadata: + labels: + app: fleet-job + spec: + serviceAccountName: fleet-controller + restartPolicy: Never + containers: + - name: cleanup + image: "{{ template "system_default_registry" . }}{{.Values.agentImage.repository}}:{{.Values.agentImage.tag}}" + imagePullPolicy: {{ .Values.global.imagePullPolicy }} + command: + - fleet + args: + - cleanup + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} + backoffLimit: 1 +{{- end }} diff --git a/charts/fleet/102.2.6+up0.8.5/templates/rbac.yaml b/charts/fleet/102.2.6+up0.8.5/templates/rbac.yaml new file mode 100644 index 0000000000..361d68c08b --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/templates/rbac.yaml @@ -0,0 +1,114 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: fleet-controller +rules: +- apiGroups: + - gitjob.cattle.io + resources: + - '*' + verbs: + - '*' +- apiGroups: + - fleet.cattle.io + resources: + - '*' + verbs: + - '*' +- apiGroups: + - "" + resources: + - namespaces + - serviceaccounts + verbs: + - '*' +- apiGroups: + - "" + resources: + - secrets + - configmaps + verbs: + - '*' +- apiGroups: + - rbac.authorization.k8s.io + resources: + - clusterroles + - clusterrolebindings + - roles + - rolebindings + verbs: + - '*' + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: fleet-controller +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: fleet-controller +subjects: +- kind: ServiceAccount + name: fleet-controller + namespace: {{.Release.Namespace}} + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: fleet-controller +rules: +- apiGroups: + - "" + resources: + - configmaps + verbs: + - '*' +- apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - '*' + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: fleet-controller +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: fleet-controller +subjects: +- kind: ServiceAccount + name: fleet-controller + +{{- if .Values.bootstrap.enabled }} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: fleet-controller-bootstrap +rules: +- apiGroups: + - '*' + resources: + - '*' + verbs: + - '*' +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: fleet-controller-bootstrap +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: fleet-controller-bootstrap +subjects: +- kind: ServiceAccount + name: fleet-controller-bootstrap + namespace: {{.Release.Namespace}} +{{- end }} diff --git a/charts/fleet/102.2.6+up0.8.5/templates/serviceaccount.yaml b/charts/fleet/102.2.6+up0.8.5/templates/serviceaccount.yaml new file mode 100644 index 0000000000..ba27c748d7 --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/templates/serviceaccount.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: fleet-controller + +{{- if .Values.bootstrap.enabled }} +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: fleet-controller-bootstrap +{{- end }} diff --git a/charts/fleet/102.2.6+up0.8.5/values.yaml b/charts/fleet/102.2.6+up0.8.5/values.yaml new file mode 100644 index 0000000000..807b9f8c84 --- /dev/null +++ b/charts/fleet/102.2.6+up0.8.5/values.yaml @@ -0,0 +1,83 @@ +image: + repository: rancher/fleet + tag: v0.8.5 + imagePullPolicy: IfNotPresent + +agentImage: + repository: rancher/fleet-agent + tag: v0.8.5 + imagePullPolicy: IfNotPresent + +# For cluster registration the public URL of the Kubernetes API server must be set here +# Example: https://example.com:6443 +apiServerURL: "" + +# For cluster registration the pem encoded value of the CA of the Kubernetes API server must be set here +# If left empty it is assumed this Kubernetes API TLS is signed by a well known CA. +apiServerCA: "" + +# A duration string for how often agents should report a heartbeat +agentCheckinInterval: "15m" + +# Whether you want to allow cluster upon registration to specify their labels. +ignoreClusterRegistrationLabels: false + +# Counts from gitrepo are out of sync with bundleDeployment state. +# Just retry in a number of seconds as there is no great way to trigger an event that doesn't cause a loop. +# If not set default is 15 seconds. +# clusterEnqueueDelay: 120s + +# http[s] proxy server +# proxy: http://@:: + +# comma separated list of domains or ip addresses that will not use the proxy +noProxy: 127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.svc,.cluster.local + +bootstrap: + enabled: true + # The namespace that will be autocreated and the local cluster will be registered in + namespace: fleet-local + # The namespace where the fleet agent for the local cluster will be ran, if empty + # this will default to cattle-fleet-system + agentNamespace: "" + # A repo to add at install time that will deploy to the local cluster. This allows + # one to fully bootstrap fleet, its configuration and all its downstream clusters + # in one shot. + repo: "" + secret: "" + branch: master + paths: "" + + +global: + cattle: + systemDefaultRegistry: "" + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" + +gitops: + enabled: true + +debug: false +debugLevel: 0 +propagateDebugSettingsToAgents: true + +## Optional CPU pprof configuration. Profiles are collected continuously and saved every period +## Any valid volume configuration can be provided, the example below uses hostPath +#cpuPprof: +# period: "60s" +# volumeConfiguration: +# hostPath: +# path: /tmp/pprof +# type: DirectoryOrCreate + +migrations: + clusterRegistrationCleanup: true diff --git a/index.yaml b/index.yaml index 600ea31631..eac6269bbc 100755 --- a/index.yaml +++ b/index.yaml @@ -988,6 +988,33 @@ entries: urls: - assets/fleet/fleet-103.1.0+up0.9.0.tgz version: 103.1.0+up0.9.0 + - annotations: + catalog.cattle.io/auto-install: fleet-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/experimental: "true" + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.16.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-fleet-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: clusters.fleet.cattle.io/v1alpha1 + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: fleet + apiVersion: v2 + appVersion: 0.8.5 + created: "2024-10-21T23:06:36.24912112-03:00" + dependencies: + - condition: gitops.enabled + name: gitjob + repository: file://./charts/gitjob + version: 0.8.8 + description: Fleet Manager - GitOps at Scale + digest: e0f804d7001d2c2f2752f68e13b55e291c62c67ebdad2a1285d61b70cdc29c5d + icon: https://charts.rancher.io/assets/logos/fleet.svg + name: fleet + urls: + - assets/fleet/fleet-102.2.6+up0.8.5.tgz + version: 102.2.6+up0.8.5 - annotations: catalog.cattle.io/auto-install: fleet-crd=match catalog.cattle.io/certified: rancher diff --git a/release.yaml b/release.yaml index 8b13789179..2c1beb2048 100644 --- a/release.yaml +++ b/release.yaml @@ -1 +1,2 @@ - +fleet: + - 102.2.6+up0.8.5 From 0f674062e9cac3fd3c4896ea86e95a34743ab5ce Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:06:42 -0300 Subject: [PATCH 03/13] forward-port fleet 102.2.7+up0.8.6 --- assets/fleet/fleet-102.2.7+up0.8.6.tgz | Bin 0 -> 5231 bytes charts/fleet/102.2.7+up0.8.6/Chart.yaml | 23 ++++ charts/fleet/102.2.7+up0.8.6/README.md | 30 +++++ .../102.2.7+up0.8.6/charts/gitjob/.helmignore | 23 ++++ .../102.2.7+up0.8.6/charts/gitjob/Chart.yaml | 5 + .../charts/gitjob/templates/_helpers.tpl | 7 ++ .../charts/gitjob/templates/clusterrole.yaml | 38 ++++++ .../gitjob/templates/clusterrolebinding.yaml | 12 ++ .../charts/gitjob/templates/deployment.yaml | 51 ++++++++ .../charts/gitjob/templates/leases.yaml | 23 ++++ .../charts/gitjob/templates/service.yaml | 12 ++ .../gitjob/templates/serviceaccount.yaml | 4 + .../102.2.7+up0.8.6/charts/gitjob/values.yaml | 31 +++++ .../102.2.7+up0.8.6/templates/_helpers.tpl | 22 ++++ .../102.2.7+up0.8.6/templates/configmap.yaml | 25 ++++ .../102.2.7+up0.8.6/templates/deployment.yaml | 102 ++++++++++++++++ .../job_cleanup_clusterregistrations.yaml | 29 +++++ .../fleet/102.2.7+up0.8.6/templates/rbac.yaml | 114 ++++++++++++++++++ .../templates/serviceaccount.yaml | 12 ++ charts/fleet/102.2.7+up0.8.6/values.yaml | 83 +++++++++++++ index.yaml | 27 +++++ release.yaml | 1 + 22 files changed, 674 insertions(+) create mode 100644 assets/fleet/fleet-102.2.7+up0.8.6.tgz create mode 100644 charts/fleet/102.2.7+up0.8.6/Chart.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/README.md create mode 100644 charts/fleet/102.2.7+up0.8.6/charts/gitjob/.helmignore create mode 100644 charts/fleet/102.2.7+up0.8.6/charts/gitjob/Chart.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/_helpers.tpl create mode 100644 charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/clusterrole.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/clusterrolebinding.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/deployment.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/leases.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/service.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/serviceaccount.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/charts/gitjob/values.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/templates/_helpers.tpl create mode 100644 charts/fleet/102.2.7+up0.8.6/templates/configmap.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/templates/deployment.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/templates/job_cleanup_clusterregistrations.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/templates/rbac.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/templates/serviceaccount.yaml create mode 100644 charts/fleet/102.2.7+up0.8.6/values.yaml diff --git a/assets/fleet/fleet-102.2.7+up0.8.6.tgz b/assets/fleet/fleet-102.2.7+up0.8.6.tgz new file mode 100644 index 0000000000000000000000000000000000000000..f78691f30e4251ecc26ac115955278dfe4156887 GIT binary patch literal 5231 zcmV-#6p-s5iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH<$a~rvl`+0svA9YvW^@+oWUOv`l?-WUPoXECLk~f!1r4(?c zNy5SavjB!NSJD0UD?Da6GaQPtB-59K*eb6Ek4B@>=x#L7;D{mW&e4QO9nMI?zWWNP z+wFGucX#doyWMX6|GnM4{qK6a2i@JBgZ_5arrK5*Q!P>zA}2$JaRA@|kE#A7h5>-Y zR4A&2oDE<^84fy~uoD^aqdG;UX}P=JP7tGtBu!lpuMLjyj&L$Y32k^o^@mge(QpwF zh5?OCt%=sD8gxA9(38kAv{I;5hl#OJ9Y<$19S3Cs6#e(Q{jeV%{Ck$Vfq(1O`uxes z|0!V^s;{L0R>=R|gKoDj|MzxxHu8TRi6&%>gWAIMtHrI306>%R0H$sU0N5sH8DnRH z(P%b+x1;w$pGj26br6s-a{YEC*tV_rrNFn~wUD`(1c_s+w6y9A^aLTzhKxq=@%$9T z$maYZ8=~Z>QNiKaTTm#cC?Uy|h9QDN4HJ|YY{AKAlB5jhk^@~v7>Q)Czq`9*#Nvf* z{_*^D0Ik+)Y%l@jk%%z{yTWp$jt;*Vy|*J^IMRSgs%JnoPz6M(EWsG`gsM8E%hL-} zMbR=DPcFGi}iO5)N zr&ekpFhL^q5Q%nke>B19n)0_?qnujZ-rGwo{69`mPf)^4WN<^c1}%UvCTErk--~?L=c%a z^Ppxtf*YzQFwA(&@EB7jX2vi9rHRHc*n;1i8Ih>v3@8TzJWGZsZEG~z&rF8FPokkZ z7ciDcG~AGx8Gx2_Y?Kw@fKvlkPl$$CpyDqyL?lxP1eg$M=%$(rZ6`m*5y_aH?A~79 zm8s+Db;5tiFvDYHWHx|azpKo64F~^O{RL7fKF>T)1zYaZ@%Nz9`7u){jnez+zkW=K zQa3`zKMj7&B>QRbqnX&B45&yX2?2#Ekwjw*j4DgBSR{mU1wsN%fyA*yrBJzn-B8Bt z5X`vjLNGlCT%0)!di{g2YyRuJ+U|Ade;)L$(H3?)z5aIZKg`!F_qo3vs%f+x`eBDm zM1%#wPzY^iJvEZXn;Zi$W?}%a1(y?q!n`Y?HbgL1ZDghhV<0@XSX!V3C+0OBGor*8 zDEIb^w-=opbGR(_cVoH10Jinq;;{?rp3Vs020C)9+`_bL+ZN}%pv4kH)pqcHj$W%} zAspI;YL{9Z8#Bop^Pp)`rb=wt-m+^QzYs1B8g{8F3si74HAfj^GbpCPjdUBRR>meA z(Qz(L42?~nrX&_OTxp3UDePSflX44IO@t1;=J1117)jLrV`$aL01{%F1^_A16Xir$ zFlJ&%nBU20W>pY?Bhj%VpcfT0FZ8zHy@=6E6+1nth>d8aV{T-Csd0{@xn8&~1g)_q zV-cy2SxW73Mq})75o22+!^n)g6Krh-ChNlH2swb;I|K35uOm|inouL34CMtwv(Vss ziN9o2VnwdoZO#430DkRmjBSw@mOyGxL)PwMIYlagBX}zW+gfrY1 z7g7-8FdOI6)P9`e6xjf}K`KQ`#zf<>$-Y3XDIcp#acK2K4q$5wK3LnGFgQB<2x%(C zsLCH9oJnD}1Ih~KNH9Y#j7=>~c_uQ&W|oN*nPP0DsGNb>KZ@AEKjbr`VQCCg!LkHv z+!qmUR+ryv#oLy{y?%!w8U>UY=`|5bpAkI?wxTpUGiVNiE%5yeptavsEtBCoIV$&I zD?$Ome>&zIKu0HO$BsMC*RvD{a7?9Ti`fTxWTjCMBy=oG`|(BfcEphIEcMiVs{QBe ze~n4Xh(^`9njlNf4pgVlwiQ_A|LN}U*6e?~CD_>iYe=`ZZKGKzM`$@QdF2(&l{dp? zEok4}1*Re$LHM)VDmp=%I}#cNY|$*0lB z=v*#U1#9$Qp+$|%wc_6TXsjSs+kvU#1cJ*hiCQB^Z-l&Ng2YC>857vp=+Ok@j5#^0 zCqiKvV(_x#@ym&93)@yrlz_W2wc#3#UMjnqjLNf{hkFI6J4+ zDA`*BXx-jI&UW{xo)GTtTH86Wxo_#qAl%;OYG)21oV%v(?gouDG#NMdK6g-gJQ^C; zJXzIolw3&;LII#u(%9nY&@~wD?;?+2q21Bp0?IXqOs&I)8f6G8+$^mD%wesldv{kr zEw+rNz0U+_*{xg^zoKSn3rna0w9FJPt8U7wwcR#yS$$VpZQ=HstpPMQamCdpg#%z& zKShOVyXx+JS>tN05`;NvZ*Vvf;`$sTq)i;QSYDp)G1Zf7`0@PoOyY=st~RX|-rcoq zv%7!5bCG|RRM-C{Pr$%Mv2^WX1;gS)!|Mr{k zT}Aci^y9_l$@$gE`~UuU^3foCdibYC>>da{-%l>b&mCVhVD!7o%QHi}|G6K5d)r?; z1;G0c4`}U=JHBkpx!>`gi8%Xsb#`|C;q}$=+w(;P=AOpRSL*ic4jb98uld20CY=c{)gju#ee>6*~euH2b7y!ev+LxC8r?H#~w9%{v!7~EeJ zJuVTN6@nDUrkBYEhq85w)kO z$J8CZJs8h+83)5KTKtJ5Y*D;5oCd+)fKwhL*U;W%pgilo7e*V|*_qqq0{oguLZEeg?pTp%x z&xWg zEFDV{<6`x8j0`ol)7)8WGgTHvi1sGH5Jy5{+h*GfK~(T!GyCX0sk_Ep-Hd*LsF!G% zQs>s-dz=afZ zx)!6+DNU#zK<^91^4d~e{>veWp8Fp73i-dY*X!5sfAscx8~MMERF>g(?n$O6LegK| zy{zk3%7vfgCxc!o2!;>w3d)SR2oaJ}Yopku+xFog^Dq>9-A{>3M(At2c=^Hwf(%O; z3vg;-GLHpg?-kZs7QQ=WKfUxOPI{|H0(ECh4q|cA{t#eGr)IH_T&)V`Q7>f-DUT^1 zyZm{LT2T#|1zrDTeDYfd_(AL<7<$)gKK^@p3jh|Ga=C*#8-Bt_TW)mCE-DIndCSV3 z-`m^p+=WbqrDM29(dem*sENV8h^ZnWWK8+}>}1FKOkA-ZcKBL+P~W09dbggoRvti= zlCNwTV>qGrAW68Um0d>q>#gxpFOQz(iYs#Uy8nM_)jd4b?Z2v?dmc-0h5gsv>DBN5 z?)Ue0H}>B;Qse!v+FE&lsD6}ee0+bURr+_o0>5o?>;L@Z@c7+Hn8aVDk5%_S4|eMD zzrFq4&Hewiq%9v$|2t#}*k?e3z~xX?3awWWVHiSD65~9$D6ygVkYr5Ll;Qjl0~`AD z#|g15Y}5Y?f|t1}2jpYQaWDr;=H4w2)COS^9+v``e6tD$Vl+YtnL?=`5jKFxN(%6S zxYb}g11}O>X~H!mf>SMQtgD_#k&P#Q)cIgXBC@eTTxbxS&2pIT?9Il@S>kNNFw;Oa z5T*o-=@ga6h`@x7ClKRUq74Dgu``HFsiJd89vi^VB+_gKH=cOj+lg`Bdmfl)=vj(a zol`9*YeaZHL30|;V_^+ClH8P|%>H!v?sVJngL^z-8~%_fEfV@GZi6uNn?WR!q2D>= zq0D+B5kok~F_AGtrSbx2hHl&VzrrZBabEF^lY~Zuu^H%0avNi*MYVH7C7VGlL1Q0j zoAW^t-ByE7tAv6>GZ7M1#`LzI7(*N6pG?ywQ?zXvg({6anmJTR7E_&1z8fKxHJ*QK z8poLp0Sp2gJ84JbG4+eV%q1yPzQFaZ=c2s25{bpiMo*UB-Y}$4+0egnVR}M{MU>e` zRqWiDo{?)w82!~!*AnH=v54RXhl*Dw^yWO0F~cJx7ze;SNRLdcB2hrwD(YHlRZQC6pxc5|C9B{jRL#Up=oa6rL6yMJSxeV0|`JwXP zHLEBJahY-WB!&uxL^R#7F%LBS^E_u#IlK-4mWAS09)PgETpKoAjvBU9T?_{XXb2{r zhZE1Ei4C!y{G>$X<%n<1=$q7-n&kg;zXq|=|J$$oe-3tcHvZqWq<^&cAHFp`|K8I5 z>%Vk$;0fm7O8c+={$szpv$MZh|LaK4dRFbtMSm`B43o;qw7am^vR6f&;ZZrGcEvBu zcG5-86o=Km#GYU`!(0w774Z^q#`t?N{~Tla>&77YnEw0~pJyDw{7%Og1Fhe)TH1-P zsagv;9i@rRd_k@2*2~tn=HE?vT6(bj_xHoT!u|j5Zr%Rt_x2Aq{=c=PuW|dwu~FM| z%yZuO@d{>syT@*RoA385JUw2!&jX7Wdf=bWe!PGEKhJ9rE7pJipto1I|9S_T^Z&J^ zN521%FT^i;^}(AIt;a>ylv=M2tSK$}rkEKcHXainQx2LohSkzAa9{4?z+0tQ)CHN; z6xFgi*10L#xiPTURrD@dJLF2y<3{hmEg!uvUmShq@eNq<00%68gaht*hyxz{7{}@t zCt%g96Y#KyBkFJ#U!QmcpoUi{nxQnjM6rZdRq{bkU9FnO zd)_pU3T_VMTHRYc4BAzzd*Ywe-}*w2A0hwm*Z=PF|5Hx_SK0sjy@R^{x4*x6|7k7h zd16)`=J;udH(BnGaICk??eP53C;1SbA?D->yOg!h|NZOVn^sR00ISx2e}D1(XLl3- zxt4U_ef-sSe=21DUQBKlOtenhuk!aPOoai=Kc&zj5^MmMM`yWeCvuGX%vZEktJ{f+ z_5ZEu^^cYwwEmwM4YX?gcMt0O|6aGhx&O14^tgDOZ>6m^>A6$W`VS|_68Dz#v-GiQ z{qOD6= 1.16.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-fleet-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: clusters.fleet.cattle.io/v1alpha1 + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: fleet +apiVersion: v2 +appVersion: 0.8.6 +dependencies: +- condition: gitops.enabled + name: gitjob + repository: file://./charts/gitjob + version: 0.8.13 +description: Fleet Manager - GitOps at Scale +icon: https://charts.rancher.io/assets/logos/fleet.svg +name: fleet +version: 102.2.7+up0.8.6 diff --git a/charts/fleet/102.2.7+up0.8.6/README.md b/charts/fleet/102.2.7+up0.8.6/README.md new file mode 100644 index 0000000000..2f2a4c302a --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/README.md @@ -0,0 +1,30 @@ +# Fleet Helm Chart + +Fleet is GitOps at scale. Fleet is designed to manage multiple clusters. + +## What is Fleet? + +* Cluster engine: Fleet is a container management and deployment engine designed to offer users more control on the local cluster and constant monitoring through GitOps. Fleet focuses not only on the ability to scale, but it also gives users a high degree of control and visibility to monitor exactly what is installed on the cluster. + +* Deployment management: Fleet can manage deployments from git of raw Kubernetes YAML, Helm charts, Kustomize, or any combination of the three. Regardless of the source, all resources are dynamically turned into Helm charts, and Helm is used as the engine to deploy all resources in the cluster. As a result, users can enjoy a high degree of control, consistency, and auditability of their clusters. + +## Introduction + +This chart deploys Fleet on a Kubernetes cluster. It also deploys some of its dependencies as subcharts. + +The documentation is centralized in the [doc website](https://fleet.rancher.io/). + +## Prerequisites + +Get helm if you don't have it. Helm 3 is just a CLI. + + +## Install Fleet + +Install the Fleet Helm charts (there are two because we separate out CRDs for ultimate flexibility.): + +``` +$ helm repo add fleet https://rancher.github.io/fleet-helm-charts/ +$ helm -n cattle-fleet-system install --create-namespace --wait fleet-crd fleet/fleet-crd +$ helm -n cattle-fleet-system install --create-namespace --wait fleet fleet/fleet +``` \ No newline at end of file diff --git a/charts/fleet/102.2.7+up0.8.6/charts/gitjob/.helmignore b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/.helmignore new file mode 100644 index 0000000000..691fa13d6a --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/.helmignore @@ -0,0 +1,23 @@ +# Patterns to ignore when building packages. +# This supports shell glob matching, relative path matching, and +# negation (prefixed with !). Only one pattern per line. +.DS_Store +# Common VCS dirs +.git/ +.gitignore +.bzr/ +.bzrignore +.hg/ +.hgignore +.svn/ +# Common backup files +*.swp +*.bak +*.tmp +*.orig +*~ +# Various IDEs +.project +.idea/ +*.tmproj +.vscode/ \ No newline at end of file diff --git a/charts/fleet/102.2.7+up0.8.6/charts/gitjob/Chart.yaml b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/Chart.yaml new file mode 100644 index 0000000000..78941c2d32 --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/Chart.yaml @@ -0,0 +1,5 @@ +apiVersion: v2 +appVersion: 0.8.13 +description: Controller that run jobs based on git events +name: gitjob +version: 0.8.13 diff --git a/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/_helpers.tpl b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/_helpers.tpl new file mode 100644 index 0000000000..f652b5643d --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/_helpers.tpl @@ -0,0 +1,7 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} \ No newline at end of file diff --git a/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/clusterrole.yaml b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/clusterrole.yaml new file mode 100644 index 0000000000..bcad90164f --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/clusterrole.yaml @@ -0,0 +1,38 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: gitjob +rules: + - apiGroups: + - "batch" + resources: + - 'jobs' + verbs: + - '*' + - apiGroups: + - "" + resources: + - 'pods' + verbs: + - 'list' + - 'get' + - 'watch' + - apiGroups: + - "" + resources: + - 'secrets' + verbs: + - '*' + - apiGroups: + - "" + resources: + - 'configmaps' + verbs: + - '*' + - apiGroups: + - "gitjob.cattle.io" + resources: + - "gitjobs" + - "gitjobs/status" + verbs: + - "*" \ No newline at end of file diff --git a/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/clusterrolebinding.yaml b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/clusterrolebinding.yaml new file mode 100644 index 0000000000..0bf07c4ef8 --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/clusterrolebinding.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: gitjob-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: gitjob +subjects: + - kind: ServiceAccount + name: gitjob + namespace: {{ .Release.Namespace }} \ No newline at end of file diff --git a/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/deployment.yaml b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/deployment.yaml new file mode 100644 index 0000000000..e7bbe5f20a --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/deployment.yaml @@ -0,0 +1,51 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: gitjob +spec: + selector: + matchLabels: + app: "gitjob" + template: + metadata: + labels: + app: "gitjob" + spec: + serviceAccountName: gitjob + containers: + - image: "{{ template "system_default_registry" . }}{{ .Values.gitjob.repository }}:{{ .Values.gitjob.tag }}" + name: gitjob + args: + {{- if .Values.debug }} + - --debug + {{- end }} + - --tekton-image + - "{{ template "system_default_registry" . }}{{ .Values.tekton.repository }}:{{ .Values.tekton.tag }}" + env: + - name: NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + {{- if .Values.proxy }} + - name: HTTP_PROXY + value: {{ .Values.proxy }} + - name: HTTPS_PROXY + value: {{ .Values.proxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} + {{- end }} + {{- if .Values.debug }} + - name: CATTLE_DEV_MODE + value: "true" + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} diff --git a/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/leases.yaml b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/leases.yaml new file mode 100644 index 0000000000..51f9339509 --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/leases.yaml @@ -0,0 +1,23 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: gitjob +rules: + - apiGroups: + - "coordination.k8s.io" + resources: + - "leases" + verbs: + - "*" +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: gitjob +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: gitjob +subjects: + - kind: ServiceAccount + name: gitjob diff --git a/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/service.yaml b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/service.yaml new file mode 100644 index 0000000000..bf57c1b55c --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/service.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +kind: Service +metadata: + name: gitjob +spec: + ports: + - name: http-80 + port: 80 + protocol: TCP + targetPort: 8080 + selector: + app: "gitjob" \ No newline at end of file diff --git a/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/serviceaccount.yaml b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/serviceaccount.yaml new file mode 100644 index 0000000000..5f8aecb045 --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/templates/serviceaccount.yaml @@ -0,0 +1,4 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: gitjob diff --git a/charts/fleet/102.2.7+up0.8.6/charts/gitjob/values.yaml b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/values.yaml new file mode 100644 index 0000000000..97a9ad9026 --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/charts/gitjob/values.yaml @@ -0,0 +1,31 @@ +gitjob: + repository: rancher/gitjob + tag: v0.8.13 + +tekton: + repository: rancher/tekton-utils + tag: v0.1.47 + +global: + cattle: + systemDefaultRegistry: "" + +# http[s] proxy server +# proxy: http://@:: + +# comma separated list of domains or ip addresses that will not use the proxy +noProxy: 127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.svc,.cluster.local + +nodeSelector: + kubernetes.io/os: linux + +tolerations: + - key: cattle.io/os + operator: "Equal" + value: "linux" + effect: NoSchedule + +# PriorityClassName assigned to deployment. +priorityClassName: "" + +debug: false diff --git a/charts/fleet/102.2.7+up0.8.6/templates/_helpers.tpl b/charts/fleet/102.2.7+up0.8.6/templates/_helpers.tpl new file mode 100644 index 0000000000..6cd96c3ace --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/templates/_helpers.tpl @@ -0,0 +1,22 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} \ No newline at end of file diff --git a/charts/fleet/102.2.7+up0.8.6/templates/configmap.yaml b/charts/fleet/102.2.7+up0.8.6/templates/configmap.yaml new file mode 100644 index 0000000000..07f1b5924d --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/templates/configmap.yaml @@ -0,0 +1,25 @@ +apiVersion: v1 +kind: ConfigMap +metadata: + name: fleet-controller +data: + config: | + { + "systemDefaultRegistry": "{{ template "system_default_registry" . }}", + "agentImage": "{{ template "system_default_registry" . }}{{.Values.agentImage.repository}}:{{.Values.agentImage.tag}}", + "agentImagePullPolicy": "{{ .Values.agentImage.imagePullPolicy }}", + "apiServerURL": "{{.Values.apiServerURL}}", + "apiServerCA": "{{b64enc .Values.apiServerCA}}", + "agentCheckinInterval": "{{.Values.agentCheckinInterval}}", + "ignoreClusterRegistrationLabels": {{.Values.ignoreClusterRegistrationLabels}}, + "bootstrap": { + "paths": "{{.Values.bootstrap.paths}}", + "repo": "{{.Values.bootstrap.repo}}", + "secret": "{{.Values.bootstrap.secret}}", + "branch": "{{.Values.bootstrap.branch}}", + "namespace": "{{.Values.bootstrap.namespace}}", + "agentNamespace": "{{.Values.bootstrap.agentNamespace}}", + }, + "webhookReceiverURL": "{{.Values.webhookReceiverURL}}", + "githubURLPrefix": "{{.Values.githubURLPrefix}}" + } diff --git a/charts/fleet/102.2.7+up0.8.6/templates/deployment.yaml b/charts/fleet/102.2.7+up0.8.6/templates/deployment.yaml new file mode 100644 index 0000000000..164340c444 --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/templates/deployment.yaml @@ -0,0 +1,102 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: fleet-controller +spec: + selector: + matchLabels: + app: fleet-controller + template: + metadata: + labels: + app: fleet-controller + spec: + containers: + - env: + - name: NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: FLEET_PROPAGATE_DEBUG_SETTINGS_TO_AGENTS + value: {{ quote .Values.propagateDebugSettingsToAgents }} + {{- if .Values.clusterEnqueueDelay }} + - name: FLEET_CLUSTER_ENQUEUE_DELAY + value: {{ .Values.clusterEnqueueDelay }} + {{- end }} + {{- if .Values.proxy }} + - name: HTTP_PROXY + value: {{ .Values.proxy }} + - name: HTTPS_PROXY + value: {{ .Values.proxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} + {{- end }} + {{- if .Values.cpuPprof }} + - name: FLEET_CPU_PPROF_DIR + value: /tmp/pprof/ + {{- end }} + {{- if .Values.cpuPprof }} + - name: FLEET_CPU_PPROF_PERIOD + value: {{ quote .Values.cpuPprof.period }} + {{- end }} + {{- if .Values.debug }} + - name: CATTLE_DEV_MODE + value: "true" + {{- end }} + image: '{{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }}' + name: fleet-controller + imagePullPolicy: "{{ .Values.image.imagePullPolicy }}" + command: + - fleetcontroller + {{- if not .Values.gitops.enabled }} + - --disable-gitops + {{- end }} + {{- if not .Values.bootstrap.enabled }} + - --disable-bootstrap + {{- end }} + {{- if .Values.debug }} + - --debug + - --debug-level + - {{ quote .Values.debugLevel }} + {{- else }} + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + privileged: false + capabilities: + drop: + - ALL + {{- end }} + volumeMounts: + - mountPath: /tmp + name: tmp + {{- if .Values.cpuPprof }} + - mountPath: /tmp/pprof + name: pprof + {{- end }} + volumes: + - name: tmp + emptyDir: {} + {{- if .Values.cpuPprof }} + - name: pprof {{ toYaml .Values.cpuPprof.volumeConfiguration | nindent 10 }} + {{- end }} + + serviceAccountName: fleet-controller + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + +{{- if not .Values.debug }} + securityContext: + runAsNonRoot: true + runAsUser: 1000 + runAsGroup: 1000 +{{- end }} diff --git a/charts/fleet/102.2.7+up0.8.6/templates/job_cleanup_clusterregistrations.yaml b/charts/fleet/102.2.7+up0.8.6/templates/job_cleanup_clusterregistrations.yaml new file mode 100644 index 0000000000..fa59cc575f --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/templates/job_cleanup_clusterregistrations.yaml @@ -0,0 +1,29 @@ +{{- if .Values.migrations.clusterRegistrationCleanup }} +--- +apiVersion: batch/v1 +kind: Job +metadata: + name: fleet-cleanup-clusterregistrations + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +spec: + template: + metadata: + labels: + app: fleet-job + spec: + serviceAccountName: fleet-controller + restartPolicy: Never + containers: + - name: cleanup + image: "{{ template "system_default_registry" . }}{{.Values.agentImage.repository}}:{{.Values.agentImage.tag}}" + imagePullPolicy: {{ .Values.global.imagePullPolicy }} + command: + - fleet + args: + - cleanup + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} + backoffLimit: 1 +{{- end }} diff --git a/charts/fleet/102.2.7+up0.8.6/templates/rbac.yaml b/charts/fleet/102.2.7+up0.8.6/templates/rbac.yaml new file mode 100644 index 0000000000..361d68c08b --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/templates/rbac.yaml @@ -0,0 +1,114 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: fleet-controller +rules: +- apiGroups: + - gitjob.cattle.io + resources: + - '*' + verbs: + - '*' +- apiGroups: + - fleet.cattle.io + resources: + - '*' + verbs: + - '*' +- apiGroups: + - "" + resources: + - namespaces + - serviceaccounts + verbs: + - '*' +- apiGroups: + - "" + resources: + - secrets + - configmaps + verbs: + - '*' +- apiGroups: + - rbac.authorization.k8s.io + resources: + - clusterroles + - clusterrolebindings + - roles + - rolebindings + verbs: + - '*' + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: fleet-controller +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: fleet-controller +subjects: +- kind: ServiceAccount + name: fleet-controller + namespace: {{.Release.Namespace}} + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: fleet-controller +rules: +- apiGroups: + - "" + resources: + - configmaps + verbs: + - '*' +- apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - '*' + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: fleet-controller +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: fleet-controller +subjects: +- kind: ServiceAccount + name: fleet-controller + +{{- if .Values.bootstrap.enabled }} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: fleet-controller-bootstrap +rules: +- apiGroups: + - '*' + resources: + - '*' + verbs: + - '*' +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: fleet-controller-bootstrap +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: fleet-controller-bootstrap +subjects: +- kind: ServiceAccount + name: fleet-controller-bootstrap + namespace: {{.Release.Namespace}} +{{- end }} diff --git a/charts/fleet/102.2.7+up0.8.6/templates/serviceaccount.yaml b/charts/fleet/102.2.7+up0.8.6/templates/serviceaccount.yaml new file mode 100644 index 0000000000..ba27c748d7 --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/templates/serviceaccount.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: fleet-controller + +{{- if .Values.bootstrap.enabled }} +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: fleet-controller-bootstrap +{{- end }} diff --git a/charts/fleet/102.2.7+up0.8.6/values.yaml b/charts/fleet/102.2.7+up0.8.6/values.yaml new file mode 100644 index 0000000000..c582da9360 --- /dev/null +++ b/charts/fleet/102.2.7+up0.8.6/values.yaml @@ -0,0 +1,83 @@ +image: + repository: rancher/fleet + tag: v0.8.6 + imagePullPolicy: IfNotPresent + +agentImage: + repository: rancher/fleet-agent + tag: v0.8.6 + imagePullPolicy: IfNotPresent + +# For cluster registration the public URL of the Kubernetes API server must be set here +# Example: https://example.com:6443 +apiServerURL: "" + +# For cluster registration the pem encoded value of the CA of the Kubernetes API server must be set here +# If left empty it is assumed this Kubernetes API TLS is signed by a well known CA. +apiServerCA: "" + +# A duration string for how often agents should report a heartbeat +agentCheckinInterval: "15m" + +# Whether you want to allow cluster upon registration to specify their labels. +ignoreClusterRegistrationLabels: false + +# Counts from gitrepo are out of sync with bundleDeployment state. +# Just retry in a number of seconds as there is no great way to trigger an event that doesn't cause a loop. +# If not set default is 15 seconds. +# clusterEnqueueDelay: 120s + +# http[s] proxy server +# proxy: http://@:: + +# comma separated list of domains or ip addresses that will not use the proxy +noProxy: 127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.svc,.cluster.local + +bootstrap: + enabled: true + # The namespace that will be autocreated and the local cluster will be registered in + namespace: fleet-local + # The namespace where the fleet agent for the local cluster will be ran, if empty + # this will default to cattle-fleet-system + agentNamespace: "" + # A repo to add at install time that will deploy to the local cluster. This allows + # one to fully bootstrap fleet, its configuration and all its downstream clusters + # in one shot. + repo: "" + secret: "" + branch: master + paths: "" + + +global: + cattle: + systemDefaultRegistry: "" + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" + +gitops: + enabled: true + +debug: false +debugLevel: 0 +propagateDebugSettingsToAgents: true + +## Optional CPU pprof configuration. Profiles are collected continuously and saved every period +## Any valid volume configuration can be provided, the example below uses hostPath +#cpuPprof: +# period: "60s" +# volumeConfiguration: +# hostPath: +# path: /tmp/pprof +# type: DirectoryOrCreate + +migrations: + clusterRegistrationCleanup: true diff --git a/index.yaml b/index.yaml index eac6269bbc..ddf311922a 100755 --- a/index.yaml +++ b/index.yaml @@ -988,6 +988,33 @@ entries: urls: - assets/fleet/fleet-103.1.0+up0.9.0.tgz version: 103.1.0+up0.9.0 + - annotations: + catalog.cattle.io/auto-install: fleet-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/experimental: "true" + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.16.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-fleet-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: clusters.fleet.cattle.io/v1alpha1 + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: fleet + apiVersion: v2 + appVersion: 0.8.6 + created: "2024-10-21T23:06:39.877308117-03:00" + dependencies: + - condition: gitops.enabled + name: gitjob + repository: file://./charts/gitjob + version: 0.8.13 + description: Fleet Manager - GitOps at Scale + digest: fec9462b4593f6f247882a138d865429a0c76bd60b35943a4b02334f065de8bf + icon: https://charts.rancher.io/assets/logos/fleet.svg + name: fleet + urls: + - assets/fleet/fleet-102.2.7+up0.8.6.tgz + version: 102.2.7+up0.8.6 - annotations: catalog.cattle.io/auto-install: fleet-crd=match catalog.cattle.io/certified: rancher diff --git a/release.yaml b/release.yaml index 2c1beb2048..357fbedb87 100644 --- a/release.yaml +++ b/release.yaml @@ -1,2 +1,3 @@ fleet: - 102.2.6+up0.8.5 + - 102.2.7+up0.8.6 From bcb21376e7e21a8d9e4f4efe879662121a6b93f6 Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:06:46 -0300 Subject: [PATCH 04/13] forward-port fleet-agent 102.2.7+up0.8.6 --- .../fleet-agent-102.2.7+up0.8.6.tgz | Bin 0 -> 3063 bytes charts/fleet-agent/102.2.7+up0.8.6/Chart.yaml | 15 +++++ charts/fleet-agent/102.2.7+up0.8.6/README.md | 8 +++ .../102.2.7+up0.8.6/templates/_helpers.tpl | 22 ++++++ .../102.2.7+up0.8.6/templates/configmap.yaml | 12 ++++ .../102.2.7+up0.8.6/templates/deployment.yaml | 51 ++++++++++++++ .../templates/network_policy_allow_all.yaml | 15 +++++ .../patch_default_serviceaccount.yaml | 28 ++++++++ .../102.2.7+up0.8.6/templates/rbac.yaml | 25 +++++++ .../102.2.7+up0.8.6/templates/secret.yaml | 10 +++ .../templates/serviceaccount.yaml | 4 ++ .../102.2.7+up0.8.6/templates/validate.yaml | 11 +++ .../fleet-agent/102.2.7+up0.8.6/values.yaml | 63 ++++++++++++++++++ index.yaml | 19 ++++++ release.yaml | 2 + 15 files changed, 285 insertions(+) create mode 100644 assets/fleet-agent/fleet-agent-102.2.7+up0.8.6.tgz create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/Chart.yaml create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/README.md create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/templates/_helpers.tpl create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/templates/configmap.yaml create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/templates/deployment.yaml create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/templates/network_policy_allow_all.yaml create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/templates/patch_default_serviceaccount.yaml create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/templates/rbac.yaml create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/templates/secret.yaml create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/templates/serviceaccount.yaml create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/templates/validate.yaml create mode 100644 charts/fleet-agent/102.2.7+up0.8.6/values.yaml diff --git a/assets/fleet-agent/fleet-agent-102.2.7+up0.8.6.tgz b/assets/fleet-agent/fleet-agent-102.2.7+up0.8.6.tgz new file mode 100644 index 0000000000000000000000000000000000000000..f5621838c4aabef2a8aa35fbd2f92629d650de37 GIT binary patch literal 3063 zcmVDc zVQyr3R8em|NM&qo0PI|CbKADE&S(CL9eO%xdQIxhFB#6gcgELodeh^$9y{%sGifFR zkt+!`2(SPsS5@`j&j27PlA^67b?wuR_Jb?|yTAg(?mk!oo-jlmkSTKAJDm}!!v#s% zvj?Sqzu!MPIIw^F{eJuJpno)YHaIx$AB>KV4vt38`h(FyzyA#S535EuUIiU<_} zqdfn$vo=GSQmulDYyXz=MBJ)Q?qc9g<%i*Mq5CkrM|Ft|iNe4PA%dE@c_gDhmJQB_ z9?7!mXFq%y9(f6>Skg?}qSr9M!`I zfGz%iG#U=u{{QG;=l>stXiBDNJiqaTe&Gc7txGgsTw*2^)j}>R_us3#2>?x|5zL)$ z@b=){3?a+MjK=W8)j5a>=o!L4@-a$|8Wo&ez5#`DjuK?fIptH!(R6QVt~87h6l$2E zL~jqyekEzfaP8dC6@;-!qoad^k@2V3w&5SH&Li;sQXSKLhAAMAMS=;~WnOA_dh&%j zhTa~$nE=Cy223-(0IGp1AWG#aCZK0jwcC7mer;G3opMZIyZ{2X$Qaykam(TKBwUZ- z^rSw7nB__vZE#AJmNs6yad=wX*tlzX&&e2>0xf_fiTR^z!g(fmvjxG~A~YQ=fJg)` zw2{LE$ixU3;R%U#=IS?QQW}v`RUJ&2QI&t-M&{fv%Qf!8M`Pb1Q^YbMOjdiCTFMLtNFWF77}ZWjiJ8 z@b=)+26sq=oxFHP_|z@9F*0#$)~_~N)c>lpO zn#G#^y$0q11aO0k$Tk+nOyo%>#hfN6!=}nPr<`g^82t?s4*)=9rX8c1fA&jGm~Tt1 zqp3lA0Gv!P))8EY>v)Dq&d~FwOpM*Sb;~reoNkrA!U@TlE{tqptrnm*|J{+MV6gQr z&J4ogAUyQE1jqR_f(c;?-H&seBa5KF1E`-xb^NC>%^1d zNx7bY|CQ?bU(^6Hh1Cy#tq<~K45ASOi;!wCMpK!oUHZp7VBDPsrEg? z;zGA8uE$6%;8w^RCP<SdI`}Hh_ zag?P4u3&lTfBm%sHpQFnyEQYNYN#R{IUSlIVx2{)we-|$c1I6K-Tprod_t!w$sQyb zu*LuPN29j?KN|IiJOBR}bVGR(!Kr=TZ%NinN)EgfHA#pj2BU2z3CkL{Tq5{AuuyGj zKLM7@dc-K8^=ehr`mVr_mP;+ZQ-ZfRSF8PXJI3>@CCh!JANk8=DODD(Rt}@Cc1Z9O zsN4S68^DKf09)*TczE1z+yCKkw6p)mpt`-2EK|Mtz;iy~)jA1qzZXy$#x`A1ZfmXi zr9{WG^CE5J?3QF%Qxc$Da)nH-A49Am-q`>^*}b76@q@AwGN5I?ZXqc2zc_h&c71tr zdREmGDC@NpX;do&m{4Si+4wg~i}FjNXHlhhSf!vUUYB2m=gVa^)_Z_<2&>iFqgmN- zy)j;`qIRVw)79#E)!XL7DQjYpri3T;nXqh4t`^9*8|$^-H9|pP3pYywW;Wop^5qhK z$%V#dYj&GnZ?eMowK9cqE~#Fe3a;^2U7vZvn7F-^bWRyg@l3^p5%+@35Avq%nmJq@|fkxU3fi&-+@z}AlL8`HaBVO%4cWTy({SzH5!&x%6btPt=9rW;wMMk*)ecp^RYA@AsSK z-%62ZMMX`Mr}q0Lb;o~>+H7?{W`fap@zENc`TR08uoeFwwch^?2M42F{^wCB2!aOY zFP=Q*)9~h{O#xJZ;KEg1+BMOE35swQ*wtb_i<;u)#d2BMT=|kCY`x(yhEay|OeC#5 zIptG{s>pEL5^NW^_4;m+VNv?V$=L5_?(0*}_If z*uMLfXH!WM+++_DWT-K4#_UI63soM+hzTb9Fvf|H7}(-iqV2cx8_gX>eRJ?>5KN+3 z5ZZY;mWAv0H^MK>Xl%4e^#(K zo)pxJq>++2GvGV`l2N-iE|B{3Z=T!phDziz#zx^B<+xVhwK2=*>HU9{CzMaWO#NV7 zNShx;Qm`DzJ&Je$oAdWMv!?R#&lqbvajvCiTnRP!CJ3xN!W9?cMF`J82-}Yj8Say8)G4~nS<;vf|u^H|39|lZ_+mVAN1Sy ze>^(a#s5d4mi>3emiu4-J@p87^hc=M{^x|zglK#i1h5tVZ=U}d40rjzN1^4CPJkn9 zg2PYB)-RVZA(X+_nuK z*Ig{QmVz;qAy_Z#M5%(GjiV)8=ow0T0aQ%tx1QF5s=Az6c;ZdvLeIO_geQavUiO?T zBbqC8S2Ue>p9twR2;7w@jY;FSUdfkK4$_sM+ty1XgoF51_w;TP%! zb@shhTQ5S-DNH$BIZ;RiDjN)%>hHri*I-|Tq3XQHry!GJDoL6WO=H5?BJ{j>)ze5s zoEtWGGtxARTuXN`teoBViHPAA$BJsaXJ{|Nr(V)K+R=`7w4+a;e+K{n|NkUi)bRjH F003BC9UA}u literal 0 HcmV?d00001 diff --git a/charts/fleet-agent/102.2.7+up0.8.6/Chart.yaml b/charts/fleet-agent/102.2.7+up0.8.6/Chart.yaml new file mode 100644 index 0000000000..24afa7e79b --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/Chart.yaml @@ -0,0 +1,15 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.16.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-fleet-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: fleet-agent +apiVersion: v2 +appVersion: 0.8.6 +description: Fleet Manager Agent - GitOps at Scale +icon: https://charts.rancher.io/assets/logos/fleet.svg +name: fleet-agent +version: 102.2.7+up0.8.6 diff --git a/charts/fleet-agent/102.2.7+up0.8.6/README.md b/charts/fleet-agent/102.2.7+up0.8.6/README.md new file mode 100644 index 0000000000..2c5724dcef --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/README.md @@ -0,0 +1,8 @@ +## Fleet Agent Helm Chart + +Every Fleet-managed downstream cluster will run an agent that communicates back to the Fleet controller. This agent is just another set of Kubernetes controllers running in the downstream cluster. + +Standalone Fleet users use this chart for agent-initiated registration. For more details see [agent-initiated registration](https://fleet.rancher.io/cluster-registration#agent-initiated). +Fleet in Rancher does not use this chart, but creates the agent deployments programmatically. + +The Fleet documentation is centralized in the [doc website](https://fleet.rancher.io/). \ No newline at end of file diff --git a/charts/fleet-agent/102.2.7+up0.8.6/templates/_helpers.tpl b/charts/fleet-agent/102.2.7+up0.8.6/templates/_helpers.tpl new file mode 100644 index 0000000000..6cd96c3ace --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/templates/_helpers.tpl @@ -0,0 +1,22 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} \ No newline at end of file diff --git a/charts/fleet-agent/102.2.7+up0.8.6/templates/configmap.yaml b/charts/fleet-agent/102.2.7+up0.8.6/templates/configmap.yaml new file mode 100644 index 0000000000..ce61a87568 --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/templates/configmap.yaml @@ -0,0 +1,12 @@ +kind: ConfigMap +apiVersion: v1 +metadata: + name: fleet-agent +data: + config: |- + { + {{ if .Values.labels }} + "labels":{{toJson .Values.labels}}, + {{ end }} + "clientID":"{{.Values.clientID}}" + } diff --git a/charts/fleet-agent/102.2.7+up0.8.6/templates/deployment.yaml b/charts/fleet-agent/102.2.7+up0.8.6/templates/deployment.yaml new file mode 100644 index 0000000000..582eed608d --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/templates/deployment.yaml @@ -0,0 +1,51 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: fleet-agent +spec: + selector: + matchLabels: + app: fleet-agent + template: + metadata: + labels: + app: fleet-agent + spec: + containers: + - env: + - name: NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + image: '{{ template "system_default_registry" . }}{{.Values.image.repository}}:{{.Values.image.tag}}' + name: fleet-agent + command: + - fleetagent + {{- if .Values.debug }} + - --debug + - --debug-level + - {{ quote .Values.debugLevel }} + {{- else }} + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + privileged: false + capabilities: + drop: + - ALL + {{- end }} + serviceAccountName: fleet-agent + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.fleetAgent.nodeSelector }} +{{ toYaml .Values.fleetAgent.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.fleetAgent.tolerations }} +{{ toYaml .Values.fleetAgent.tolerations | indent 8 }} +{{- end }} +{{- if not .Values.debug }} + securityContext: + runAsNonRoot: true + runAsUser: 1000 + runAsGroup: 1000 +{{- end }} diff --git a/charts/fleet-agent/102.2.7+up0.8.6/templates/network_policy_allow_all.yaml b/charts/fleet-agent/102.2.7+up0.8.6/templates/network_policy_allow_all.yaml new file mode 100644 index 0000000000..a72109a062 --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/templates/network_policy_allow_all.yaml @@ -0,0 +1,15 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + name: default-allow-all + namespace: {{ .Values.internal.systemNamespace }} +spec: + podSelector: {} + ingress: + - {} + egress: + - {} + policyTypes: + - Ingress + - Egress diff --git a/charts/fleet-agent/102.2.7+up0.8.6/templates/patch_default_serviceaccount.yaml b/charts/fleet-agent/102.2.7+up0.8.6/templates/patch_default_serviceaccount.yaml new file mode 100644 index 0000000000..aad4eea415 --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/templates/patch_default_serviceaccount.yaml @@ -0,0 +1,28 @@ +--- +apiVersion: batch/v1 +kind: Job +metadata: + name: patch-fleet-sa + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +spec: + template: + spec: + serviceAccountName: fleet-agent + restartPolicy: Never + containers: + - name: sa + image: "{{ template "system_default_registry" . }}{{ .Values.global.kubectl.repository }}:{{ .Values.global.kubectl.tag }}" + imagePullPolicy: {{ .Values.global.imagePullPolicy }} + command: ["kubectl", "patch", "serviceaccount", "default", "-p", "{\"automountServiceAccountToken\": false}"] + args: ["-n", {{ .Values.internal.systemNamespace }}] + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.kubectl.nodeSelector }} +{{ toYaml .Values.kubectl.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.kubectl.tolerations }} +{{ toYaml .Values.kubectl.tolerations | indent 8 }} +{{- end }} + backoffLimit: 1 diff --git a/charts/fleet-agent/102.2.7+up0.8.6/templates/rbac.yaml b/charts/fleet-agent/102.2.7+up0.8.6/templates/rbac.yaml new file mode 100644 index 0000000000..805949bf2c --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/templates/rbac.yaml @@ -0,0 +1,25 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: fleet-agent-system-fleet-agent-role +rules: +- apiGroups: + - '*' + resources: + - '*' + verbs: + - '*' + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: fleet-agent-system-fleet-agent-role-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: fleet-agent-system-fleet-agent-role +subjects: +- kind: ServiceAccount + name: fleet-agent + namespace: {{.Release.Namespace}} diff --git a/charts/fleet-agent/102.2.7+up0.8.6/templates/secret.yaml b/charts/fleet-agent/102.2.7+up0.8.6/templates/secret.yaml new file mode 100644 index 0000000000..4715882047 --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/templates/secret.yaml @@ -0,0 +1,10 @@ +apiVersion: v1 +data: + systemRegistrationNamespace: "{{b64enc .Values.systemRegistrationNamespace}}" + clusterNamespace: "{{b64enc .Values.clusterNamespace}}" + token: "{{b64enc .Values.token}}" + apiServerURL: "{{b64enc .Values.apiServerURL}}" + apiServerCA: "{{b64enc .Values.apiServerCA}}" +kind: Secret +metadata: + name: fleet-agent-bootstrap diff --git a/charts/fleet-agent/102.2.7+up0.8.6/templates/serviceaccount.yaml b/charts/fleet-agent/102.2.7+up0.8.6/templates/serviceaccount.yaml new file mode 100644 index 0000000000..73e27f0be9 --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/templates/serviceaccount.yaml @@ -0,0 +1,4 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: fleet-agent diff --git a/charts/fleet-agent/102.2.7+up0.8.6/templates/validate.yaml b/charts/fleet-agent/102.2.7+up0.8.6/templates/validate.yaml new file mode 100644 index 0000000000..d53ff1c508 --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/templates/validate.yaml @@ -0,0 +1,11 @@ +{{if ne .Release.Namespace .Values.internal.systemNamespace }} +{{ fail (printf "This chart must be installed in the namespace %s as the release name fleet-agent" .Values.internal.systemNamespace) }} +{{end}} + +{{if ne .Release.Name .Values.internal.managedReleaseName }} +{{ fail (printf "This chart must be installed in the namespace %s as the release name fleet-agent" .Values.internal.managedReleaseName) }} +{{end}} + +{{if not .Values.apiServerURL }} +{{ fail "apiServerURL is required to be set, and most likely also apiServerCA" }} +{{end}} diff --git a/charts/fleet-agent/102.2.7+up0.8.6/values.yaml b/charts/fleet-agent/102.2.7+up0.8.6/values.yaml new file mode 100644 index 0000000000..097d0fc037 --- /dev/null +++ b/charts/fleet-agent/102.2.7+up0.8.6/values.yaml @@ -0,0 +1,63 @@ +image: + os: "windows,linux" + repository: rancher/fleet-agent + tag: v0.8.6 + +# The public URL of the Kubernetes API server running the Fleet Manager must be set here +# Example: https://example.com:6443 +apiServerURL: "" + +# The the pem encoded value of the CA of the Kubernetes API server running the Fleet Manager. +# If left empty it is assumed this Kubernetes API TLS is signed by a well known CA. +apiServerCA: "" + +# The cluster registration value +token: "" + +# Labels to add to the cluster upon registration only. They are not added after the fact. +#labels: +# foo: bar + +# The client ID of the cluster to associate with +clientID: "" + +# The namespace of the cluster we are register with +clusterNamespace: "" + +# The namespace containing the clusters registration secrets +systemRegistrationNamespace: cattle-fleet-clusters-system + +# Please do not change the below setting unless you really know what you are doing +internal: + systemNamespace: cattle-fleet-system + managedReleaseName: fleet-agent + +# The nodeSelector and tolerations for the agent deployment +fleetAgent: + ## Node labels for pod assignment + ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ + ## + nodeSelector: {} + ## List of node taints to tolerate (requires Kubernetes >= 1.6) + tolerations: [] +kubectl: + ## Node labels for pod assignment + ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ + ## + nodeSelector: {} + ## List of node taints to tolerate (requires Kubernetes >= 1.6) + tolerations: + - key: node.cloudprovider.kubernetes.io/uninitialized + operator: "Equal" + value: "true" + effect: NoSchedule + +global: + cattle: + systemDefaultRegistry: "" + kubectl: + repository: rancher/kubectl + tag: v1.21.5 + +debug: false +debugLevel: 0 diff --git a/index.yaml b/index.yaml index ddf311922a..b319e814a7 100755 --- a/index.yaml +++ b/index.yaml @@ -1900,6 +1900,25 @@ entries: urls: - assets/fleet-agent/fleet-agent-103.1.0+up0.9.0.tgz version: 103.1.0+up0.9.0 + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.16.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-fleet-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: fleet-agent + apiVersion: v2 + appVersion: 0.8.6 + created: "2024-10-21T23:06:43.528194701-03:00" + description: Fleet Manager Agent - GitOps at Scale + digest: e9196b316e7149f202836ceff80d6ba03c101e67c84185546adaef9a88dbd6c0 + icon: https://charts.rancher.io/assets/logos/fleet.svg + name: fleet-agent + urls: + - assets/fleet-agent/fleet-agent-102.2.7+up0.8.6.tgz + version: 102.2.7+up0.8.6 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" diff --git a/release.yaml b/release.yaml index 357fbedb87..fe1e0bc76d 100644 --- a/release.yaml +++ b/release.yaml @@ -1,3 +1,5 @@ fleet: - 102.2.6+up0.8.5 - 102.2.7+up0.8.6 +fleet-agent: + - 102.2.7+up0.8.6 From b1932990a9d73d96b1c0932160b34fd3460963d5 Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:06:50 -0300 Subject: [PATCH 05/13] forward-port fleet-agent 102.2.6+up0.8.5 --- .../fleet-agent-102.2.6+up0.8.5.tgz | Bin 0 -> 3062 bytes charts/fleet-agent/102.2.6+up0.8.5/Chart.yaml | 15 +++++ charts/fleet-agent/102.2.6+up0.8.5/README.md | 8 +++ .../102.2.6+up0.8.5/templates/_helpers.tpl | 22 ++++++ .../102.2.6+up0.8.5/templates/configmap.yaml | 12 ++++ .../102.2.6+up0.8.5/templates/deployment.yaml | 51 ++++++++++++++ .../templates/network_policy_allow_all.yaml | 15 +++++ .../patch_default_serviceaccount.yaml | 28 ++++++++ .../102.2.6+up0.8.5/templates/rbac.yaml | 25 +++++++ .../102.2.6+up0.8.5/templates/secret.yaml | 10 +++ .../templates/serviceaccount.yaml | 4 ++ .../102.2.6+up0.8.5/templates/validate.yaml | 11 +++ .../fleet-agent/102.2.6+up0.8.5/values.yaml | 63 ++++++++++++++++++ index.yaml | 19 ++++++ release.yaml | 1 + 15 files changed, 284 insertions(+) create mode 100644 assets/fleet-agent/fleet-agent-102.2.6+up0.8.5.tgz create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/Chart.yaml create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/README.md create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/templates/_helpers.tpl create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/templates/configmap.yaml create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/templates/deployment.yaml create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/templates/network_policy_allow_all.yaml create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/templates/patch_default_serviceaccount.yaml create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/templates/rbac.yaml create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/templates/secret.yaml create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/templates/serviceaccount.yaml create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/templates/validate.yaml create mode 100644 charts/fleet-agent/102.2.6+up0.8.5/values.yaml diff --git a/assets/fleet-agent/fleet-agent-102.2.6+up0.8.5.tgz b/assets/fleet-agent/fleet-agent-102.2.6+up0.8.5.tgz new file mode 100644 index 0000000000000000000000000000000000000000..ba0b8cff4493fed45ee23608b8e851078cd0ade6 GIT binary patch literal 3062 zcmVDc zVQyr3R8em|NM&qo0PI|EbK5qP&ue~)9eSQg(=(}mww&SI-Hgw1o=eYhGj`gWn>3Sw z$d!Z|1Xuu+tE&3$HvmYAq-ZNiUHfTA`$Cq0U0?xXcYjy{o-#xokQs8_JDU@!!zD@C zvj?SqzuzAp9ofJAe!u;9&>s(;4UWd6{@`SMG#o$c4@RSt(KF~jtQy^vD^29H{vYnE zJ-ELJ5zd7snhLHW40Xr%8f50$9QK1g{5uT7;Y;)Nd8a5RDXNUb7=bGc+`3gur7`Uk5h?;k zdH!o>ZH6+XS_Ku?;VtEfxK*9p#lV}&55to}_hERC>Jk|eg@GAD1T}N>NJf7w8(a)M zl4aG;e)uvx_7YUFq?xuwuZ<+UC7jGq!l`Ki0{AD@-)9PlhU=Ix^k{5&=UQhf>h)q{ z&?+p{H`)-TP^%sjGogA`nNTfe-nMepPzU{CI1I=CmS;|>r(UpodQhtS{{>+=s)r8% zJN*A>G#s}5|9G_b|Bpg6B{MXh-*`g5aDs={B^oa-F%ybvA(xf=@73J|fF`pD7S1<# z2k?H5kmVCbWBB3f0>l*b9N~ZR2}+I{6`a0%0}AB=CCHp}%4e3N>E6;@X_z1=)G$Yh z-T|EdO45ws#<`&@2xE~(h~WOf$U%s(~sXO64ggpyyPz+kAgGJu zv_6EG3ZSl_&= z53LIAZSh;QN;!qiZ`XpYyxib{u9jlKHKEmWD}+>Y@CsvzT6qpbT-B;B??4-6J0)?vMyOdGVa^nOkrZWa8GWUv0F=IYXsjDRPiV7+cy$4!3inZJ`-xA}F7Elxvin zFk_Ogo4d5Buup0iWOC(z#^qKhFQ-Q&c#RBWEhG?bmIp&OU9iy3l{!31nZ%eJC zsX==HoK7*;5nPJvc#cWV(DPX*7d}phl5@)QRifFm?Ay}_H!$_wP{^&Ld&f3d;Zl{%3Vwt2| zPr?6(>iJ*Q05XNu4}YT%@?`6~w_5eS_5RlZ*$tSWj9E-n49+=O>*p=jwa!uEMke&r1RZT~+Wo*eJ}|6|Y%#=?&$E#%_mO_&uU4g0S-4(1jJn< z``>H;AHo6bu>axlNxyCX$Aj_S{vU(t_D-@)^%euq`Gi-SB*6V%KxG))bVa$XwdR)+ z9nUX{w2`x0l4VUvfO5$dGPQmTv4(hO0{~_BhKj@w%1X$9mc^!ppwR#F^zHfeyVJAt zs-{3$ucb(%S|PxcB1_E1zfoG0zax4cReFb23aa9D`BiwnT2*7c2WW?|UT-{_l?^u= zBkj zXl%A-x9RmJD|}xoQyAxx>gAc>8h_RGnJ0{i+jo*KD8m_^tC%q2UXZz5z=l&INxtW7 zc_oB?O&PjLk3h@3&X$#JCEHEJBqI~bsHUizk3W$jYnB9XdU4SlRXt`YlnWZ;X&j53 z>+K|6@%)+Lt|i# zq}m-CH#Rz7pmcrrwM*wZ@0}_aU2&oBTH|*vJ(=@Ubt$-6POU{`tA0=@BN+7i{bu<; zrO30QqNd4H`~8x-<3C4jwz{7(!DzhvWR1>zejOUviT}r~_kY8|(P*Flc@zqQpn>^| zCr|k-ym@I;02Ls(bXD){n&`j;MK}xWYB8ThP4V(#wW@5ce8~~E-f$ShD8qRsl2)Fa z@|i?cWVme!whP>PeZS1GD1GB(?Duo`^{Hq4UyHi!KQrL1!Y4)SA})4)xewTd|NF;n z`yUSX_WwB4w*QHF@*A7~PE0y1-7b&vH6-x>TBpbW{5i5TRP)|kh#NnGOeh^tt~6on z(EZA@nIs8rvj+(>)EGEp_9L)`Dvx8t1d~IU;8aKqY;i2n_FMUl=8mGiIruyXCebVi z?Yx|EdJB8v4er=oxCyb7;HUun{+9s$c2c}}?^T2TV6p#Qe3}>p<2QA9morw5Vq3Ju zQb*tARslZvMF;*N`1YBbFHLV?N{V5buR&%$S3mhA*CI6x*Ns_!FK&?k>?r*aeom81GSbLgE`SonFwC>Ieq=xcRrF z?)Wb!B!0MafIHv+_S^ZtKqi}(8QY-MdYM=i-9uH3T_Wu~vdf!(X#Jz_i{nctRK0+Q>(Bd9;hf6!oZEiKv=5dnc`PMCV zTj6+GCx5qC>-8-Od(QT5fwNP?Us{|oiXDDqB7`<`ko`sQ(p~od$9DWp+GYQPe%t;} zMo0Vj|0vY5|IXNQ|Leb}9>Jde2zA^4f-ss8jSqtWcH;l-^FM>(KL7V9v|7ZE^7Qk0a3QBxF%`q>h8tgsm2SZ z2lB+7aqJk+b{pGwCZ1|E+nRI@sP@9L4rb~~`;7{!ptv(&52m`iREPH7M=F#CMsJWU zfiNZNV92lc{nTr7Pk%nu{r}bZ>8rQrVVXQ}AG`ejU^r^||KZ8-Xz%|YgANXgYmM$k z`F|rz!Tuiz&pThBT)Ntz@KTV7TduT3k~WXl%bWw@#q}{gC)&P6$T^J-p0K&(@;ajH zE*4x%!5GRAte177RKd^2(Go879HqSgDyH>YPa8p1UCt~#@wRfI=Ur>U6T$>9d(M>+ z%@w*Un$EjVg>)JO?n;!#q;Xp?gx5ksDkMUJnoy=dA;O3IWIldV-V}2e?Q7TY3-y9J z`$4O%7oq1ArW~%EC?o=v4F*m14`GsPu&=^Ub>8DskV!FOdfxl$X(S@f z4V$|eX_`f@rMnnb&hCdq#BhrfMK#_tv=`x1FX=t)X-|9F(`V5C2LJ&7|C}P?=m1Ip E009~PF8}}l literal 0 HcmV?d00001 diff --git a/charts/fleet-agent/102.2.6+up0.8.5/Chart.yaml b/charts/fleet-agent/102.2.6+up0.8.5/Chart.yaml new file mode 100644 index 0000000000..868bae4b7d --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/Chart.yaml @@ -0,0 +1,15 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.16.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-fleet-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: fleet-agent +apiVersion: v2 +appVersion: 0.8.5 +description: Fleet Manager Agent - GitOps at Scale +icon: https://charts.rancher.io/assets/logos/fleet.svg +name: fleet-agent +version: 102.2.6+up0.8.5 diff --git a/charts/fleet-agent/102.2.6+up0.8.5/README.md b/charts/fleet-agent/102.2.6+up0.8.5/README.md new file mode 100644 index 0000000000..2c5724dcef --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/README.md @@ -0,0 +1,8 @@ +## Fleet Agent Helm Chart + +Every Fleet-managed downstream cluster will run an agent that communicates back to the Fleet controller. This agent is just another set of Kubernetes controllers running in the downstream cluster. + +Standalone Fleet users use this chart for agent-initiated registration. For more details see [agent-initiated registration](https://fleet.rancher.io/cluster-registration#agent-initiated). +Fleet in Rancher does not use this chart, but creates the agent deployments programmatically. + +The Fleet documentation is centralized in the [doc website](https://fleet.rancher.io/). \ No newline at end of file diff --git a/charts/fleet-agent/102.2.6+up0.8.5/templates/_helpers.tpl b/charts/fleet-agent/102.2.6+up0.8.5/templates/_helpers.tpl new file mode 100644 index 0000000000..6cd96c3ace --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/templates/_helpers.tpl @@ -0,0 +1,22 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} \ No newline at end of file diff --git a/charts/fleet-agent/102.2.6+up0.8.5/templates/configmap.yaml b/charts/fleet-agent/102.2.6+up0.8.5/templates/configmap.yaml new file mode 100644 index 0000000000..ce61a87568 --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/templates/configmap.yaml @@ -0,0 +1,12 @@ +kind: ConfigMap +apiVersion: v1 +metadata: + name: fleet-agent +data: + config: |- + { + {{ if .Values.labels }} + "labels":{{toJson .Values.labels}}, + {{ end }} + "clientID":"{{.Values.clientID}}" + } diff --git a/charts/fleet-agent/102.2.6+up0.8.5/templates/deployment.yaml b/charts/fleet-agent/102.2.6+up0.8.5/templates/deployment.yaml new file mode 100644 index 0000000000..582eed608d --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/templates/deployment.yaml @@ -0,0 +1,51 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: fleet-agent +spec: + selector: + matchLabels: + app: fleet-agent + template: + metadata: + labels: + app: fleet-agent + spec: + containers: + - env: + - name: NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + image: '{{ template "system_default_registry" . }}{{.Values.image.repository}}:{{.Values.image.tag}}' + name: fleet-agent + command: + - fleetagent + {{- if .Values.debug }} + - --debug + - --debug-level + - {{ quote .Values.debugLevel }} + {{- else }} + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + privileged: false + capabilities: + drop: + - ALL + {{- end }} + serviceAccountName: fleet-agent + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.fleetAgent.nodeSelector }} +{{ toYaml .Values.fleetAgent.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.fleetAgent.tolerations }} +{{ toYaml .Values.fleetAgent.tolerations | indent 8 }} +{{- end }} +{{- if not .Values.debug }} + securityContext: + runAsNonRoot: true + runAsUser: 1000 + runAsGroup: 1000 +{{- end }} diff --git a/charts/fleet-agent/102.2.6+up0.8.5/templates/network_policy_allow_all.yaml b/charts/fleet-agent/102.2.6+up0.8.5/templates/network_policy_allow_all.yaml new file mode 100644 index 0000000000..a72109a062 --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/templates/network_policy_allow_all.yaml @@ -0,0 +1,15 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + name: default-allow-all + namespace: {{ .Values.internal.systemNamespace }} +spec: + podSelector: {} + ingress: + - {} + egress: + - {} + policyTypes: + - Ingress + - Egress diff --git a/charts/fleet-agent/102.2.6+up0.8.5/templates/patch_default_serviceaccount.yaml b/charts/fleet-agent/102.2.6+up0.8.5/templates/patch_default_serviceaccount.yaml new file mode 100644 index 0000000000..aad4eea415 --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/templates/patch_default_serviceaccount.yaml @@ -0,0 +1,28 @@ +--- +apiVersion: batch/v1 +kind: Job +metadata: + name: patch-fleet-sa + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +spec: + template: + spec: + serviceAccountName: fleet-agent + restartPolicy: Never + containers: + - name: sa + image: "{{ template "system_default_registry" . }}{{ .Values.global.kubectl.repository }}:{{ .Values.global.kubectl.tag }}" + imagePullPolicy: {{ .Values.global.imagePullPolicy }} + command: ["kubectl", "patch", "serviceaccount", "default", "-p", "{\"automountServiceAccountToken\": false}"] + args: ["-n", {{ .Values.internal.systemNamespace }}] + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.kubectl.nodeSelector }} +{{ toYaml .Values.kubectl.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.kubectl.tolerations }} +{{ toYaml .Values.kubectl.tolerations | indent 8 }} +{{- end }} + backoffLimit: 1 diff --git a/charts/fleet-agent/102.2.6+up0.8.5/templates/rbac.yaml b/charts/fleet-agent/102.2.6+up0.8.5/templates/rbac.yaml new file mode 100644 index 0000000000..805949bf2c --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/templates/rbac.yaml @@ -0,0 +1,25 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: fleet-agent-system-fleet-agent-role +rules: +- apiGroups: + - '*' + resources: + - '*' + verbs: + - '*' + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: fleet-agent-system-fleet-agent-role-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: fleet-agent-system-fleet-agent-role +subjects: +- kind: ServiceAccount + name: fleet-agent + namespace: {{.Release.Namespace}} diff --git a/charts/fleet-agent/102.2.6+up0.8.5/templates/secret.yaml b/charts/fleet-agent/102.2.6+up0.8.5/templates/secret.yaml new file mode 100644 index 0000000000..4715882047 --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/templates/secret.yaml @@ -0,0 +1,10 @@ +apiVersion: v1 +data: + systemRegistrationNamespace: "{{b64enc .Values.systemRegistrationNamespace}}" + clusterNamespace: "{{b64enc .Values.clusterNamespace}}" + token: "{{b64enc .Values.token}}" + apiServerURL: "{{b64enc .Values.apiServerURL}}" + apiServerCA: "{{b64enc .Values.apiServerCA}}" +kind: Secret +metadata: + name: fleet-agent-bootstrap diff --git a/charts/fleet-agent/102.2.6+up0.8.5/templates/serviceaccount.yaml b/charts/fleet-agent/102.2.6+up0.8.5/templates/serviceaccount.yaml new file mode 100644 index 0000000000..73e27f0be9 --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/templates/serviceaccount.yaml @@ -0,0 +1,4 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: fleet-agent diff --git a/charts/fleet-agent/102.2.6+up0.8.5/templates/validate.yaml b/charts/fleet-agent/102.2.6+up0.8.5/templates/validate.yaml new file mode 100644 index 0000000000..d53ff1c508 --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/templates/validate.yaml @@ -0,0 +1,11 @@ +{{if ne .Release.Namespace .Values.internal.systemNamespace }} +{{ fail (printf "This chart must be installed in the namespace %s as the release name fleet-agent" .Values.internal.systemNamespace) }} +{{end}} + +{{if ne .Release.Name .Values.internal.managedReleaseName }} +{{ fail (printf "This chart must be installed in the namespace %s as the release name fleet-agent" .Values.internal.managedReleaseName) }} +{{end}} + +{{if not .Values.apiServerURL }} +{{ fail "apiServerURL is required to be set, and most likely also apiServerCA" }} +{{end}} diff --git a/charts/fleet-agent/102.2.6+up0.8.5/values.yaml b/charts/fleet-agent/102.2.6+up0.8.5/values.yaml new file mode 100644 index 0000000000..120a18b7c4 --- /dev/null +++ b/charts/fleet-agent/102.2.6+up0.8.5/values.yaml @@ -0,0 +1,63 @@ +image: + os: "windows,linux" + repository: rancher/fleet-agent + tag: v0.8.5 + +# The public URL of the Kubernetes API server running the Fleet Manager must be set here +# Example: https://example.com:6443 +apiServerURL: "" + +# The the pem encoded value of the CA of the Kubernetes API server running the Fleet Manager. +# If left empty it is assumed this Kubernetes API TLS is signed by a well known CA. +apiServerCA: "" + +# The cluster registration value +token: "" + +# Labels to add to the cluster upon registration only. They are not added after the fact. +#labels: +# foo: bar + +# The client ID of the cluster to associate with +clientID: "" + +# The namespace of the cluster we are register with +clusterNamespace: "" + +# The namespace containing the clusters registration secrets +systemRegistrationNamespace: cattle-fleet-clusters-system + +# Please do not change the below setting unless you really know what you are doing +internal: + systemNamespace: cattle-fleet-system + managedReleaseName: fleet-agent + +# The nodeSelector and tolerations for the agent deployment +fleetAgent: + ## Node labels for pod assignment + ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ + ## + nodeSelector: {} + ## List of node taints to tolerate (requires Kubernetes >= 1.6) + tolerations: [] +kubectl: + ## Node labels for pod assignment + ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ + ## + nodeSelector: {} + ## List of node taints to tolerate (requires Kubernetes >= 1.6) + tolerations: + - key: node.cloudprovider.kubernetes.io/uninitialized + operator: "Equal" + value: "true" + effect: NoSchedule + +global: + cattle: + systemDefaultRegistry: "" + kubectl: + repository: rancher/kubectl + tag: v1.21.5 + +debug: false +debugLevel: 0 diff --git a/index.yaml b/index.yaml index b319e814a7..48b012c32c 100755 --- a/index.yaml +++ b/index.yaml @@ -1919,6 +1919,25 @@ entries: urls: - assets/fleet-agent/fleet-agent-102.2.7+up0.8.6.tgz version: 102.2.7+up0.8.6 + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.16.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-fleet-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: fleet-agent + apiVersion: v2 + appVersion: 0.8.5 + created: "2024-10-21T23:06:47.194832489-03:00" + description: Fleet Manager Agent - GitOps at Scale + digest: eccadd9a54a7cefac79e875821f02dfe1ffbb28db89437329898a1e0f140500c + icon: https://charts.rancher.io/assets/logos/fleet.svg + name: fleet-agent + urls: + - assets/fleet-agent/fleet-agent-102.2.6+up0.8.5.tgz + version: 102.2.6+up0.8.5 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" diff --git a/release.yaml b/release.yaml index fe1e0bc76d..e234e3bb8b 100644 --- a/release.yaml +++ b/release.yaml @@ -3,3 +3,4 @@ fleet: - 102.2.7+up0.8.6 fleet-agent: - 102.2.7+up0.8.6 + - 102.2.6+up0.8.5 From 6f097971d3926e64b52f37330fdd6769d906ef83 Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:06:53 -0300 Subject: [PATCH 06/13] forward-port fleet-crd 102.2.7+up0.8.6 --- .../fleet-crd/fleet-crd-102.2.7+up0.8.6.tgz | Bin 0 -> 23716 bytes charts/fleet-crd/102.2.7+up0.8.6/Chart.yaml | 13 + charts/fleet-crd/102.2.7+up0.8.6/README.md | 5 + .../102.2.7+up0.8.6/templates/crds.yaml | 3453 ++++++++ .../templates/gitjobs-crds.yaml | 7714 +++++++++++++++++ charts/fleet-crd/102.2.7+up0.8.6/values.yaml | 1 + index.yaml | 17 + release.yaml | 2 + 8 files changed, 11205 insertions(+) create mode 100644 assets/fleet-crd/fleet-crd-102.2.7+up0.8.6.tgz create mode 100644 charts/fleet-crd/102.2.7+up0.8.6/Chart.yaml create mode 100644 charts/fleet-crd/102.2.7+up0.8.6/README.md create mode 100644 charts/fleet-crd/102.2.7+up0.8.6/templates/crds.yaml create mode 100644 charts/fleet-crd/102.2.7+up0.8.6/templates/gitjobs-crds.yaml create mode 100644 charts/fleet-crd/102.2.7+up0.8.6/values.yaml diff --git a/assets/fleet-crd/fleet-crd-102.2.7+up0.8.6.tgz b/assets/fleet-crd/fleet-crd-102.2.7+up0.8.6.tgz new file mode 100644 index 0000000000000000000000000000000000000000..5c7e84e3bddb278bbde9a2d88e0f18ccc745c5de GIT binary patch literal 23716 zcmeFYV~`-h*X}vfwr$(Cr)}G|ZQHhO+qS!>ZQJhK^WXcvad%^5cklPD4;d9%QI#1{ z8NYbWdCtL&07Lrq@A@YHMX4t$PiG)1#Ukm(&aBU?X|88& z=%y%V!!2rLY4z)(%f?}&HIA;k=8;_WeIw%FinPk}+|{94{19pEiQ}BtovZ%(Pqrqq z&{HIw-7lJ7(S=fn9pB*xk;aAS@tb)3`a} z_QU}8oF2O5*gbph;rotq8Bqq#OW$s533$9ppeJ3r2_DbM4hecTUss?OGcmnfzZbt< z2L2G(JWQ7$7xpq?p_q0?U!8vW8hv1rO%=IfQ-9t28vXtJ#=-r(Jz3%h;85mbJe0AC zc+QWJtVJ(9VOkNM?(t1-3*Ut**1WN&hIQ5C@-mVv*7?2>)Xb#zYSionz$|7)`xK-w zk^hz@a41A=2pAcqRxa&i`sUA2kh7fY&FrFYTwp^59zxkruw@SlE2B-&UWh0UAyu!_GDjeAiDAi zY|=;j1^uZwoM&f%*@*|cn%`WXTd^ts_w-o!ryAY}=WQl7~TAu~Y z$-Bg|r5aGVMDp2Olp7^YNH@YQdr`zsj`Vs(RG;O#$sMN$v!VzhP`O5=`oqBxcnJh; zyIu#ST0tj@1y7n}Q*7byS@}#xher;M`QS87Tw+ZV@(xb<-uR9MrWFvyplx&h@)@=O zsw5W&IAL6G@@y?0gDZ%{Mmfz%bJDP)(wljo_xtOw_fpqm8K1XqtfTks?@v=0^#*jV zR44gvHCD05$vt3+2Fj;=_30Ogql?Eo=rlhzcAxLdk+FcB2;yY5Jml);a{r~HYQ1L% z;6Zuv(5bXNh5Hv9scYn4{#wPc7jFw^l(a>Xeqq=$l11TtS4$SY7u5TwGn$xXSC$}U zUlg?8zw6u{Mu3W`WTv>atYK;In5eryoD@q}nGI|%u8&sHLxp@$)&uMT@3Sg4Izc7Q z{=TLtOKRL!@d-lI#g#8mS>?#}W~RNIOo6$z>5qFiiFzURW9NNxNN|o?n z4Y8-g4qF4q?1M2J@LK&bP^QE%cxzHbpM56P|6U*U+_~^}R(EwV*nV~UsnOD<>~&QB z_G~;%q-5|2QPsRPpvoel*O^fx3TNMZTs#w+qSuI}_+m2ry>GSNg9|7aHNA?F;K)3^ zNblori=hqimJ?2bVO#t4?9<vNV(%)8Lie=dMRB6x_~HpLG_B1Y`*T-h-DonEK6mi^#OHe$ z#)p&Vqo(Kk$|hvu`|Wv2rsw+XYyK#)WLsFE>S)+ z;C1Rd zOA5PRiUW|$pwZKPyDq0Q*U9Acq`S?FXVA8Fh+vs-rQ}0Y*`;4cwQsUPF@>j}W=ro- zna=5a(^l6=nN~bhHAQBu+bpPeW_&vu#bq*{Xrfo2KuvJOM>U5XjJ=gK^d*RbKE zx&mo&>8UmWwMlECbTQPy&{+t(iB&{lJ;od z)rd6mME9bbwE;gghy6ECTDW@vpoz1auoF8c5*!7zkdUk1J~*L{G+jKt=>W z2H`Z$s%8kDU)MvUqPg{~m0S)Aa4~MGx9;1cAU9_*uH$;|5kLl{+6j0imzcm=H zSw+kUvV*BS`&sqKN?B-g=wudEE?OK`OexPV-O`6Kej{JFK}R%m0LbhTt}}p+Ixz2e zjvSTU3(}(I$~!+7UOQ8FoRJ7wKVLbO^UZdue5qJgXq}|EzjhmgGwyg-8?At~B#`O0Ynxr0L~A+DKVuyN!kE|&1SU_3HN)E! zzk_y3I{P?1`{NB&vzJ@X*QPo+zk^#hmsr*BG#eT0ZCg<^%rk}iW;|Re{$_j(igxZH zrSr7j6QL>{s92T-3{B`a5(Ic{>=`3O>uTUIUji1aqmK#&u*R*Yzt{b~Hbmz@H znwBCLxcCODnJ}!%mUOKW*~pv%P8ug?Rkb{3bjSa^T7f#yQRxLEDrBfzfrPjWA z(-^yrFFtLY%i-CzDP;9*}^kr6&$s6NIPjCCY z+uiLPa}b;SVYe_1PqHqbT&fgeR^B&H2*+MKD=4>ShMn(SLLg&n`s&=T*0Z|C#_Og- za*oW@<`U2oA*h!b*F%Hggh`=oTIS!%v7*H>U(JdjYQW%bs6uzsxEy!JSypdBa0sz1 zBML+Z(5k8TszsUaRVu&8=9JedK%jSiAJ(f-Xtvj^%pAzz*fd;IppYjRiWH0>@&aEQ zf*hVaFCG8g-+OLtoM^T(_3)COAdO+JUm?}r!n1cS**+2^t2duv&Lpi0VD2pM=KqGS zaU_81Z^;O;jOuss$Fe!eXYhoAx(N5Z0+gTZjV(4knEWXeyh9M#J+omQ7SH(T%;_Nn zw}ZxIIPy2Kw#fH8tMkkH?XJ(~r;87#=GRJ3jrZGUj?eRVG{*PWyU%wE4d8?lCxp;oLcyst?_5jwK-chS~e3uq>C^L~*e0;tvKII2{ zGdF&N$A*F5^od;i+10UCvE4PsS8AQ+%1Zg#6jYNQqv$jiJ3z%8FQ|*IEhvxg4$OxC z4h+;)Z(j-QRWI^ZAGYeZtt}{s3m*6kSt}s?Rqq!HgX^w8YV~b_KPt_OY;eDRjwe|k zWDC7}ZtkT>04j~^ZZn?iZvIZt`Yqp0ztda$PS81%#7+O4u)}^(#VcS{6-q_8XzSg0 zP_@=zo4^W9|9>!U%9Zj|R_mGH=V&-n@yrLcpzdy~7th4c)Jsb)U z{<&p1ON=0g)55YKCkQX((`G2u)?Ey&#$oc_DQBhBtP$|M!BVZBnay@piId7z%SDCK#_ZNa5F;+k<6R!pALpear0E>K zszzAjH++_+=Yh;+0kgj2d>NwCs8oM$l6-WNf>Kn$8-l-UaF$5LT3J(mR2d3*Iisvq&+)qn~ zv+eMJB?3*e=wMoFR=xk>t?5&@9PgRaz+-CPi*=_dy?2(Trd>_F0`*!aHGEw*q)3%* z6Z_W!(kE^{TBt)18Aw0Y3`Mw}f`uKj=?&kxyZRgyWypCMGpz>`Ku`g+t)BVWvZgmx zTchA}cSqDNbQP_OW&3(rOVW6CYHe1Bpi8+?bo%DRmAXdI^i-aM!!x+x@sTr>tsNF} zG2#` zR&SB0abvtmx$(xdU!kCc-nwg8)*o+7AFCOSJ;CnCW-aAybNk0j&M`Sr#oQIzT;Fw@ zJ|)Uui*6fWI4|}ZGR22s+kI4=ZM#8|x!$IOHEGQCKN{s&aF%B8EDL^5ruU9=Hl zR6gDgkapTSCA4P^2ueZlq0UV?`F09#yfwbLmO60F*=P0*}QH5!$~)JM;Md z8n8uf8C=m-gz$<9x_?bkuLvV*vnAy6iYau9xL#r(?!vx=gshudDqJDQ(uBu-mZ*A3 zjsy*8V~M4ZQ&y6_BvM(G4FFp=BLc7rcA>PYQ36>XC1&K&xBcenFefYRWY=`a(|Bm? zLdH_Ov6%LdZHfciZFRMqQ8nt;^fl*1E)76Lx<>)auY3%`8;^w(QaeZ@gA8W}_+LI3 zqAxwIWS-sSw3Q6Xkj5o*{`%GdY1J(w#ch-ldnFye4Q*Io7|xo}At+?R;8=z!M{Khg zl%RIUfJu%OM{FmQG#nQs6m3~(Z%CU~AlDp0Awh`ghT-(ibRKiA$A5droIjyz0ae!8 zWZY#9*md4d0#yR#tjhbq6Nh6{_Bp?x0#t`GxONwWx7>^$+H}MopbDu!C13ey<>QD8 zbG=AsVMwCD-tlhqfnwLU%O30$XxNWua|bWBYvJzjJj8KkzfKD1_>R=~IU`;Vt9v!C6dQ|J$&7sQ#)u z%YWX18>$8FI}CJVYt8hZAaBil(vSg@gR%f400!hQ)YX9`AP!Ar0V5z5qG#ek&qq`L zR$Z3%CPdjrD-+bofU-GL^MBi0CZ=io{H4&TRIhAUP~2C_S%;*+^FCUyvvUP0nGuRC zRjSGinWx#thSl25Vr`tPM$CdWxwQoYG=yA?HE(Dt-rJ&K-#~pRl7jr?Wwc!3jchZr znym^k(E97qtT7*;&4-}4|U5=HQor@z2kJGmrEke&xX0#2Fab-(auBFG8jRZ z54YNV8JkAq3RgNs>%4im3SHsa6nkTS-s0UM9euaFF2gBWdV<{CEO31QXo6)T#}FWA zxe5eVut1ur7OT>xt?erjLv#Hl-T~XQrju+QWWXjyMS982cpc)Zu|4izr%S0>E3G!!MOKRlbU<=Jx%EM!XwGO_t9z* z_anE+Ywwnp0K&iMg#z=smE83(+Q~egU_yI9(aNDAsh%>ZR?6vwXP~{Wz5)Gg{lf*j z(=Q*x@sUP_#ezVComSe2#yPDc-OMUs^fK|3ePyj3@>7$<)BLYUx5Kknk`}!lr%TA! z>qJEL=0tV+wMg9bu|x6bMmZ<2pFDPVDJQ(r^B4%O&|*l(PQBqtf_rw8P>Dzle?|J9 zZvUaSB*s!W7%EzD%<&K?S}PQ@1YXe5<|bDCCZ=jHGb(dn7x-0oSzMP*OxQbFq|1t# zq;5l(6&ewP@!qm8k_#A~0e9F%9=oHxXv%4N1FwWO6U#Q3NT*nlJ5=K&vMfXfroiqv zytJMwAo)z5;2S%BPanq@PR37cbb0}e`tY3YagHG_Bx2}~cK~zXDdf%AN#}qYw{Yv6 zkukF{mKA!bJ;O(|-0}wFVxY3Jp5?RpR_7>0ipg0Vr3lQq@j~3A7-JJIfoc9Q_F6Zi>uV*&i~A+ zzK#B5RV|w?8366ka!N)D(Pw zuH$olT)y1&e0|}5D?5lg*Dke#MG*7r)v_3i98^~6HKv5ZwobLy!|44b_goe_e9?Fg z7o2L9iygCuA~yyxmfyVI*L!>cX;4oe!@Vh9T8vShyF1QfmjStrQ_pKv&!RoYZ8p_K z-48$XoSq86muB@5fUbYw!?tQoEFTSH4}FKaG{33p!AV{Ng+5F|eYNrV+VsIizWz9s z*-jbo{C@AjrM^aieYJf(lBG)RAEiM??6_dm;(A=dc;+xhCug_ojmalV7U#E|M#_mN zJmN!gU^%mWbcrpilo~ekc*MZ-m~ee#q(w6*Ku~8D4KUUrP$pYymP=BJolfCr)zJlM z@v>H-Z^jgGWxLZT3pd!V;5&3+2@snU8rmye9JY5LUdmwKXEx*9%$iz4dIY!MG*PV| zi7?u^+=;$?=XTWzZ5gVDDuuzMVj67oA7h@O;gRh2+grdcX*e}R5$Wg?TS2qv%FwpB zRH>@iXdPaLCso!vV4${GVqa|#2s(A?1m3nnxy}!(0FK!uiZ<$|tX}sv99V?fIOtRo zd`35K>2&C!M83$9c|e|MVpq`MF54B;N=Z-&Z+{uKy-D2nnhng1OnH*D0?eW!pz9!~>oE8iFr&f5p_)>w zEj0alNEdfy^;f%Uy?{HUS#|7|Kae#gy4gGhEq!%m4|rv-@Aa;bgRsV zBy?7vq!cIoxF@P+$+#XwdZKF;=fO?Oac>AWH8){Z82YFe}e5t%Gk3yLCnu~P| z#H|@7^wOe4vyD|034m$$1}3>Ko3O6SZ;HrJ{*hpe0{!XtZvde$Xg7JG!bYRpf)L+O zfoq>Wu(_kwDv?U`U7=--Gz^uB5>7m0t2GrP-kNxP2R1{PkjY(YJhTVFBim7|VM2I@ zkPc}ShLCeT%Wn8+*HJ9*U-%AaQ4&8lbX_U^m7BM?3?bCo&}jpKlX@az1BW`8cR}!F z{riUCHi1YqF2-qgDxX`aq@7vsEm&3IX6|%b0XfaW7>t`!f5tw|Cut>#Iyg3+&|M6? zT0n<|!=ZQN2ksE?oNxOzY<9(xB-q0u;Sj0C!EC%Y|gNmWJ^HF;1aL$ zaD;QxGDLyaKD{t^Hfd~X=&Q#5byIro<2}H!%656t;+nj>1M54y^^o+bF)OgvtG`!t z!E~%?^`Z*;t>-T1TakxD(KWG)OWFP$v&Z%#f4!lC1v@`E(+z@Nu>uWn9MhSVfpJ z@%P*pM!tnH?Jo5qme%DI0V?KvEr&o-;S$8G48fF6fKbY+wf4iEGb8vlA0|qhM}dCM z5C->v5%WuRsdnwJY%6fnkxY%tHe00mPx?wXWxagN)N0kz7eV`=f*VmDiL^G6{&VF4 zJWaN+O@IVRFZvTohf+ZW>!3mrVgWtJ?}|C24&&Kt+kLdld*wKH)809lfyNuPSBC6b zE2K``TlKMEiFdN~HKcQKsOIe?dTJrs0Sgxwx5xdp{^R-O<)yEO*8AfW*2ncR&PBXB=4GcJYAtF|}~f5RwOY>j@Nl zqV)t)?HUSlPc!ak*xvihL(2<~0{Fk~4i6SiXOI{NtJ_O+c)dM+_|Xq=E09(}_dg!* zbx2T2QFTa5^OP0skSKL2hg2|GW^ka~89YwdX%?43o8$DV2#mld#NC>w3bN)PnU;|i zqTI&{t7$9O7GA3UD8HwHsu9r(02zqYDa4(F&Pa{{*EH=u#D(-!-012UtRUlG7<>dn ziuc(!Pn#`TCqzK&^rF`i9RiTZYVLF-6P3c|w;SFzWlHnjWC5$XryHg{jTgO~)N-D< zqqs~kn-G|oIe5`MFg=E_8-y2;7iwOE6`Yu<7xLFyjgCSx@ zLc1B?TK|256ZI=Psg)<++OT&}-_~70_$}V*LKUQ^$)qygFieyWg1ukS*)|NMaUO+K zvgO>16L3hXpFcHMw<4c8anRUD^Z^%J!7m|Z+AP5n_z0pOGshNf?p(oOi=hEr$LHZ^Z{QJ6_#mx>AaQS801C- zyeWHG`t+Frdkkis4H^dX)uz?5=vLIlnzf1F%?+ztB)P3!q)4m7hbBoM$6WMpXCT<);8hklSjszoh54M$Mq$(*mcRY60la+@hNS&mSfoym&uy6 z_+%I1XL;}Jxu3XcJa=A`!*h0G_tt}pzJqSbbpwE=ShG+U469pq1cu%Ei;etw8YmMpykEvk1vAhr)V&mSorZ}A<^8Ez`rE2?lfuq$ZfYtN(b&W2+OxpySAOLpjR z{_0(9@EBQ9)su|uFbwy;+)=tZ`#{7iZud2Hpo}@yrJ9w`2 zpEn=Cv_}~Js0}zNJ3~;~liW}GAg`hUc(^G)yT^cV;2z?2l?qrvg6*?t7tvn8t2x6Tt@xQ7t-!0ffjd~j8LNOhyf^KJ zJKUE@guUZW#$-=vqeGO1#2FC7Lj88ZugSXxfxP_Wxq8=u-GURIk|j;B4Xir-C6%2l z#bfJ;GVz+Z`&P}B^XGTni5owaco)I@ELF~xe0by_nFRHU#^4r(7}#8c(DYR>iUj>( zLk!hB@KtxOBOP$x7mt}!3YJ_IQC8}Ei|~MoaS{SA!u0CTQL~9px~^wE@Sf$WGTIPC zi%A>@<}o=k_la#LDpInkZFv`ze_pfpIN#Nx!%-sk>}!hRw&qGCmy*Wq&&~pbt^+_+ z3lXQ!m@7*9sydxiUu{$%iDm7tASd)ZO zIFVJU5Y!zI+i5Plw3i9}OMp7J0g?fyKUrr3kGxN5Q18MQ{ud|HxVn%8e-(VJbfO!z z;+3(saEZSSx&X-Qua*j-Pk!+e;;R=V`#2TU;67Hb^rj(&4 zHqnHj>s_D~Kh=Q>127_CL#`+2;dHwa^3jIT`=!7BGMP zVt+SWv&Uh^gX=gd9^bhGG3_Vah62+=Uo|v}y4xty+9QbHO-W=)n|}l)@SAw?$xz7( zWm?%JZ+rm*Qw9UITwz6I9%(|`pU!IN<_txCjspS>oe3({%ugrF?fxgK8XXUmat_mS z^2c=M3;cYB3%$Amos!O@drjK`HFps5jtoAkKmNvKj{IqUdkl6wQPcZqjW~R}_&PiR znN)qpgwio(fXv7K=rlu|L;7qjdG-~wjd-d&plO&RBC(Bus$PRuvs(OdUM5`{f3j56 zWRD90^&O1J(FWfgaQ9OnCpUb0YRdN0;)RFf;oP{8ta*lDD0RVMpPH4yo|?1nfjuy< zigaxv{JW+!q_|ht&GA>)HS;hptopW|UXpZeAfH%j4hv^QxK`IWW(3s*fYZN0UJO-A zKx&l8G1QlGb}Q*28ui9^R4i11J{iUoHNq?%BnuMRjIe6z5g*@6)Q5Won6G+KZYk`> zkFiWFV>nRnaH5qQRXO@m$bS+)*vd8rIIO?3F!nU<99$@Z{4^4u4mJiS=M}dyDZ6*b zCwHQv)y8kMnmMQ$iWtNu8Jx!yq{|OD6Z5Czb)kKjaHmq^$UHgpk(6tXpyeS>?s^Nr zU2+|=$7eHo#Ye3aGlOhm5rN=g`%xOP|)d`-& z!u20LH5+O$W`~qP)fu31TSskpQ7b&p z)uzot4cKR6(qv+#t+m&2Q32O!de`<;le^Z z$c6U);3Ldv;ChD+Rs_L?9Ybuwg`pDM;`AU8+zJq7uh`EY6XFou{`{a$Hd3s^juLc| zaXnthOmS&UcY^_5|7A;%Rqt@?1{ar|Lor5J16k48W8bJT75a z*RUxNei3+>JSPgKUw}?EMEU?0i5XWTM~a9a0xU@KQLZ+$hADM_u7Bc}z26lt%Kn8I zE+`MAZA~szjDQ#xbo+zz9?)>e{x3z!pJeKrD~_kzqX_O^87zY04F`GgIOx=Nc}5_h zj~%d;^ijiL;PL;8SJP|Re|RmUwbLWd5%5IapAXG4nKY8m2-AC+UF^$u6U=!9rQ7?H zJ2A;phLId@cf!~MSozHTkVeWEvVa`Kb3bsKG;6X2T%0%a!2&cU5BV;ziZUqRO{_pi z|56^#|EkR|+dX#=a_ABC{{@q9>C?>uWKKVaQ}ztzS)R-Z6;AvCDud0saBw@W5gjy-X(8wGl63-Z&B;m&GZjy>|5x1Zihd?2(6t{4zQCn2Of(` zvOj+(?=!u3+r{P1$Gevl_DmuZLvrBg{;?{U_-_f<+Lk7P+Lp^q+SPSiT3`R}_2Sv<+gf(RnMa_Q{a_V91p04Y;Y%c>P*dGj zFjM(^rx})4Im(~1Nu!TcTnK%Bl_k^H%0_Y4{^=CYykj3hUx(Bc>#xvjgCPFYQ2VttP}bf+DvGg;|%iU+p`Od=@44cKO@n zX&q9RMcb+pgFIq#mDw>CPfCF8t7m)?#k+v0ua_p4ys0pwe?>cyQ1~beSt_l>#Wag5 z>}n}>?oc{1ZP9{V5T5E zg!Y&PLI>B`bwURRx{wHN^M5c^1z%w5JobZfPE8rQevD&>l{E~PB-+cGX*BIKT<}HeJ_Jdw6iz=4K65@A8=6!P&4!0 z!=HT2tL&-eKOM0UzQpAa^0vpFrAPcl7pY2+xQ)_A20&;{BC}Q|B{yl0a>!4m4}wNz zMCB^9k<;ZL6QXbyPsBpzdU6cA{d_gM2heSEqF*JY8^XV~>Ain8`GkH_YEfSvlZeb{ z({fHAwI;55&yGx}PdS~v7!HY7+|Qz-d3g)xeVAuthLrsJ4F>?4{eLiu^5Icl&=C{n zhfy6K{}?s+%)R}OQSTT3#i;7)A4cVM*}%AV(Cqw&QSgKwq#yq)qmuuNQI-D~e75;Q1J5A%8L;``Vg^7RaKV%wfS`|Zuv zjqtYJ(aZGEvmK15X0E3Lw(hSwT4M-70-|$CPqs}7HqPq4mFrn!yMc*hfPej-GL{XtiFoc?_A@VfFtt?Ai%hx3`YFoJdG-Tv#Sk3{F3i?HXexJnFq8T z&>{fNGam7C2VyT%%A-Qo_v~6N>rb1w;~_7?mAG@x1#1TGHTqCPX8%E<^88<7sw~{) z1+7OD<;wQ!v%5IjL>vQMLg3)mp%S>rm-t5*ssCuEpXDyBT2uVHs3D$MY?vQ)Z7PCv zZGH}ZZ40o+`o7A~gVpuUoD@;*o1CiCdF8bE4FA6P1-@HZ)wf+oe5a|Pbay7!QllxI3a z)yR(2GqcVX{erLz8Fo^B*08)Hlb0VX$WvE$ zUyhr+U^*xtJI-vxBspi6nR=unJSYi? zQ~yN9}g*vhK54y9UxV>}qqi9hGwTBCylUT)4F-d9kEUWQ&59JkN z{xNRn14kl@#2X%&hyy~KLZG`oBkw*jtdYbu11k_&RMmr&u*`<$(6%quT*1TwK-S1Oa6u&HO4etrf}-po;wUBS6tnh#{F7D#uDfkJDgJjp3KRfA$|5-4R39bH$cv zNbw2vhS5sQ!dMfxbY3J$lEs3^lXoF^&#vX3Uaf7rwJX{gX+q)S3uk+1*3WgAW6jJY z7Z}_`3VcMiH0idTqv@1~WPp+g`KDXof~2d*2-udu3`#hiAmiY3a@rENW)8a~BZfwh zN$ZD3(ORmAEVFG!xs+PAmEE*;U=QHyH!Zj@!&-72PKCeb+! zj$_vdC@tG*_KgPjpNvJIj4||pto$kMEi^R(@ldRm)aHiUD2gC?Yurn@yb$HQwkpyM z3c9!#A@AREYRuldE>kuZ*}X^LV(GbhdM5?QJU6YtV0plGUg3#9{(|3XTcRQQIJ>bN zJcS-UlrcrAcYj5K%~y6mDoN;!+{{7RlN6x1h#o0johVZgpXx}l%9OlMix@+6M0GX` zzkk7oyPH{z%uLoVcb)^?7Wh1ZE~5)DE1&YfN!0^ z_BCkes`Pgth6UCHCZhVW3sA)FU@FIVIyZ9~&?WTHP#;i~kRx5V5W9EMF)p#9!tcVl zoE3Sd0OmN+ zPyJ<`f~V?aXU7&3m`lOj5Sd81qP+B*y$HD2*)m+`fSY|AYaa`JXlnEvjY! ziy6MZ!yg5bAPa&|Yx9D~fZ&Xl`cC_2f!3&2F-BN_OY|{0BEqBv`jsotP%SjP^d&2+ zhHl@uVhP>*g)Z>!QK)tEwTzvamQ}@#tw5LuMSdBHxe5J;PI_m1?lp(5!Tk1T5}>+P z=I>tpIng2GRpFU+y6D$Vi1-r2kT>7!?#dcq`nE}_?EFsfnfeE%^nxx2z#@?j+F_#~ z&HkG6{fbo1oxj!Ew);Z2dEBYURGip<*%Dvj(U&O@gf1>sAS*+Jk*_LA)_7vHgiDZ< zaN9&WB!Xz1`c#+vj8Ipj^W5ruSUH)#sEG+ToH32SGamb!BiAs@N9Zd3eW5fdgEm%- z)|6?t{DBHePAIBTCv9;j*CLr zzAG?vJB0cE1k4bhvpu*C0kr5;1T#Op0JHqzP~o%LsRhAh$y4a`re!9w)PKCRXB(k(%3ua+)o*(iN=*>}{m$WLnh-lEYJGK%)|SjWhaOeVMVm z1ATq6x?u**lhp)Mm9xCF0_sF*r|Bo7vlxecRZwgd=5QDT^|p-?i0Ly6HoO(+bs)Gq z924AU^MSGGKVpk8!hm`tpbdB{%?fdB;?~c9p|CPe=D!}P5=BeZ;rAHWiT&KTpJ7nd zyrfs_I@Y4OqvPP_7Gkk*va!HYkoe|Fv84{oSRG{(MgszbsNM7@Dqr&*d8qNO@jVdn z^rAw7m+OKj*zATq!!3B8c>{UoEoe~_!kVbt@8})|dZzG!BAyMXf;UaqX}gf{6!1s( zx_+~Z7GR{(1F}vsV$&UAZDW_gsbo^V?IN(!dOl70|R`T`edB)vo*;ZC@M3lQQ?_;kdc%uFVcZYQl~jCSmx z-!$fW5O_1YD|*l2!27cj_mn}bLZJE<*L${qNmRPFTEeZ;^r@K3a!b(kdKaBU<>(9y zArNdxxUuafkF))nH2ea_t|J3MOt#q|=r+hE=(c6e;j*L?zbMa78( z66k6Q!x50-O?uEMEPsf`sMdQm9luGB#Ai_QEKQQ?*r9v>ZSAfP`aqG2yr#@U>!(*^ z-=BQpNPs?XB97MelU!I%?c9v)=slfy()YdXDAy_Aygo+^iB2nLd|?KwgRJJ7T{7V2 z+#p!E*pCCLqZNfpSH&{;6Tc(=?(Gvs+lY6M_u#P5`1=BsI(jZcBh&$K%f9tL8?E-o-d2Qi{_VrMi zas6;C=Iga4;Gcc%uPEsFQsaYdNdzzapElOSOW=QPtTC-0dbfKBP#$)&EIR)wq57Dx ze_%{aE`s^*8mgMko|z=E)AdiyxQNLJ{&*&9#7&dAG{ep zFZqx0?dSFRbz>cQvohn8rkSbfnbinWufAEJ`ded6#cGvn9qq~x1QQV1(X}@GJEECI z@9%CKL5#W0w%xsoo7z`wQJenhCyuh>&=8eOn);`^>M4RMhoY9%~aK`hdh8HY=s6YAkzJqiVR9up6 zzS~o2L6rtMiEzkfM*9j(=d^gp>gBVotd{sgBhkfO|^scbvG~pZ7adGuaW@B}k#Y zV&V`Nu}34xlZ#{RyB5MW;XfrwY|v#KnwXH(q~@F>l-$&9jx6jv_AUactZk45ng<%y zqY7OeCZ@_H*CJB`%Wj?J^qbk|Jca2pcRg4;27a$QpkEr6um@N1RBoDtH`0sS(IhN@ zyf2XCD*NhZ*|7Ln`mc|7Ns+|o)!rT7{-t6cM&8v?dX^IbTSIw=N1Pc|f8{`7$z z;$j9jYWeCxNrIWFRsP-V> z@YgrWx)92KLam6o*2SPNtfs2KPcg z-xHn|tL)C9{9UV=g-hL;_AW_e1z1E)^#_=f7ybsfUz<=IUioQ;X49b1kFM<-avPCH zBVJfU9~sD#b59Z3K-Oey>v(nG**lKuJ5;U*wj+2yO!N|aW5ZXnPQ^4!OERP`Azvy@Z+>grI;^h)u`o>b}V~N;1w2Y7P_C@%c;51SQH-)f0kNYVXvR8l-hkP|K=V&Wksk-s{c%>uJl8_s=>DJe>qE~JFMVcf z0H2&vS!;e&(2U83s2jzPa9ntOfDA++GTVUj{B0M4bsGvxM!q0hPr>ncE?F7q8RGx4&7jsK5HLH+%haD|7ccnMM$mmes<3@NqCq>nSib{y zcrAT*cpYElLp4s(=OFwy@&sZz33cHPqyd52_HT;dTJCJC;aV7!Hz3aF|8G3?nY|mU zO|YwuS(w#ifhjl>7%wL3XG}3)Woj_GMx-B4UC*75>oMq8-H9FiXc3*97hUrIDCMl9 zqU_o=PD%|aDBUq5-6Vbx8(&l}?d{jiDUHUdhc<1fR$}o3I~qvfw8d#R#x-V0clP1x;cHwj$4A-l-dhC}so6rpkGnS;dcu?hg;V zm&5>!aS#uMn45_01@Za|E&)!qO#N^G>OciOQ|Ojo1jGg zbb$zdbT?MjUI8>HuN`H&0Z^|&?Xm+0@bT3JX+w0|iPR1nqVg!KSe`_v{gAtAHHac0 z{pgR0RWECF?CyvyZsEeH9Lu#c!s5qXka(VSBx2<1RxEEhOxdzDT}CdPe5DK)xu?RP zK(5j{!n*Klm*K1D%l93H1l{>5Gsj?Mdy~ew{96L%y4K&j&m4YQfnfE}an~=fLErGc zXy5FkBukGT;ul*qMZ3;eHIxJ&bhJaw?nS}-wCvbs436_5%EXHxL9lGVDJSs7N!p;gr)L61d)pi#Baj8e4`uAf0XPz8P9&oy7Z zXi0Ql_R)2n_`J-jicqMM>PDu$$HGn&&w7Cp-2t}JdzhUbYZxjE^wbZlaRnm6K<~`+ zSG7+DMs=L%%cwx1oX8}%3an>e8*;%mk|rh%_HM=;qU#=Uf{JPkL`0;07!|2R9UN#M zkwQ3?2bstxmT@X^?~l6F%_INJ2{gO&mHdM^daHC1{~xSfw`PV0 z$4|k<)fkEiA6Fe^)NLMN6UQ4}MTPsUJGe7Z@E62JB zg)NGsvXD61R+8ZvlCqHS^ar0s=u#rPQx0Gf)#r1H^z(Z7 z90YDw=vPC{hKDDIVG;u6l21~nVQe>uBxsQ2&lkZu37|e_$9*+K#u&yN>6rQWI!TPG z3$7Kw#&@KaACfV#3W$=PNFykD8i`qqyCSc^k8a3alQSCYJllHDnCLL#HS>E?Gc@G` zO(r?=Z4S3el`Vk-%`7Eb!#MvfTOx<9i?eXO^zoHz8eM5+OIo&D|6(&m(@?Vf^Z2W4 z<;|&DJ+rA7g)jPrrbDV(Rn67>ZvNatthr$pc@0UEr6wU}{?P2f)o1iA zFhyYg^8gCW;KfzO7FM6AEUS_p0_r;3(J~*dkk6jTmb$f?_aC<}d=Sb{E-^9n`lh+) zFK!BM>GM|CGia^9D*bK8!k&BYck6rN=-ncvzd0(JKZIT7ur#eUvMdaRM9w`Buhe?OZZk9 z;1v51D=5lf-3`xu*46ZpSSP~gW%5=8o}tMAJToB8pGGe;Z0ZTin54y>jPmFWSHWM0 zRO$he=^RPdix+)#>H#KW3Qt4SUXt!Bb`!SJ)lnk?R7WLOF%VV612sWG`$lGtCM+vk z|4O2XkFVqYe;jHpY89@VEJNTG$Bk&)CBPqe%u~^lh+2-)&kUYf#EYUe@<#}E^IxSL zDT&Dj&3z;F8c2;*;)`7{u=gDsN={PZSzyTsTM?T`soMJqYJe&n*HPj#hbImtmSn zxWBdgdKesiGut)(3vJ}l{`pdZF8)K>hr~)vyfEWHjv?+Qz|}Hq&G&t`upF& zLNfY_&}6gvhD0_p2#Z7 z+OlVyhf4pp84uxx<=l{~!T2AGy88tME}l+GIGX}a2{hdtf6?sT+?vQ?2h8w#*&{=2 zHXIXc`az}v&NDynk2wdX{8li*oV-ug3aYYaaB`K0<*1;IX=WoG zK`0;Ve%Ski*e1A*ubD^E%p8EvV_j_;J&~-mtEI07c*zy%A0>ny5#5=~Zv9{qER`$m zdEHa3QT{8fM*hP7?x^pBu59Qf-ynOg)EIoENbG)Jb$;qQM0Va~WaC-*~F5Yv)ME}L$yfR214GWLG9!(9Jin1VkG+LAN>$V&l4qVBeq zr2sn5%El?C#zccgNju7Wb+f~eJP9fK4=OdO3$Csv@iU9$EfM4&&JUX99~wV~_1dBr zbp7FlCqv2Thk@SYMuh!!2$b1?q-gs%ekXMS%Gm#@KnBMKDmR@+!SWY0f+!fae3zI$ z?){snXkIvn#OU;IA>%{F;4aK1d{ z0LRbZ7qrLXjIt74+)(WrC=51)au`tJ#o{(mJ5-9HFZ`Ckabx$-{{=G?=?V3_M= zaxWIXN={ha5iqh8AR=S2&drESE*uVc(jFnCu0#)i<5l@H$+jsd&6d?RB}Gt}a++r{ zI)}oJ0`wy+T6x9cj(Xj(a-lQ?2e!(S4Z)sftPpP z&?5ZM12cPp8KB2Gfv#g7pbMJV7Bom6qaVodX4%wrBCt(6?<2d>1*n_VbCx9b{$MnB znAgBP6Mb~ZZuEyS*S#NisH9hUyZ$~GS5>71&{os(m*K`tPQ+U>Ra$_ygX*nd#1;tN z`M2k0U&fX*jg#YE(gPoC+zy`yEt_gSRw|;!O1_!}=@0QQ)r6_Q>h_MR5!k+!lpS## zd3MHnG1F3Ar}3I8PdZx05c@-@K5OTq)(so4L2~Gt`Vy-V*5k(;JE5B3!u81ejs7nM z*ZyeS9>27G-#)UoM4QNNj#EA-#$FbpdewOWYa9te?vt+28Vpa|ilegMr$A;sjFYdy zE0v2Ee%nF=#mKQm8Mnd49dvrxRMN}GJn=168AoyH_8AJBQ9isi&B3XZe!+y7KI-m} zOrs!;lYlR>4?!!UE;Ne|Y-1)%P!9kf?gInm-G`TI!kXc_fk#9b9C=0mo z7Eqke6u;nAV@HphxDD3sQfMy;@&0;!zsZL@QG+L;=X!gnl%4U=XWAD2={QlsSp&I$ zb$n~J63qYGDllb{vi(}Q>$dAfu5VUrY~CrAUUkt9vfOhpV=N?KBG;1BeLTaq>e}3S zXR|qH8K7E{XIzf6IWvnr1?s;|4Q3IDhEj|2RTu+jk=>rLeZFgxHSvZ+KVDlDfzOk6 zgH-K>lIz-@mb~TosOwNj?LsiQeMVohOQEYNpn$8D$ch^6w{s8!T&0hGpQ4aoz%z_&`BH;>{pU+^68|%^ zTx!mT1o!q{ygs1|VS%lM2Ve%=oS%=={WVtH{WYMEFDJ-ZE;q!-&hYB~#e^>zR8~yQz<)JbYcn&21A>LRvKu*@VgID; ztj{{Z6U5E1*H1mbf0B|kCko5E*V`A_PA;y=!G*$~@<(v_y_wd^%|c%fMCQu7!Thzn zwPQlRiIX^|U+u)af-vzkn(3>n)Co>) z;I30x9!fg&ZNSE-JD4>sig0u{zslu_kCqamXwN!Kc0dn#*1HlGAE|f|Nc;IAfsxX< zqw;TAXD)Y$4UUg_+&C=DoJgOj4>5xktj;gz{u-NFFLsY$bMniNk)nBBP$^C8xiI5k zx5VNj$QVM}9ONg+x&dje%qws{&X%PO7%tCR?kIYlZMg{MDws?V&vLGeQXO2ph5;%! z5#KE0-q**1c-F8B{;6(jJLQP63^`+&l?ZkIHsiTiIBpd~iX#@At5{Ncf$1fM>Pn_R zk0hUxTAQ`jY#r0Z#(9okIG0|iVO5H-aa%~V$4tK0l5-7y@{-}d1lHkJtt088mQ-vf5j**N{tw`HpNc0me=*-)`ee zFyWNw%zaxutkpsmGFdDsB-HI9{`{c6@>CmHQzPf>28GuyTNOJfGsIHqgu_jzznBBJ zeIs`q#1BFICPDs9jgwdlKPkx;rEwihUw? zcLJL3Ef3A4izB8D2!tzH3xSpbxg}5L-yGy`tMNWD!|o?kTn^Wc8OKylI2qw)ujE+U znIsb692M9zB1UqkTXyYRt8|&9D|~DbV~)X_*}eUM87IvRiF^*({Sc%F{D79Whieu9 zM#Tfmo(hk8_aV9-T>@ZNf9=BOGW=r=n4-Q%o@7rszk#K}YZMFBZ77|cEO~A_sMB<< z1P4{F*Pstu9>K4nvrAF2HSUz`pBvjTJH~t%@ZnPN;u(>|5$qj%imp=;zUI}@CyH04 znD4J=?oT!s{k|w5^WAh1kB@;vI>3+ms#m&DFG>L=w0J<3@n@pkOapJ8E(g-v^y2;S zdK)2tX(HI#d5}nf%D@J?+z{eWjP3JUf1h2S8#JUPqW9N@%Cw}}8GU_1?wESk%;o10 z$0yQ6S9)_8cioViPkf*?l*E&RrCcyw$IbG5K4VxqX#Bqn&L)S{+%ZoY;U zTemJn6z8`&k=QeXSp+u!RtEn}!-x^?Z^)9dIK<=~KhqS*gKG#iNmcszg`>qM|R_$-WhvM=_VXu;}W2e!zk zzbEJUMnl{0edUF^%8nny-p$7|dg|ab(NwALo1T$u<2upBIrI^IF}5c9z}1C(u8OK^ zX>aeVcktMLm$6Djzu(rS+YwI+edy$iM@wlq4p%-5uj=Em!f- zU5piG4`T0u#Lhh7)DXHzr-Tc7>^Nc2<49xTo(U4|sC)Q<=V~S7WOITVtG6iTr(#xv zfF%JJktWTj*lup*GKn689m5L*j%D6S1(@?mvs-jJKSC>(v{stS3|BDR!Y-W;sMJx6 z!#?PUWS=RLTyW?F7iQQg)8n>zaL9uLnc9@i)LJn-a5`3L&d0cU9j7vVzwP(Ys7!^V zZOh8{?7s7H!Q< z_tEG@)jRy{m-+iPB~>Q9faWYa67XE>k5lr;`(B+1=b)w_e6V05?#iEZ-D;riI{!WVJ1lcEdBxcK;Z%MO2&-+uo7 zH<#bnm@M0`_Xps)ahAU?r^-{SECRi6kaCucccsVK3qsC8@nLo zN-L6HWxY~X4_r9SY#|c^z1h-T){q2$4qv>Jpempjh&FUFM>YfTE=^h2Ht+F?iXUEl yH>XM5nv=WH{;;25!`g}EiH Date: Mon, 21 Oct 2024 23:06:57 -0300 Subject: [PATCH 07/13] forward-port fleet-crd 102.2.6+up0.8.5 --- .../fleet-crd/fleet-crd-102.2.6+up0.8.5.tgz | Bin 0 -> 23716 bytes charts/fleet-crd/102.2.6+up0.8.5/Chart.yaml | 13 + charts/fleet-crd/102.2.6+up0.8.5/README.md | 5 + .../102.2.6+up0.8.5/templates/crds.yaml | 3453 ++++++++ .../templates/gitjobs-crds.yaml | 7714 +++++++++++++++++ charts/fleet-crd/102.2.6+up0.8.5/values.yaml | 1 + index.yaml | 17 + release.yaml | 1 + 8 files changed, 11204 insertions(+) create mode 100644 assets/fleet-crd/fleet-crd-102.2.6+up0.8.5.tgz create mode 100644 charts/fleet-crd/102.2.6+up0.8.5/Chart.yaml create mode 100644 charts/fleet-crd/102.2.6+up0.8.5/README.md create mode 100644 charts/fleet-crd/102.2.6+up0.8.5/templates/crds.yaml create mode 100644 charts/fleet-crd/102.2.6+up0.8.5/templates/gitjobs-crds.yaml create mode 100644 charts/fleet-crd/102.2.6+up0.8.5/values.yaml diff --git a/assets/fleet-crd/fleet-crd-102.2.6+up0.8.5.tgz b/assets/fleet-crd/fleet-crd-102.2.6+up0.8.5.tgz new file mode 100644 index 0000000000000000000000000000000000000000..043db4905dca242259f08064a18fb33fcb6b4bfe GIT binary patch literal 23716 zcmb5VV{|547d3j4bnJ9&+sPB#X2-T|cWiZR+x8Qi9ox2zn{&Q*jPL%ux5lXYQM*Rf zuBtWWUTe;|2qK|S|M_?OqWXu%KthSpNJ5rP#)A`J$fC+DhrD(@1VPb9b&v}=g(_U*GC2;zVO1)3G|SjuG*hD|qBsF3eQ?fUI#g&saqz@M*SmY%Xu6%c+FMr%TpdEzhwn>*Ht6&!6nr;a`pHL00SI}5%BUn zd~G^aJZ%jRuFMXPgVWX;Xa@e> zDsd!#cp_sS_GI$9!E76ZNlKyk@_oM=uKASDR*`sU`Z~Mo*0(@d1qUlD!P>pZK z{nO9=VL0XcD;~dpJMW$>Q}DbVQxTX%>(bZE|WCwgmx zuvCu`liu6MME?ZvRqw9`Liy&gghiH^N*%5!P1wA*d3MbU=a;76GaN`9AZn!3B=f=P zeipZ-9#AP)=zaf^Vu3)-9yJG&{VMlyBH8;h^D!lzca34@z@@(>N%Vg@!}5#b=qUIi z)c;&Zfa#V7;FYta9Xi#CoKe1pChrEMoh|*XW1HB2<=EkpUiqj4Opd_USs>VLmP^yAMC zT(pMJYLFXaKO-;8*61|0aGlgu9mmq^&+O6#60snaU|e;7Fs{6|sT-!DY3^87P^;Tq zVn6b$3D715EN9a20b;)v?{z^4msMa!f&5j#Td6VB)aAQ@U*(wRx?Lb6o6Omt6HW1_ zo2GH6HMge(NEzaOGWuh;^E@*Lm)FGdbGzeu;=vI*ERREu6DX{_yjH7oLBME4LvmOU-{O zn&=4olUu286WN#2<6U49E^ff6pwuVB_9hxWMNhL`gIBCD-6j9}^4AeuZLQ9jMG{{M z0ti*}-gMwB)g8nS@fUDh16Aaoouy2VC%s9N@1m$$DP8Mq#jz3LLu73zLqBZf$6Zs> zV`XOA! zsv|+@QMDS&oG`}f~?VZNiIR_)%i9oNiY0qCv z(|Qn7n=4?2fv*GoS!z(4=2Hx@1hW%p)t8jnX|mp#^c^K*QsS1+zI;EGE>>FDDu%{J z4SJ_6im6FQ3B!U3VZ__G*Z(o5Y1zmIw^-fHm^~WyE9f9ef8yK$s2)|5Zq&lTPYi4} z-7+4ZxZ*Cb=~Fd4oZ)oiJ)liWE1Mxcethi1)41ppP^A4pq&<5hp`q zund>C8A0aYNO%0P&|F`QGK4VoLM^sMk6j;uEtc^>C-+(*HbfZMomkmW>qU=J+k;~s z?+Oh7LISh$`~{@(40xt{vfiO18&)j)!S zNcUG<+QAwz5OHx7PZ4(`9`Dq6pPN>pV~@LU?PfGp-$8(@kA%jI1IudmQ@v9BjH>`& ztG?6ojTM<6CI_Cj84WbjCZNagt&g;J*=O&u-;hb|AL5A3!SE<^)VW-Ao{%|?VE=Rtj9m!VDu{30&h)U+tzcK&6QzAd#?a; z7{-q7vpi75msb!FQiwmsSZav$45GDE*To|O{xK5u@iG>KWuJz2fi;14Pfc#mIf>S~ zH@{4K1e49yZ95%w$;dl38aiTc&&y9e-P;8k2yIJbs;{sW+JC&#ErIzl>2=^Y*t{BC{UW^ZuK$*hz6vu>Bd}-? zPBnL^#FRH4&(LO7_G{t^Ae{>G(GWQ_m#qV@pkN`ZQB(UcQ#366AmaC6+ zXW6iOU|#uJ*nkZ{?KmuLm+Uv3TG^mz-NT4odA{y%#twm8K(_XPnV}{}M+)3L3O!B#0TbLzpQN zCSq2>goJlV5Q4)cStD#68m#}&#{C7}?|qYLwV_~X`}LeCKa{ZxSurTcGJ=R1j_QRL zu`j$H3z_F7-G=6F3jaJj2Rbg8zmVU~2SGh3mc$%EN2~&((e*g7h6`q)knG26Bg2?1z6`afwyq#N^S*zAmAm z&RWQr0PBL&5Mtr$OQY71tUP(ZBJWg(mc#n8tlB}Z-wH;vvCX69((G#;7r;X2!=owZ zx7Q~8&Ag=?oei=kypN4p-el|2qi=&?&4o=Na*b1#UEyf;mO5h)!pdEcxzqYjnYe-U zRm!ooWs4AVBkY3$G4|ijaUEf-F>ONnsIsohzCd%9rJwtvMt9Nn15`tl=~xl^zw=k2 zCB#aO)Dkm|6&!Oy4Gj45k$?2=2QZ`a;u$RBtF6-=*G`_#xmH;)Jv4T0nr~Wowe=Rx zJz7>^m3aIP(Xn7%WsOdEiw<0koS%wS>70XTGAB{#jbQg3t#QTfp$mj6@cTR)j4UW9 zz`$7*&kOI#0#RIK z_uSQnDvmC_v`tdqo56b9Fx3 zeZ9PWanWzS+~xSGF(+?*>|6~?dvpWjix`$tf6me^Ijq#VORf zj5G)fRHvrirxty-N2UBcn_Ee*0ENl*ZOEWPx!F;>GP6H}Yr}X|nOcc>FiJR*)CYQX z5O!$dtaJ>dujkCxG|^&d^8PtJK@Qu}utK)Ig>UyvrhPbA!C*GSl2uL})Y4VSBj6QF z>rej zsbPZBaIg%MkZNPc@-q%SH~7k>nkKxQdWHJY3&H6)G;NPs^3m0Wa50WlQYu0yxbpgF z`7vnX(jgX{t6-Rn+8jPYiHccahEW|C1suMNmV{dHk>X4dK**gjnO@FsSgCT6M4&Y| zsoY?I=)x}i%fs5mnoZ69{J?TieXXu$Z?^syolI4S3Z|Y_ywC+$iky`mkUVsr$QQG? z*wAgaw5E7@9K@=oz&*7kZK%uY*=Wd7N3X(?pJhH|l91DFAF5L93wPbW7q1okdk5>q z!(8_dlqXpCr|AsjuKnEEMu58%K*?6Lha_J2|DZFz?gMAg-V^^mT<5_B4-&m71Yp=2 z-3thI#6o$?!R?i1~WZ8`Ga4nDhg>4jagNZt-Eh&~*GRl9@K)S^>Gi?=^Wg4O8= za|*833E~`s#GRUPr@v4(xM+8+DmQE0-9Q{<)s|&c60c2`%GgYKv#CyA@uhRrqi-#G zG~terFWj`3u9EWO{1dlpWaF@1d|^d{ck;0V)71EP?tbRHx`~ivC@YW}=zh!_jSP8>$0xF%jmMtYC9Ef z8?GY=|DFgd!gqd=X@Z5(@Hr;J7qshJDMnAQOpo5i;?YDLD<#I~TOQjN@1rK7?HaMH zMN;EGbed-1g~nrru(s`b5vtdyQh#Qae0ZILUR1#!O0;8inn=rDSyPvfyJ$1>>Jm*8 z)Q4v$>#P4`Co>6YYUR_Rk5kz9X@`c%A>9hBd|tM_jGl>wG2zs}FQ$B$eLlUxvf6D> zUu$dv9VPZx>STAc)=hgSGkv##3RS!2z(TBe(Z{(cd~Z{XPMOb|FoRz~?0cc5{?d}1 zEoa*#F@zdbn-fN3GGmvo4Sy>2$j8*O?%neYyn7WnW8-**ZSvyjU?@iMF5A2T75da8 zWDl$8S12XKt~ODGKjUyigyHhMrZzaXwS|s6O}fE>J#WLINvv3|eIp3HjO<4Gcr00p z>+z;r3sYy_!$FL!8}~!A(hA^bvy1VzMt17kezbAIEN<(;d3{uMwiErUzQgp{9_Twl)Z%Bhy>$$%de* z$$OA&pk7<7d25kF#rr}0aO;r9xqnWpn%?E&NRIKX`T8x!n<5~?j0!c-I+}~hk8kxE z4?vyq{T@_vrl5q)V(&eToU6|d7SDC;7Jl##)U&=SP6fl$6&v{cII>=J)=$o(zyio77o3NU}}I@R+G-4b{X3?G5Cvkac#gtsA}Cb2t| zp0REHmH3~e@Fy?qZrV7q?mOB6pQN%c_&ZH*iJ|=41o*ZEb+T=00_~Jyk2!`9On4Xw zUJj%>#g(=B+sgHgMF<$JE4onYa1WZ>rd3F-Y09=CL;L8@=k0m9w} zI&NKPFOocftb#3$j>1_VKNjC*93!?uUrrlsy>BspF;~f79SS};z7$4pRK--dyO{pa z4trk>o57gLyln6>^CsfiS@b9^uZKLKiDWg75um;nOt_eS1ZPMW29T~>Z29=>!_leS zUm2e!b8!Bda-%f>9(shii2MgSu<@h!U zHPRqbKIWsa{nIa`b>7~M2E>4l5^=b|j*>MQq6ng}Cc?$<83ugMa0~i-hD}I=wRhHG zhER%dL=gs%0prkj_V%3MDa!Voc+J`0cUnXefq@8+=mnySNFh<#Ac;tY8Jc@Di!e2Q z)>US`i_rp^ltO`QSex?=KOP3Fq_rL2K#JWfjH^b(WCIo545^B}ALC8BdpjA1gmzLP6NyAX<#APXru+en1kHqO0;Nm>;4cB^XK-6dEDw*Q7 z6~gO@x8j=YnNo3X>WZC86VRsD8OEVXt0gDNB97@pX2w+Z!VLYc7UXAGQ7HpFx0#!F z_Ozb3pXbBgsH9tF`ufS#RlV(iY^Ed9;fF^~z#(~eK*KE?4^>kc-|&=r^%J1q3gs8S)<&mGcGGTG($qJ#kKj@ASMxUdXVJYJX?+)%8;lKKte z(|D@k)@a@4$ExF6wT9JVD$`ZsVlORSvoUR98dNc4yU58!S5jJpY>W7lc8%8W545*t z3${00G}qrA$6DaQ;j6Nxz0F?aX*g~0X(NIS_8_(3nOX7EvMiV7I~oOFhpC~MN#?=Z z5m{(pVR%=b!g@DX#*h`o)>r&ADvN5)r#<``<4`cmPJ>U5Q@txrx$V`SnYR)YiHqy0 z^>H>v=PB`8Jmuntm{%tcs?yzU-rED2+eItY;afV{#P7E@P0!jVmT=JGGugwBi8^_& zQ?Hm?|GqU`fN8QX(?Q<44z}zZ%{2JAqQ+1OI#%r6*^L%}*_tE7Wb%$x6>m|a+ zT?&RyM~V($E0#EG`bZ|eO~nlcw1~@F(T%wLG69}1tQ66$S7mgD;(^C1TrO5OP!%xP z8#LaP%36+wOwR~MFdd1=Xpd!?EC4gv(ZOll!Cw0thu#v(>*uHAV^JiGeB*s!Jq+Ay1SQVW;E$IQlt&nO}0Jxit_u#yvsm0nR-bniv;cua)u+1Ome0kpN z9v>eMhCnEogV~!2B)-H9v-`~sYx{P)zvL%Q|JA6D&aA1pZ$)J|)K~9=qba5o zwLmTT=0Q;>TG^7``bTh(Uft6{Q}@OYzo~E7EWx%j7P7l@m;2{w=@oUNZjl1)xACFn zl)>c#l7C5BHbR9e*new@^3OI56QVK4@NQM~I1|`|f9cuE>KKzcB1B-+z9=ePc`)r? z-qnaTYIA|CQP!NAPIU3V{Eet4nQqS7He(KGTv~8#>y?&(3e32I=q)#Q*@x|2GU*1Z z$NJZiXY51krVC~;2hW?&HN=FfoU_80!{q8b-P^0B+{5!rurQ6A@EYG`zyhO@K={(% zulI{Eybo8$djh{N{;!V1#B+lR7i4tlfIfYjiR=*#t$uR`WCHsX2NS%$dbQ`u@Ufc~ zeALi%hXTTc4NRp8xQRl~<>7+U8+g+u)&#qo;)VHG^}n}Ad7SbPH+7nMt(sX3X9TY1 z`UHCs2i{YYi%4b}{CN->p1CpX+EOa}1GodiA+CVuDZN;!i@=cEvB>w9ZyM1L598|n zWxAUt^kswK)3>uz%ldBTb}~<$F*sg_iu`fKtlj;z0&wXv!K~!C`{wy_qiKkQiB`Z5+fTP^40!+@^rKhA4|6&=%MOclo+r zZD`FNRLgs-RTg2iRUvTT#1<$yAu_mIIzQy-M7NN^xd*V|-pHCEQ>(692tE5KuSSYu3p4ApDC#{Khf>-(K5!cSP1 zEuBu?G-&5t^7m-tO`OVFyk(o^mxA}WXFr}tqro?7k_X78qIOi5;&WhkiL_mzSF=8SVn`HQ#FlFTUh$l zpgzIU@;~kB^+KMo7S(Z^LaF_@-k#&LU)(aD(!%#j87?jHv|dsXD>s3y={A}7Nm%TD zNop=c@sG64GV$FQOr%$8t^*&|W4wjQm+kz73F-EWx9KjXaLtzeWDSlE)ZQ}kEKCB(AAaY8L<2xM$Mt zM91|VOwqDjmT%$Q1-UtWB^RhL$!hJ{d^EDmrk>c+OI@lN`5F+fES*%3x8j_2a5J(g zS^txQotzUVT$nDTe}UmzoJzQez~}wgDube`Kr6Y9;ihd$<);zbK8X7y^BTr}$;ZTK z^`ELC)68t$+`8iNFz|O%JpF}KTG<13^f6|Sc-tI!}DH#*p*i~`C=Nhq1JmUz@H)Tyj7oVt=$2a!m3ScvjC-aznY8!};+7esD zNGQVqV-J{bp6$T>tjmA9ri=+>c$mU_++a`8+6A0{cC4*42Wt#h7W}ZQ5xhm(Yi)Wt zJ0Y<7>L(Z~6;YA{l4*=n@2yLSmS4s*gRN@UuN2_O-c-c0rx$@Pw8UuBo7I4ENo-6R zj~Ueq1J{da7;%bzrWRAQc+Lx?{EZ3iW&WI3Sb#ek-$5*h%TAy|P;m_-I!~2#>eHUU? z{rL9|32vn@x=;7K*yOpV92^}TZ%>B_#{J~wRri-~-E@wfO{f}Pc`M5~`|M^I59<9cM;tjvY}ky}NR8(p7{O6{9V3N( zcP}R`##haV|5?ZRzQ&L94hxmlUHe1J&UE?Z%~!rx?_eRB$bj>mghuG$43j(vi`@$* z9oY69)j&`gQYvL>3xAu!P?9s{TbxStxFGuRezW%`Jx2JYUese7eYZ62m!_Sq>zkDu zqNzCOQ2DzGRnKObXAS$_x%q;VetwZ|ZKPH;zCOsLh-dBa@6<6k_E|)kSeLQV5{Bx9 z#rq<0#m7V-?H^2{fV#rvijjvvv*P`LrB(aak^U_;_u87evk0U|Cf|PWB7IKoBUa0n z(ZLXgZCv#~jvzlN>92L9QRX2Pb?TnQhWS z+xRd&(_i~DnFeQ3m8zeD{@&kHrOA9NdxtReme#`~;YcBWJDcllg2Lg4LU{6@LNlQzJ_m`u8@WC|}89Db&@t7ht5^duQ9Yr(4>)_)04 zHFt78Z$iaj=CopjwgYnnm{UPdx{lgl64C>E12}2vgZ}Y^MPC#XD_xPKuly#Y@Lcc) zt+;u2VeKBtGm*&H@g&Jfaa>urV;+dHqWf`c`}q_{^3&)4r1Mf}C;^)cHddF#v#c<~ zg)57Lztw$i-u$1(l2&ikry_g5o=yT{x;gasw=;&cG?j@ zCPp(x-o!J(*BJ;K_!pOMf-8EVMSp@L)jNuP{T$ZI)()PevdJCd)+{1?bbr4-LMx^!!#>MsRNCSKJ1d`r1 zB)i3B`Yju!uD=6>Hsg1r-!|R>jlKPe=^V3V(d>Ke4p+m5A^D@QsBJap5HzR2e8_M)yJ+#R(NY+iU}JB`Zm}h z$0k_+x*0;oX^2|mHY;W2mG|MSiU+QPT5idR5tsN+_v~eknjAknsYBfQmP^%+fDPEf%jxviBD}l*qIuE;d+2~pWECSqw5!}4(8);29KGWWMi0`@ksp>NX4MATV%y@V@^JqchbCN_WCj zI{<^loe6O{5^J9XKEPXBC@$6t>b4F)g^(c7n@9fzGv6EOE`&122PxkhVT2DY-&>Q= zT^14bYa0NstIYGG<^;q;Hn6iil&}T?^^343ptDanP7RW@MksN*;6*4gmO+tk1X9Cx zU;D66Mu5&8uEat6eXFR`ABaQS`1Iy}?8oaaj0q6VlIcTkE(T-u&}4h*`Kv*D

t& zaqEo^K9GL|UPt*5aW358-7ZbVj8Z_`q-}@nRY6K5GL6F7ful(~m^jT>e~!`m1v=M@ z`s3}ba6!jWr0I{dA^s*dyk44$)Vlh2ypEPN|%pY1{9g1@^CI{VN;-s{98if^-sL zw}^M|Llue_uY+fUcWYRj`f#or+3O3=W`L#JA=jQHuNC?ctuo_*8{g&)O&P{apEo2z>~wNsZFUFTf(Xgobs`PT7|HFzvOmx z*@dHg*a|Vm-*t!#B*Te1J7lyyE2DZhfru6SOw;Nja-wDE(b91sM#T$DZQ+7o8*IT3 zpA{W762JUngr6_Mu$*JGa07d|JutC&)CPISNcl+GMTc*-akpl*?2tqnhDWw zY0?71<24k3fwvd>hq>N%d+v<1%#>R{pvK%3fH=rLeOyusz$d{t+9rF-pbOm>a^CD) zaHyGAp-~!sxF=M2pIWQHU{!qP;KwdO!gs1Yi|XxLO@ClAmFLaLgOn-tUF?1-++?wg zH0lYp(ebFUEpm-j;03u#975a3;u13~x|tsycVjK@_}P+wa5+M{rBs(GyjNH$oR|9f z@e)JwC zzTxKsP?o2yE2~rY;==ekQW1Q_;0*b?ei-$>z^*E^fG(RW@7~Q2FRJCWe0{q+Rb|A- zW=*I^Hnn32FRj`ZUSG21wScZkE6$TU}h!>1!p=9LUnnLW^nZ?K6(b}zCRM0R&{VdC8t!v^jaLkWm) zEWb~;39*ap21|4f*91v)B849{W!}Gpg-Ucz-61hdL5sg!T7-lDA&{Fw{cT)vLY z1!RCU=j5-QZ}7T%%ue)UqM|g~sE@Gb^mC#VSLdiJK@iyjmQ(XX(92@kq~auABTwxp3MSZ&BK?XW~98 zb#bHu{;d!a0Bu1DpD{Cm96KZzm(F?AfAJ0=1n zOhDcfW1NBuN~YOGq*j>kU-pdMP$mC1L+D0=jO`>z(y+J~3#k~zUbe1E(AsLT0>cb( zK@DrX#0WV!+n~~0f{v?zD!fB0Gx@6eNGHd2lgX{Z4TbP})IdpyUZ4l<)Abi=!wHNe zPEZL7=rYOtSlWw3j%|>!bqwY7V$5rT*qd$*30c18x*_ z!uZ{eJ-aRWY%g-8SW}G@U-k zIgTpxk`?RrE_DjtPDeCjlY)_1@5yJzg1E|^Xs*3)aVo8?K30OXHQdT-c!cGYHg9T( z$;awaYrZ*S<_jy<3FVx&Lax%U#Dw5;`1Jb$7|M6|{tN0FR7v>y1z% zS(5{`&$Y%o0bl+FRA_ER6{_g+aSB6f<2yKuF7y3QTY{9_^5!=dwesfi4h9uYZNb_o zenHYCwtMlYQM!Cz$XiB&FSX&49jfXKQWo0^-%dm6_>Q86sG)#S2xjPHLWMc-21~G) zGQNp0)xEVee7_;U!)tBxC7=ubNvXC)w0HBcsu=&=rU~iX zrg{ecv02~F>s_k01>7rR$#M3GPvrxvp4DTe52ahP zpZGXMvUpXBA}MAs(V=rpZvHCA5(^A=p%qMPpkjb3$0@U}>z`!OPU<0hgF1OISG8I_ zu0C|CX8;$ds!A0;cY<3^q=5cCKp(zO-dYV!i zsVP>+E)|8!EuNI3nPhDUe|oIxgaj%d9uo|W`W*xnxUBn?}Q zNR5({>m*r!RK-VS6Hopr+f9xX*|gM4JF~7{NelQ9v_qR^45l(zn;)s8T{gG~`FN=o zN(Uj!GT|cpM>FtFkmkmNDN9odPMLgKh*X#48;rW{f+cv?rHN1&zAlwMxl%b`_QI?vgox;Dz(HK&#BQ zH8sm=o~sRY>sW<|&|fQj*VHB5v3QMxA_7Z!*`CR%SNIhj96eE{(6B^gRI%4cJ_U12 zFB8Da6GSCD(C zb96VLrsi3gfmgYqXTRk)636ww`JmywR$fgCcK({Z{y^=<1~-w}5sB~d%O~u5!m62D z&piGbsO@ii7oA>rgbQJ(o;4Sc*w?-^>~PE#?wu0c*?mUyY?F5!O4)knDt#U$YK&A< zaLr!-L8r>oe>!<_|3s7_RM}w0mZJc-HUB6HP-7wI%^5# zuF*5Jx@1kRSUclVUYN@!2N=Ca&h-_C^1eRMquh~?nHywb z!ix-XU$?G6&U_F*uApajoJGG!?Y+tFyWRXPj{Uk}1?%Vg@{pRr>*DlAQDxwOt40by zHKatl`%b|Z-JSn0NnDU=YZa2z_4m@5xZU4{Ds?RiwvYr(_ACSqtZEU0<{OL5`>_S# zC|}B_M%nx1Uab)DeW903^*uchp`wK;wjg;7=_n%OjfDzs zJ+G1Ch}<-}`1Vog23+0%!p?a@NvS&?;s0+kW#Ux|a!q`GTwXAPK{ctB9ROT{m;tYW z)Z|WzRQ`|~UAM7h_!!b8ew2(beDKz8sKK5YRE5-Jh9_tpx#CL!^uH&#Q_=qZHDay4 zmiVVtN^MVH4Y*I|%DKY`7mcSeWf5k?IZdCK>Bu7q=N4r=G0V&r9+C_A^H;f0gIQ($ zU$g!NjZ@YnfLl54H)Cc|f^}{=rmAyYBu&%uYtQD#Y3*RHMM#^igp!p#pE(&HL$R`S zxWU-IM%aK=5K?%H8xScx)Qd`FSCj~4T8qFpY@j0eJ9C2B_z#fqyHSX5gh;dh&&ol3 z!!<43$w7g8&{2X#K4!oVn<*uS<7w2-AMkB4U-pf#ZE$j7!qMI`*Uy*qOh%+jiGMy1urkbCCnZzwCr&I!p}L_R``{%BPM(&e z?Ya0K(A>}}dO4*aYd25F6KqJi^bekA7A%eyJ&V=AfIzQHL8TEo5|7L^`?@e){ZI;% z)si;K=rNqt&3g*(gsH-z)&d4GlIVi&VzS4t|BVdONdqsn(x(dvE|I}W15Hiog-WFn z`=Ve~)~4QctstCU^BvTY^-gB48s3&g1n6xt&56lV;w9y04JrL%^$CZo_DFZMNZNM^ z85utHL3}So4Y|sa@A|N&qbEx@E^R%9zo$3IE}Do#VGk8Z$Q_CCjHuNpLRdDZhs)_V zx7HqBirc3m*Bx8g*Pa+cBIaYPy(!I3R6G(H%r<19uWYo=OwkYT|Mq>j(=^dkLJBD=au&1(S*;Oq8q=z?h$_@4?a1{9AmyG@B6=Iot_1qB&D_1s8nY%1&%uak zJ;@g_3OX^Zlo7C$bK3It^sYP&)%Y_5XbO{@s8{)WN<9N)9vuBeh4`qF&anCm{ut@t zxCh?I7$$;fU*c+!CRL8eRT(OLK;O0}uoY;yqF#~U4JEVqLom#yNd&sWsbHa}#NvdN zIiW0bL!KF&mNP*JXVBfsUFV8|%|tD3w~v$BK0BS;jGSILSHMb&?~4!(FFwiyzTa$3 zX?ZHuJsIwIYOYy4>@w5JB-cXKUBGPpA}#Y71l7Jq_8}s80`vnV$tzzxzFy4(gZ-9U zX7k&4!(7;3&W?=r9-FV`eol;|gRFkYBB_xdawW?2t!+_+$XjxtSPZk!E0ofnPG#p2-L$F-Y8s3wG=LIr6B#S|3I9maTG?hSK zk1Gr%zT0%1n3`a~FL#<~0KC$D@)YMLu`oua6T(xau5jf)I|&;7jETQqrM-nCMI@Pw zmz3Gv@aqQ^U~EZ&<*0unoRQGMJ4Hj3wnpTeEyp2hy&14$;1k__{L7RZtz|amh0Jv^ z^77_;9%KJH#&6H~C9}`wrHXSD#vq>bZjBlJXP3xZb>ZNzfR@q7PWQJxKm|jT{D9Hj zfH@5EIfoXvOw#i_nb^UYRbwynGgxJ=@U9KDItv3l1^%P~UQ2)7D<}M9_K$q0K6v#+ z`BhEyi=N>kjYjr*9&@nfb`kX)5Y&S_KK#>z#x_k#jzPgTJhx*vgh0eC%TeMdXh~&m z;HHV5cFuq6d3i)@fSjN=Uf**vtV{)FYd~FG^NeGG{cx%1pH8p}W)3^VBkLh0%pveD zQ5En#yy+l@)?zVk@q+wL;@JM)m597&k0o*g@b8YHj&f!xS0|yqJEC+{WnA@l_UE3X z^@`7_M!KnL0|XeeV|(E6!h%_aceV?X8jxGEzPQDJW(^QA}AoQ*yBo@6-w ztm+81KI$OM*a2|gX(nV+(&ybvXw9$Tc~+$d?gynI{3JedvwA7n5PFLDTYtiz+i_K-A3@Q-Q(1aV;}X@@@({W{n%GXw zT_f7B?B{J#3X-5B_Ul$4^nlxIV|oE*Qs zzf>4LfflSLKA0lS*ut@49h$lq#2DKlfeCXezT-?XJ{N&Rs=?0+95o8(4s$Qsy>F7S zV@5;983mQw~{A1j77sQzL<1&URY*lA!;Q zDLR-=7?pYpK`=`hjOm-ETHszk#n7<#Gf!o&MNOAg=Qe-%0SAkBAIY6_OJF=TBXrRV zj-u-l&i?wJk)bbiu@i+2X1ze7M~YFi^|N_y20Kg~sl@S+anD0~BbxZog^iln-l87J zx+fRa%;H{T;ZX9f`Y_RdOUM&`Ur!|p7swAo7j(m+Cwxam`AkKqm%t?L4cJ3e>Inr) z>|jsgzet0ILV2PL6`x2inNfB;RD9`-{f)6rohe~HAD%r;G-f7?g@>!Z88@AiuN6b! zWeI844Bkz)yqkc59^ znp>hTek&Reljdl}f}p_bNZZt+4Q3|9`FWY}{Cq9!I#^9rNIMP`lH=!eab%-j7>rq zQVFLG5TyjzWF}tcitDt}6bda2(#;>_9_XoTqIE7c0$gYkaNk2$|a0@z4r()bzA ze7O>?KL?62K9b`S6TqRn z^s+?1E=h%K)ZdT?`s};d?&Izf{B9#HWsTag&sQtImq*IywV39(Omhy!Bt1<#FFDgc zY-Dwq<#ot%C|rv^VcW~Yn3Ydp*!Y?Up=ytDUZ!nB>79-Jp-Ny!A-FKachOdUQ3Bc& zj!`z5;#O&#*I=c9#7v5_von=&`@C7hIwU^w;;BR_c#@5Wa$oSHld1jJStlJLW&(X6 zt6T}hycT^cu$o1K(B5t_7bouT6EVFsD%~Sh;6wi+Tp2ve3yG=Hw6P&)&K>X4QZk|~ zVTqxnhwR4LYK0CChD;h;N(8h{jQ8l7JX6G&ro1rI))K7&#QHPNn&sq8f6*n;E~kL)7NC zfQBP6<$1(9c>L{=60ZM>TaBfy8AIV2%yJAG9CX<-qos_RI~UHFLdI2F5K zW~bjgpUvj?-FA__LND)oKke7`e8eA1ECCP^|9V}Dj3(_1Gr_%t3#;$izM0IqXG+;( z(AD)fV9-mPOetv4#^L;`$Nj)9HYpRP`d?4$gxcm-J{J2|oZ4&a>(l=_hQDo7E4^k7 zX+m}Qr@$KELUcP4*gog&OuCWf|fkq}x{U#o~Pbk5KwG28X0d2fUY(ttc# zY{-_yKJS~nlCgDneKEL&N6oneI0JB+3R{i6NLtzrQmERtM?ZUFZAmK9VIFkEt7>vK zP4+c;EA&lbr!?msVbrakL8tu5s4!-bJYq#!FA>}ZcX2qge7C(GQm6Wd9kYuRt|Pe+ zb%zU{7=e+4Y2U)T^X$wMCa2(r|3s>x1q{`aSJpD#-)ZC9=|y zAbJbMl-$VfqbiXxw@k%?#DB8;XyIg-WGc2D2AOHb&q=c%{a8S^25#J1-ju&`uIWb0 zr~Ruw#S%CL{|WB3{5GJL;FOCmrgy{StySx5#>7}Kuy)aXq%?{f+R+WHO`lh^g0(iU zUdZHCOw0(R&=J9p{0t#B`IrzV3VDe0g4rm)I$SlUrT4iA7n81i9`Fmr*y7IM26Ww& z#6_2Tc%)Z8;bv4n>kK5;ATft}g5pA&q|`mx=RRWro+62zt4y%~9|VWfWO>Ql_O>qN z%Ja+-lYkLMirtyw{i-<3owpM0+Qcu2Nee3|1YWLafYYId35#{~@rj#@89aXQuy7Ny z5{s)*9jElFG3kn@Pf@xngSk#^x5-Ipy4>IUCrnmA1HM*HbG*i?Bc;{?OLpG;uZVm&8lDijeMD+1D<`=B>57mc zwZzn2z(3?S08)>!!Sj!QHTMceUgI`5p$Kwb(UQIt)z@iyXjCiNEksp-X~%p@QzhM6 zoj{JurzN<1$uWIYBX9y zfiNN`j?5PjkG@8B#x!p`!~&_+JID{PG9Qe5NlII&RK7jl5}H^xz(TmRk|Z!aNYvHtd9A9DY% zp9v28VC9e5Fco7J_Mt0=VoP%l^D*=qdZ{Bm_h4~CZ}5oElA#>IjmcS9-zW#jnBkh< zz`%n}dBo#{&<&8CSe9L&Yt>tt%CXfe15G2rpZ#^u2^F^+Z#(2YVSVvK9gbwqCxYEN zzvEhm2)G>NTQ#k}gQ>Fy`R5jDkL{yQ!)}#uz=cW2MvAishyM($_L*xx#|cu<>@+shuGH>Mu-@+-7M0SxTBixBAS*K7j)}O6nbo|s? zO1kkFb6?0zjrjd_ko8Qk?T~bv;od#wL_PHvjfUKYP;pTVLCX&h6Z+NB&C1H%1mNit z-EGQ92O9y=@0v3e(3*G%auqBH;23^F$^7a9Z)%(U>|^5*q}F@2r_a9=8@{DpS!upX z^X(U$SuDvVS?cUOg|4LaJJ;e0Q_Y;QeZ@>aPFqonT9t>c6hx@<@uE^Ar>UcL|61UK zeBqmM(?MQ0ohEBXAHrnnSO|!pZh~EzZBRP_&$&kvH2Qu^#O7zFa6Qsd;}Mv>!!hp4V_TPR0}STKN?WW<#tCNYz? zdK5A!>u% zefJnYNO5QpaS;T;ig)ng{&;>0HgKv2DB5={btJ9-QB&bDR%9?NVq2#I}z43RIHM9ThAYz^6cTjEokV&S4&7y{-K19TN{$ag+(3WkSW%4EFHgP$_R@ z4|54rPeow~{?yj?AcQw;10S&c>7WoSPYcWep*dAFHi;#6call;I9Z37Sus0s;2NCc znxD)3U^QE?7a~i+GXPNkqovfT$Rw=HWvlQKN8!S|i_)cyX1`}K&|a~{awiBQ2y}f; zxOn>+#ob+h>zT=L&?0{AQ~XrxF4KXx-7B3KcmHeECV|e?TT*#@5j>aH^RdP2BqI6bB?FD0a2`Z1U{w@poR&xHJ@4MD8Zn^(h zDU*gzX(rTAE5-E&cZPK`G7H-bn`z^(m3krE{XebL40TmbfF7$=UlziZnpP+i{Ch4t zS5T~`!8s`O+~sxVBIREzMY@0@S z+ZzxpP(`_|+cn-pvej9>N2#ZZ6LT)9R`IkOmkp4SE<$aoZlVC$@WFz`c-(=h-kij3 zc>Y{rhfKrmaaN+CE{vzbCiH3abnr>|9ac zlRG}7==452Ity!986_(R#D+=FN&CjV7$#n(A3LMhQzf24Dbd6uq!Yl9=%bl~<$zkq< zaZL*VdTzaZKP5m&299hJI#9 zVh=dF#0j<^nE^`j?>RZ5uBK^W()QAvXa5%f7n+?wOz3h>+ZiCHn~Y4jLc-Tj2udnP z{N6lh)5J>J;)O%HKzw8{XprOD+)U!2tn*nx$(@<+2j|Xci3F({Kp(M;(ryUCN%u<- z<)39rQj#T=%0F3>?wz^i8LwRrLiv;KYtjP~;9{r9SAzZVKJuG$<%CA1p>)5_F(8RB zd3o-xY+R_3Xq~RS;n?L@n;Ov0GttdfIwS?KZg%O{6F}OmO)3m4OG6DSp#&mViGY4_ zr&y&`-+_Oup|m+fa;(v%k7o*Ix%Ko2Y#Xvh@2+8*c;x>m>uO=1uaS!(N0yvBM4igE zSH;3ZYTcd&ER8;DBe%)mj?u`GZN5>HXJue1n`1>UD=6|Aa> zH|Vinr7-?gfb8jKVoPqp;=1jS~0oOHKW#YYm zYm|eS3nUpwS&_aQ*L9f5jl6#?3C&EzpnH_NnYUwLt-o zgD3L6K8bkBHko1D(D%jv20~*UV-HaMq`YG#KoXmfHYDD&t*uNP=$cqz=?Pm>~b1QZ@{c%7%Y@H zB6+w_-0TWbp_f0^VG7inj7i@%{jmID?L0OMjZ-Y2Qc%8jJIn7;73fO-@ zy+TrOvV9;r-g@#BgY}(db2Hz981LC8R`)V}2;0wfSt>YY6d>IuY;KlzlJZuN~!a^y>@;F15OgEPItCt^h6nwtYnjHd)i z`E$kVVf9cM+DM;hT;Aot9E&Tz1{({7A&W;lpLcJd83(kmH?ji3dZ>u3MpYjo$CD+G z71iIOS}}zCL~sMt{PyQFn-g>b1ha))@4Kqx%O29I#WBoZE_(ij3~jdH=FA-VqpnX8b0AhR|Bg^a@i6f$kO{|{uC-Tr5g;mLtQ=6nGPnRDna z*KGoQ`~w+W@@0s!M>!NSo7Ku5thnSZP{;_oK_P=nUYj0RWxKs+tOX?u+y5p^DFn%{ zuPYQ6tX>oIy|Mm zrq9^E!8EcF9it<6pkUZme#?x>HN1eQ1k6P~#FTp@5BZj6OaBg+ZSU`>r*vbu#;uO#A&H*JOGjG1B4VzurfLOpgZohh(6@}j0Np{Wr) zM&Rzk3B_L8Kw6>M2r7VA{wl9n>a!Gb<1Tf4!;+W`@QaOG5#?(m0eObSSM`XjmWBlK zy4CxypJrx_B0y>iAM_^jX9;{Js2;)M7JP_3NrSbR2;X6;&}~gBFcCB{sL-L%`SZVQ zb*7v_W1gFN3DN~ML^>oVL+H{#qvrYLd58dK8Sq`|Oc2fEM3T)X;EqLrN<34Kz3u7S ziS*G|^BALgW4q*0G7bPkRAaB98V=L+@lDbQq46}NBH8fQg@8425J#3Y`#l!9w#xg% zIPyfxJpjz}q(X2?0?`+&E&nVQ=}HqMOQJbkn)fAEIqe^*bH<>1Ojl4r&mOi$aCZt2zIhCJ6g?-Olh7EnyOS$dOTzc zqQE>Wx~$@Qur{rwVj{=`xSg#Za~jHSp0b)1oJu@u`IIuMPwpGjf3ceBVho#*mzuYl z6n!?wY^K(iXSLs;>(kGJ5zR^<)uB7jsNY+@YTh!Lm+ihuE?VXJj*mmJ%PEC>3U8eH zXSg2Xpj!o&R9ON|CMFo(aJ-z8AY|MKj=p>w+BZ-qqWEL54m=WK_PkvKJ-ejG;mx)< z3-w7ae>i9$EW35SskNc6($pnL=c7C8oRm|pL1k6$B-EP#0%B79Q$XSpkUYMeOTd6? z8f{?p;%ocrP8o1Z9}LOe88%9tqEzI$``do}i$|sGl=GIf|2S^2rJi#^L(mpCwAbT= zPuI87B=P1NScgKi7P|S2E`#WOx!1lMMr+B$G^U-R2NUt3$Sm7_3!lT-Ih>AL+kgz1 z+zU${>t#!%;Ya+#PIg7apuJ&_>~;%d&!XggSDDiF@{9L#$&Zp{L^*>u0QqM2c3q3| zMb?GikAEFE@TPQq_j^pt(c-8f)N$9#`Rm(>aAr!Zd?F%*scj5U+3t=AHfBQy&kL0E zlaoDI2BRwOOP87{4L)0#(yIYmvQ3e-o#})5A}&%ezv+(~4OLL~!QrTH@Gv=#DS+YU z{pW5`t@e5Mm7|Q&ddvm476-HmQ+}i;NtjK3Y>`w=Fq2dLAziRT5MP^}L4ePy^fMIV z8l>y_v|m!G^_!sa?2YdHN#Bf)>1M|2d;5*=1}MuJk(a9L6k3N^+yT>vNhtQGKa?~X ztD0Ex;x3$Y4rMx`%8J+Z18NjhhS1Vv<1;s@l<)Q|apV=lHw2?n7uR+%{;{5KW9; z;uST8Lz;60Dww|BI6b9@4lB$P8>rZ*=5=|eNjQFXpxpxBo)GD9JbCK4?V-&xvdPYM z52I#*I2qkhr>dBRzuBoZejRS)9B(+`C&S-CMJOTQw?HuQrZ6q@WU-6$a)jzV6BqS9 zg7$-;b}JodW-s2L5Nx0Xk=v1>`!({bVQNw_TIG@1LDo}G649DcIAh?0)3Ca;R{-ZI zf^SXg+mow7=$;L7X+ti*re3CA{##Wm@$LKASDBkG<6-GSbsiENy_!8D!21_0uU=k* zWPqnPq6J4vHz)ho6B9vW5?7!f^t|vsGJyK-x8F`^?>_-nyhjJ`2bw zB@;)oB&pRhirLIy4vy>U`JvrN;;h^0}GX9uuT@wAtwhf~_2ZaeJRF^3QDCy^4=ZAU&RAxNF@zDaRX zH+#@K7&sTI@)oi)6!tl}@~=Lx$1SocW#})0>wYUq=>zw%cYf=Xf^5x7?=ZL5#N^Y; z)?A9&LzmoSm>@Ar9(roS*Vq>2nQQF%N&7VvUbX8Y7*)~zwA1O>T#Qr$p8MIBRI`R9 zXF$hZPR|fV+piQ3>yNx^?+K;HYswZ{kn+P{8P6Tl-%`FlW`41UP#AzJ(OZ$`X4F6& z@)JGOSItCx2|z*ZOb9sK0|(+kBH2n*vVc0T=t>a6FQ(PCcx&5L&2|0h{b0~GGlOeH zRhL*kjHFe}l@3}Q=F#_scq420y^fa$wXeZiC=CsyBs}+zDWTn_s*Mkt&U@9DYm&3E zx^a#0VR%8!7`cR*uu0VW$y)Eg^8Nhz1cnM}MoX2%z4A%zej=R_ezn|ziY|8IgczlZ z4|K4k?wSMG*#ir7FGb3<{05YXCbdKra*-`Z5cQzd!Gb+Mqq>dT9GPqneW=;CzS=ta zW47zv>iX$wjNHfb=YRp4Lvu@C&791XE-D(RZDJZj2W}dF>Vtkv3gKySx3{aAov2 z9(;k@f;kUouHlNpc_n%d!s*%EzRVKZD61h<6_Y{guR&UByK9H6;-S#{$n5BFCZ9S5Ibj;~6x zi;1Kx(=#|^skIr)S5})y!xxyd*&sf);M=B`mggeqPw^U*+9X#ZKMpol+Yi*h z8;BOE?J35M=QGLZrMH)Np{z}m(2WrL09EGDOy)Mmi$5|g=mv1CPlZpCrHI-F+wDf8 z5HDkQM}I*D<%NcHbsPmASo@8 z$*5HLhPUf@raX0qIOfgHE|8mbbYt9RjJAUI;7=nNd_flM0DkOc>N6lbsfDT+b~Q01 zn=A(x4fF9hR)L1H;vcV_VEfl=uUXpv_1e@Pf4p{LEzW}a8KX3871OtA{=7~UouLAL&+osq1j*sNau~joLY^((;BXK-4T;fc0;0h6R!y3NJI0Ivlh*hSjM-*;*+nmmU zbJ9Jvhw7Tt6%L$7hL>bs5Pw?bo*EZb>U5(vW|*Pt&Npu~V^sPdHuJ=s=AWsmXXk&> z-JEef4uOrO{H3P|i?R@nT_wamue#Q{zRB)p@+7JM{^m4p)v+(Y!v(>~o)UNzFNwRY zcq)xL*dA!k4;>8|nM`{oE{=y0VwPF9+`Bd)EM)pCA#y@xQL-r3PnUJNF0XI+`XzbU zS6xrMRE$-=ftJLQV>W%4hYDp1EW|Kdtu{ zKYpzzCMN!P$$C8hHS5mt$>+Lfa5!842|C>Q3_3ddA(o-CJyOx@hbhL+66f`*?0ysZ zrgV60!rNAgU)H)i^+U;Um2;JySzj5*uwJPvc;?LvL|syNffYejG? zjuTmRjTp5SCxTI4iF$lf$S&&9WUN7Jqt7ic-br6rk9^rUiZDopb+-eA?WBT!-XPUK z$p*Hv-#F{&;G>_e?09LXT{Y>G@ Date: Mon, 21 Oct 2024 23:07:01 -0300 Subject: [PATCH 08/13] forward-port rancher-aks-operator 102.5.0+up1.1.5 --- .../rancher-aks-operator-102.5.0+up1.1.5.tgz | Bin 0 -> 2037 bytes .../102.5.0+up1.1.5/Chart.yaml | 20 ++++++ .../102.5.0+up1.1.5/templates/NOTES.txt | 4 ++ .../102.5.0+up1.1.5/templates/_helpers.tpl | 25 +++++++ .../templates/clusterrole.yaml | 15 +++++ .../templates/clusterrolebinding.yaml | 13 ++++ .../102.5.0+up1.1.5/templates/deployment.yaml | 61 ++++++++++++++++++ .../templates/serviceaccount.yaml | 5 ++ .../102.5.0+up1.1.5/values.yaml | 23 +++++++ index.yaml | 24 +++++++ release.yaml | 2 + 11 files changed, 192 insertions(+) create mode 100644 assets/rancher-aks-operator/rancher-aks-operator-102.5.0+up1.1.5.tgz create mode 100644 charts/rancher-aks-operator/102.5.0+up1.1.5/Chart.yaml create mode 100644 charts/rancher-aks-operator/102.5.0+up1.1.5/templates/NOTES.txt create mode 100644 charts/rancher-aks-operator/102.5.0+up1.1.5/templates/_helpers.tpl create mode 100644 charts/rancher-aks-operator/102.5.0+up1.1.5/templates/clusterrole.yaml create mode 100644 charts/rancher-aks-operator/102.5.0+up1.1.5/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-aks-operator/102.5.0+up1.1.5/templates/deployment.yaml create mode 100644 charts/rancher-aks-operator/102.5.0+up1.1.5/templates/serviceaccount.yaml create mode 100644 charts/rancher-aks-operator/102.5.0+up1.1.5/values.yaml diff --git a/assets/rancher-aks-operator/rancher-aks-operator-102.5.0+up1.1.5.tgz b/assets/rancher-aks-operator/rancher-aks-operator-102.5.0+up1.1.5.tgz new file mode 100644 index 0000000000000000000000000000000000000000..250e24d1bf5af5dc44b538c8e3725dff2adc2934 GIT binary patch literal 2037 zcmVDc zVQyr3R8em|NM&qo0PGrnZ{xQ0{??~>a4=-+PO|Jc$wAl+$a2Lxv`vEK*6mOn4m9;_ zai&R?k8&<^{oMyrvMk$5oTj&AL;e1-Og+9|;`=EXrg(-XWD^Q?j)qxny5|`)Ho9X| z`RYqR9LMp=VBmk_INtp24UXbhy}@Zb7#zp$I_@3!d#A4;{vzCWKtYz7SMjgrwW-|y z2{5I!WmafKNdUl^Wm1nL&a9Of3EgFd)uB*inUo2%9hZ=s^zD>cp0yI-Xsj3sOzYjP zXqiY;R0(vfDX`OuGAV`_&d`w1DuKg4zlC1ZkE1w@;ZN@Jjk`Q--Ky9WDQ6rLC>KMz zBa72kWK9W3p^DF~cXKpTVJWP!Uf&9p>RW2ZHhLyfq;Nbl39t!qS&&7;wHk>rMQlP1 z>{+js$kOU-y7!~gO7(v9faV4zGQ!YVp#Ax^ZX>R9Okm0s8{-s}4OlLISn{9s1D5CY z-(J*2}A$X2me# zdb(7*yC&=ddXO#*M@oY5(bQ^-_TqkY9L0Yu@=}?X_RHsj*7!eTvOxM`31CP3k579? zoAG~e67S>xbHG^YA(K_;w-VhIKp7n0;fNK|UgKDhHFpVgIzhlDbXlDfhbyLRTx~L# zYZ6vF%vNV}NS2Kgn3X;jI4`|2`g2Lz`|Rqk(yMEhrozP)Cf^$uHPZ7lN?^n!VGtY~ zz=ci`BpafnGT7)87?Bt&AG!_>;2KA(7~>L&QD~7|s7p1cZb4|maUoLdDxG3TD3Lps z-QeILa7#CSMVkcX3rF!gK^F7~+&!>NC`({9SS_8p2){S@Qy~lzd|R^vpR-Q>5L8$` z?ZS^Ay%JYOXd~?1xnx8aY>Jf%m^!*C=2G7|b)q2O#Pmjb((`Zie~Z&xGK^xc(Nni_UM`&bstC@nDf-Q1;FpCR{{JaMnWLe|=1(sL zcJ+U~qvH+#KRxLU_Wu7IFrRn7f|-~mKxknkB-*nFkGmK!uP!SRf9T`2pD1J+AFrT-r6@c+it>FLwp9sWP)^|$i>(b4hV z|DOYz{?GE9R<8c8e)RWb`Z7;F%6}+F?lv3DrQnPb=mh}Fj-nhN`!|T+`5A7x05HMk zTe-SxVG{}fmWQ<3-4M}%TqCrD6u?qI2OGoQIS9pNk>1x0Mes8yp;A;9-oSPX+$2}t z2CF}?scgsi88&ITc51Pxgj*XN-y_>v!?;VlX6xE2T@zu4aI_X>FWN$^gAEC`rr9fk zZG-Ol{N9a=MW?}HLo{A^T&*mAwyT3NqAKt7;`p>)HHA8(zZ06Zb*`0VLZPV-R@k0M zN+{orxTmx{s}BrMB3LZu^V%ql*DR5z6Rlpaz+#a+h-%q*rFkXCRUze-mV)0U@VC*0 zwpRuTeJ(5k)of*zrC#5>e}DDq>iY7ZAL?86oS`8?{UWEywn^jWkwoZTDi@cJAW^+D zYB}a@Z;+a74%QwaOx*z{KMP;&1h+>hu(uj=$v8IR%S_8+ir@QfNkc|Q*^k0gVZ4Li zfgsSg3R4)~l?B=!gEK-X`y!`O^}z{u1&l-EOiE1sgUb*`g)Iz%HcRtg-aKsBd?LEm zotdt)ur~C+VcwD)ZM*CvIF~*3`Z28{()T*W1mZy)uS@E8T(mO?*5d6;S2TP0C9tFZ zuQEC-Gx`&IfL;B6?`X6C@AXcP_VxdBz}i<`%hG?NTiz`H@A;6fr4o8+?e?&TJ?vo* T_rZSx00960h}^{N05AXmE?57g literal 0 HcmV?d00001 diff --git a/charts/rancher-aks-operator/102.5.0+up1.1.5/Chart.yaml b/charts/rancher-aks-operator/102.5.0+up1.1.5/Chart.yaml new file mode 100644 index 0000000000..96fdec6431 --- /dev/null +++ b/charts/rancher-aks-operator/102.5.0+up1.1.5/Chart.yaml @@ -0,0 +1,20 @@ +annotations: + catalog.cattle.io/auto-install: rancher-aks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: aksclusterconfigs.aks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-aks-operator + catalog.cattle.io/scope: management +apiVersion: v2 +appVersion: 1.1.5 +description: A Helm chart for provisioning AKS clusters +home: https://github.com/rancher/aks-operator +name: rancher-aks-operator +sources: +- https://github.com/rancher/aks-operator +version: 102.5.0+up1.1.5 diff --git a/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/NOTES.txt b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/NOTES.txt new file mode 100644 index 0000000000..5ba05b482c --- /dev/null +++ b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/NOTES.txt @@ -0,0 +1,4 @@ +You have deployed the Rancher AKS operator +Version: {{ .Chart.AppVersion }} +Description: This operator provisions AKS clusters +from AKSClusterConfig CRs. diff --git a/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/_helpers.tpl b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/_helpers.tpl new file mode 100644 index 0000000000..de3b332f6a --- /dev/null +++ b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/_helpers.tpl @@ -0,0 +1,25 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} + diff --git a/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/clusterrole.yaml b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/clusterrole.yaml new file mode 100644 index 0000000000..5e2ce97567 --- /dev/null +++ b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/clusterrole.yaml @@ -0,0 +1,15 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: aks-operator + namespace: cattle-system +rules: + - apiGroups: [''] + resources: ['secrets'] + verbs: ['get', 'list', 'create', 'watch', 'update'] + - apiGroups: ['aks.cattle.io'] + resources: ['aksclusterconfigs'] + verbs: ['get', 'list', 'update', 'watch'] + - apiGroups: ['aks.cattle.io'] + resources: ['aksclusterconfigs/status'] + verbs: ['update'] diff --git a/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/clusterrolebinding.yaml b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/clusterrolebinding.yaml new file mode 100644 index 0000000000..7aa7e785a4 --- /dev/null +++ b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/clusterrolebinding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: aks-operator + namespace: cattle-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: aks-operator +subjects: +- kind: ServiceAccount + name: aks-operator + namespace: cattle-system diff --git a/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/deployment.yaml b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/deployment.yaml new file mode 100644 index 0000000000..1d85eb18c8 --- /dev/null +++ b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/deployment.yaml @@ -0,0 +1,61 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: aks-config-operator + namespace: cattle-system +spec: + replicas: 1 + selector: + matchLabels: + ke.cattle.io/operator: aks + template: + metadata: + labels: + ke.cattle.io/operator: aks + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + serviceAccountName: aks-operator + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + securityContext: + fsGroup: 1007 + runAsUser: 1007 + containers: + - name: aks-operator + image: {{ template "system_default_registry" . }}{{ .Values.aksOperator.image.repository }}:{{ .Values.aksOperator.image.tag }} + imagePullPolicy: IfNotPresent + env: + - name: HTTP_PROXY + value: {{ .Values.httpProxy }} + - name: HTTPS_PROXY + value: {{ .Values.httpsProxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} +{{- if .Values.additionalTrustedCAs }} + # aks-operator mounts the additional CAs in two places: + volumeMounts: + # This directory is owned by the aks-operator user so c_rehash works here. + - mountPath: /etc/rancher/ssl/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + # This directory is root-owned so c_rehash doesn't work here, + # but the cert is here in case update-ca-certificates is called in the future or by the OS. + - mountPath: /etc/pki/trust/anchors/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + volumes: + - name: tls-ca-additional-volume + secret: + defaultMode: 0400 + secretName: tls-ca-additional + {{- end }} diff --git a/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/serviceaccount.yaml b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/serviceaccount.yaml new file mode 100644 index 0000000000..9c40a152f5 --- /dev/null +++ b/charts/rancher-aks-operator/102.5.0+up1.1.5/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: cattle-system + name: aks-operator diff --git a/charts/rancher-aks-operator/102.5.0+up1.1.5/values.yaml b/charts/rancher-aks-operator/102.5.0+up1.1.5/values.yaml new file mode 100644 index 0000000000..eb5fb4a3b7 --- /dev/null +++ b/charts/rancher-aks-operator/102.5.0+up1.1.5/values.yaml @@ -0,0 +1,23 @@ +global: + cattle: + systemDefaultRegistry: "" + +aksOperator: + image: + repository: rancher/aks-operator + tag: v1.1.5 + +httpProxy: "" +httpsProxy: "" +noProxy: "" +additionalTrustedCAs: false + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" diff --git a/index.yaml b/index.yaml index f954ae9bd1..240bd2bf51 100755 --- a/index.yaml +++ b/index.yaml @@ -8934,6 +8934,30 @@ entries: urls: - assets/rancher-aks-operator/rancher-aks-operator-103.0.0+up1.2.0.tgz version: 103.0.0+up1.2.0 + - annotations: + catalog.cattle.io/auto-install: rancher-aks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: aksclusterconfigs.aks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-aks-operator + catalog.cattle.io/scope: management + apiVersion: v2 + appVersion: 1.1.5 + created: "2024-10-21T23:06:58.701014835-03:00" + description: A Helm chart for provisioning AKS clusters + digest: 3da840f375bbdf06cb19dc03107a6602d1c2d2fd20a12cc727782068efa022a4 + home: https://github.com/rancher/aks-operator + name: rancher-aks-operator + sources: + - https://github.com/rancher/aks-operator + urls: + - assets/rancher-aks-operator/rancher-aks-operator-102.5.0+up1.1.5.tgz + version: 102.5.0+up1.1.5 - annotations: catalog.cattle.io/auto-install: rancher-aks-operator-crd=match catalog.cattle.io/certified: rancher diff --git a/release.yaml b/release.yaml index 8d9db645b8..06e4517cde 100644 --- a/release.yaml +++ b/release.yaml @@ -7,3 +7,5 @@ fleet-agent: fleet-crd: - 102.2.7+up0.8.6 - 102.2.6+up0.8.5 +rancher-aks-operator: + - 102.5.0+up1.1.5 From 4151340e6bcbbe4f18867eb7c6a82e65e96edee8 Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:07:05 -0300 Subject: [PATCH 09/13] forward-port rancher-aks-operator-crd 102.5.0+up1.1.5 --- ...ncher-aks-operator-crd-102.5.0+up1.1.5.tgz | Bin 0 -> 1249 bytes .../102.5.0+up1.1.5/Chart.yaml | 12 + .../102.5.0+up1.1.5/templates/crds.yaml | 211 ++++++++++++++++++ index.yaml | 16 ++ release.yaml | 2 + 5 files changed, 241 insertions(+) create mode 100644 assets/rancher-aks-operator-crd/rancher-aks-operator-crd-102.5.0+up1.1.5.tgz create mode 100644 charts/rancher-aks-operator-crd/102.5.0+up1.1.5/Chart.yaml create mode 100644 charts/rancher-aks-operator-crd/102.5.0+up1.1.5/templates/crds.yaml diff --git a/assets/rancher-aks-operator-crd/rancher-aks-operator-crd-102.5.0+up1.1.5.tgz b/assets/rancher-aks-operator-crd/rancher-aks-operator-crd-102.5.0+up1.1.5.tgz new file mode 100644 index 0000000000000000000000000000000000000000..803a7dd0955f12c4c8dc231160231ddc98b2fc60 GIT binary patch literal 1249 zcmV<71RnbziwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI;$ZyUE0^;w^S$o2P=yozPJ&`p-xz(|@3QIZ0^jmYte6_+G9 zL)l8v?_TV#}g(3U|R52p~gvw*@J zJ=d}<%g%be>Ti~1>wmMelkBM5JI{K()2w&WJ<7VL=V#|fB6~LT9u|oq9A(euT6gY0 zVqmRfVC^jRTS7=+FfQ*%U^dv%?pR`AeXUXT#WGhKhfTFoX#3&~hlp<)hgc|(JV@+| zy0J|QVk{a5JL(IgZM<#l^%x4x)V>?_{~K+UyP?L>0Sy9SyPUwC7aJMh002B zq_fvLrw+{Mdj+@1qb%|A;G(aF-|MVFmVEVG2k*zj8gE$PRbAf10H%Sg>ZPd*{P8040HTqXV%@=Uo;v;eQ^zjuq6aZ=dmw7uEbBZgjiO6#nfJg zVBW2%T7*0T%0X{uToc11hwv z!HiJ`uA53(K@h39BrP0$%Ie#Gqpgb1m`8C&hJghT$S;mE%yWkP>^!><8W( zEh{zq_X~Hw#YXw z%tj{WI%z(xfa^0uN?@mOQWmhRo$Jyj2;k`y=RqL5ZvTXl)Tly&!8>; zAPVP#oFZ}c_ObO)^=Q5w^LBKpX*Sm1@ZH6M>#3&tT#h@iONZx}7iGu}%wdtoabl6L zE)U7Hv&f!&lPxQA^+J>U^y?x|T(qirp`VWHol1Rs^Fhynarp+6^sKvtzO+=H@lsAY z9BScKz#m+FnN5jJ^~FB*0uoI}abmQ5k4ew{RF!s0M25U!r`vafe}NaTMvaMtVL+sF z`|O)$khdvNTIrd9{JFY= zHM~YWSu7i)xY1ZWo~wJ{#4eNpyVnvYD-FAg@^UT2Uw^;Y|H@wN)n4t@ekA)R00960 L$BI4=03-kaWjK5s literal 0 HcmV?d00001 diff --git a/charts/rancher-aks-operator-crd/102.5.0+up1.1.5/Chart.yaml b/charts/rancher-aks-operator-crd/102.5.0+up1.1.5/Chart.yaml new file mode 100644 index 0000000000..7cdffb6a30 --- /dev/null +++ b/charts/rancher-aks-operator-crd/102.5.0+up1.1.5/Chart.yaml @@ -0,0 +1,12 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-aks-operator-crd +apiVersion: v2 +appVersion: 1.1.5 +description: AKS Operator CustomResourceDefinitions +name: rancher-aks-operator-crd +version: 102.5.0+up1.1.5 diff --git a/charts/rancher-aks-operator-crd/102.5.0+up1.1.5/templates/crds.yaml b/charts/rancher-aks-operator-crd/102.5.0+up1.1.5/templates/crds.yaml new file mode 100644 index 0000000000..c4fcdfac05 --- /dev/null +++ b/charts/rancher-aks-operator-crd/102.5.0+up1.1.5/templates/crds.yaml @@ -0,0 +1,211 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + helm.sh/resource-policy: keep + name: aksclusterconfigs.aks.cattle.io +spec: + group: aks.cattle.io + names: + kind: AKSClusterConfig + plural: aksclusterconfigs + shortNames: + - akscc + singular: aksclusterconfig + preserveUnknownFields: false + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + authBaseUrl: + nullable: true + type: string + authorizedIpRanges: + items: + nullable: true + type: string + nullable: true + type: array + azureCredentialSecret: + nullable: true + type: string + baseUrl: + nullable: true + type: string + clusterName: + nullable: true + type: string + dnsPrefix: + nullable: true + type: string + dnsServiceIp: + nullable: true + type: string + dockerBridgeCidr: + nullable: true + type: string + httpApplicationRouting: + nullable: true + type: boolean + imported: + type: boolean + kubernetesVersion: + nullable: true + type: string + linuxAdminUsername: + nullable: true + type: string + loadBalancerSku: + nullable: true + type: string + logAnalyticsWorkspaceGroup: + nullable: true + type: string + logAnalyticsWorkspaceName: + nullable: true + type: string + managedIdentity: + nullable: true + type: boolean + monitoring: + nullable: true + type: boolean + networkPlugin: + nullable: true + type: string + networkPolicy: + nullable: true + type: string + nodePools: + items: + properties: + availabilityZones: + items: + nullable: true + type: string + nullable: true + type: array + count: + nullable: true + type: integer + enableAutoScaling: + nullable: true + type: boolean + maxCount: + nullable: true + type: integer + maxPods: + nullable: true + type: integer + maxSurge: + nullable: true + type: string + minCount: + nullable: true + type: integer + mode: + nullable: true + type: string + name: + nullable: true + type: string + nodeLabels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + nodeTaints: + items: + nullable: true + type: string + nullable: true + type: array + orchestratorVersion: + nullable: true + type: string + osDiskSizeGB: + nullable: true + type: integer + osDiskType: + nullable: true + type: string + osType: + nullable: true + type: string + vmSize: + nullable: true + type: string + vnetSubnetID: + nullable: true + type: string + type: object + nullable: true + type: array + nodeResourceGroup: + nullable: true + type: string + outboundType: + nullable: true + type: string + podCidr: + nullable: true + type: string + privateCluster: + nullable: true + type: boolean + privateDnsZone: + nullable: true + type: string + resourceGroup: + nullable: true + type: string + resourceLocation: + nullable: true + type: string + serviceCidr: + nullable: true + type: string + sshPublicKey: + nullable: true + type: string + subnet: + nullable: true + type: string + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + userAssignedIdentity: + nullable: true + type: string + virtualNetwork: + nullable: true + type: string + virtualNetworkResourceGroup: + nullable: true + type: string + type: object + status: + properties: + failureMessage: + nullable: true + type: string + phase: + nullable: true + type: string + rbacEnabled: + nullable: true + type: boolean + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/index.yaml b/index.yaml index 240bd2bf51..0360ec9ccb 100755 --- a/index.yaml +++ b/index.yaml @@ -9388,6 +9388,22 @@ entries: urls: - assets/rancher-aks-operator-crd/rancher-aks-operator-crd-103.0.0+up1.2.0.tgz version: 103.0.0+up1.2.0 + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-aks-operator-crd + apiVersion: v2 + appVersion: 1.1.5 + created: "2024-10-21T23:07:02.585936648-03:00" + description: AKS Operator CustomResourceDefinitions + digest: 9725ceaad8eb445a6d728a55dc0ca5d3d20eb657570a0e4bbe8efacb9f47f1ca + name: rancher-aks-operator-crd + urls: + - assets/rancher-aks-operator-crd/rancher-aks-operator-crd-102.5.0+up1.1.5.tgz + version: 102.5.0+up1.1.5 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" diff --git a/release.yaml b/release.yaml index 06e4517cde..082d4c2f3e 100644 --- a/release.yaml +++ b/release.yaml @@ -9,3 +9,5 @@ fleet-crd: - 102.2.6+up0.8.5 rancher-aks-operator: - 102.5.0+up1.1.5 +rancher-aks-operator-crd: + - 102.5.0+up1.1.5 From 1a74cae978f033c6a82aa82d08f053059d93fbea Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:07:08 -0300 Subject: [PATCH 10/13] forward-port rancher-eks-operator 102.3.0+up1.2.4 --- .../rancher-eks-operator-102.3.0+up1.2.4.tgz | Bin 0 -> 2035 bytes .../102.3.0+up1.2.4/Chart.yaml | 20 ++++++ .../102.3.0+up1.2.4/templates/NOTES.txt | 4 ++ .../102.3.0+up1.2.4/templates/_helpers.tpl | 25 +++++++ .../templates/clusterrole.yaml | 15 +++++ .../templates/clusterrolebinding.yaml | 13 ++++ .../102.3.0+up1.2.4/templates/deployment.yaml | 61 ++++++++++++++++++ .../templates/serviceaccount.yaml | 5 ++ .../102.3.0+up1.2.4/values.yaml | 22 +++++++ index.yaml | 24 +++++++ release.yaml | 2 + 11 files changed, 191 insertions(+) create mode 100644 assets/rancher-eks-operator/rancher-eks-operator-102.3.0+up1.2.4.tgz create mode 100644 charts/rancher-eks-operator/102.3.0+up1.2.4/Chart.yaml create mode 100644 charts/rancher-eks-operator/102.3.0+up1.2.4/templates/NOTES.txt create mode 100644 charts/rancher-eks-operator/102.3.0+up1.2.4/templates/_helpers.tpl create mode 100644 charts/rancher-eks-operator/102.3.0+up1.2.4/templates/clusterrole.yaml create mode 100644 charts/rancher-eks-operator/102.3.0+up1.2.4/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-eks-operator/102.3.0+up1.2.4/templates/deployment.yaml create mode 100644 charts/rancher-eks-operator/102.3.0+up1.2.4/templates/serviceaccount.yaml create mode 100644 charts/rancher-eks-operator/102.3.0+up1.2.4/values.yaml diff --git a/assets/rancher-eks-operator/rancher-eks-operator-102.3.0+up1.2.4.tgz b/assets/rancher-eks-operator/rancher-eks-operator-102.3.0+up1.2.4.tgz new file mode 100644 index 0000000000000000000000000000000000000000..2998921ff7c67af767a043fea89adde3cb78f60d GIT binary patch literal 2035 zcmVDc zVQyr3R8em|NM&qo0PH$#Z`;Vx`OIH2knzAzuOUUriX9M5fz%0l#ogJ4on9Lp0%Nrt ziCe9>yq%>SRj2=6?2@8LnznpC*KSeG7g5XEdE?G2saeVs)IQG0R~c$%li!r#oR zt=xYJuryVM8KF{&JOIuNlWH1pW{ku@s6NY$@6*bSy2R1r1{s*yBX@aFyvQQuWv*es~hUZ)@mVQB!9Zl5#Wrt%*mkUDxHWa z1vsM`_F~XUWMlP)?!(|D7&_I5!9AL5l*kBuYk}_P*SU?j$}oaCOW73Xm>Q2|;>QjD z#n59}R{b3W!(imaNL-7|xTW{-Ey_7?8%bcIG&n<8bdgTs<9An38iKq;S;-P(GK%{B zsW3@C4!D|c)b2Ngy+;pHx#mcb=RcTQWzj)6432{E_jy(*^U{9#T+kW+7fj|zPnH07 z#Q*SQFl@*F(aApkKMPEy8Z%jjek0Ld0TjXU15Q{j%_U9+8NH04*YiA_(Rq1JEUuWd zX}L*brbrlNF*}{jA{jP~U{Uy(XT9`7tFHxV=d;_tsoGw%I2JapF!@Q_s1cvOrwArY z5_$&*aHe7e$;K$Dh&3t(MkJ=Gi(Cf>aEX&`h_QJ@r)ZFDq>B}&eomyrz%FD zP$IV+``*EUXP2(riqa9R)|TS;f()n$*n41@NDYBeV3f4lBK*I`pL3y+;Jb<)xRiDL zJFmoYSr>l#;#qDXSGd9Ok1&l4-7&EDsR-M4h+L+Epk9+=|{%>%eNoJ7x zXXl?jUIpf>`7LK`m;Vos+Wvohax~cc|8u}+l|#Z7SROEY*b;=x;#9aiUAb?S?pG@a ziWcF0RRq9#?R}^h0G|>;)!uFPr)KV-Xf?Mhr^UjltBTzM`|NsJ3NVq-FxW|D%5IQ3OyD zR)2b1c`%J{U3*q>?{7utwuwh@Bcuct$51L)Bz9L*xK__)dwOl_5g4OXH|26IpW9@8 zqx4KF787ulON$D`6O40NBy*D}!a7CIS-Eaxchh&ZNR4=*lMgerby2-zwH>o7+oN)? zUBJl%xrv~6rmjlK%yxgpRHoJK-8ppAxkNW^^nqpK&syb~?Sl>vzm$#SW|9Lx9TIYlhRRzD)MK|i zMRWKX4y7RX%QZ5C_UeWio;d6l@y4XBi_@*)+zy_37C$}DJ{e~6TdYf7U!FXqKHUGu zB8^2leMA`8<^QA6am)XQ;mN-Ldlq=Gx8DjBe=5#HM;Lf`98eN3abkCF+~yuBJb>HL zsx$OZKK=)C<0iqymMhc?!SOxkDo@R?4p=Y!l>U9N!~bhzr^io&cliHkFdVk?|Iz4p z@BhyMb^m8sMq5|^P(AuPGJTP;9^^liA-9_~W>RoQ5ez(lO-E6TkKG%@@7)l$SOAz| z{jFTpwcw0AfXyK-ch^L;ARB~skOJ5UXrVRjU4cls%;USdp#Xk?RHQMc2HwK$7PwBX zxD7^qW^>t%@e8zR*>-BZE`@7Mj_;7I(J<~3uim@kNAsjWL>{(Zcwa}8_);N1h zuxrx2THU#Ez3$amv_#{%!&RxluV#BNCRFB~K^UG?t2$5L(_aa7W1XwiFp;9J4wm1Y zND3(4jo7EOIji>!PXbu4SF6e>wbv|xqZ4djufTd8-HU42bgOwO$3-sXg_43VBlyeY zOqmOfgf15rfazjum5pBCe)@EAeQ|mI_s`X>YR*s-p?Z;1XIrOn^*|zYCzZ4F2aqV= z8Fd`0`0 z_nE^M3VRw!egn@hRA``5J}y|?Pf;U_&r`XKz~~%zYOj?teqn;Trm;dw4~^5R{`V}<_^NAD`nS5}cKLtDhjbm4&`WE#hdu0J4|})^ R{uKZK|Nl+PRsH}l000L7`5^!R literal 0 HcmV?d00001 diff --git a/charts/rancher-eks-operator/102.3.0+up1.2.4/Chart.yaml b/charts/rancher-eks-operator/102.3.0+up1.2.4/Chart.yaml new file mode 100644 index 0000000000..4ce3062c8c --- /dev/null +++ b/charts/rancher-eks-operator/102.3.0+up1.2.4/Chart.yaml @@ -0,0 +1,20 @@ +annotations: + catalog.cattle.io/auto-install: rancher-eks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: eksclusterconfigs.eks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.2-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-eks-operator + catalog.cattle.io/scope: management +apiVersion: v2 +appVersion: 1.2.4 +description: A Helm chart for provisioning EKS clusters +home: https://github.com/rancher/eks-operator +name: rancher-eks-operator +sources: +- https://github.com/rancher/eks-operator +version: 102.3.0+up1.2.4 diff --git a/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/NOTES.txt b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/NOTES.txt new file mode 100644 index 0000000000..23a1b4a8bf --- /dev/null +++ b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/NOTES.txt @@ -0,0 +1,4 @@ +You have deployed the Rancher EKS operator +Version: {{ .Chart.AppVersion }} +Description: This operator provisions EKS clusters +from EKSClusterConfig CRs. diff --git a/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/_helpers.tpl b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/_helpers.tpl new file mode 100644 index 0000000000..de3b332f6a --- /dev/null +++ b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/_helpers.tpl @@ -0,0 +1,25 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} + diff --git a/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/clusterrole.yaml b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/clusterrole.yaml new file mode 100644 index 0000000000..d0d561b6ea --- /dev/null +++ b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/clusterrole.yaml @@ -0,0 +1,15 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: eks-operator + namespace: cattle-system +rules: + - apiGroups: [''] + resources: ['secrets'] + verbs: ['get', 'list', 'create', 'watch'] + - apiGroups: ['eks.cattle.io'] + resources: ['eksclusterconfigs'] + verbs: ['get', 'list', 'update', 'watch'] + - apiGroups: ['eks.cattle.io'] + resources: ['eksclusterconfigs/status'] + verbs: ['update'] diff --git a/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/clusterrolebinding.yaml b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/clusterrolebinding.yaml new file mode 100644 index 0000000000..2b1846353e --- /dev/null +++ b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/clusterrolebinding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: eks-operator + namespace: cattle-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: eks-operator +subjects: +- kind: ServiceAccount + name: eks-operator + namespace: cattle-system diff --git a/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/deployment.yaml b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/deployment.yaml new file mode 100644 index 0000000000..f63054b2e6 --- /dev/null +++ b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/deployment.yaml @@ -0,0 +1,61 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: eks-config-operator + namespace: cattle-system +spec: + replicas: 1 + selector: + matchLabels: + ke.cattle.io/operator: eks + template: + metadata: + labels: + ke.cattle.io/operator: eks + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + serviceAccountName: eks-operator + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + securityContext: + fsGroup: 1007 + runAsUser: 1007 + containers: + - name: eks-operator + image: {{ template "system_default_registry" . }}{{ .Values.eksOperator.image.repository }}:{{ .Values.eksOperator.image.tag }} + imagePullPolicy: IfNotPresent + env: + - name: HTTP_PROXY + value: {{ .Values.httpProxy }} + - name: HTTPS_PROXY + value: {{ .Values.httpsProxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} +{{- if .Values.additionalTrustedCAs }} + # eks-operator mounts the additional CAs in two places: + volumeMounts: + # This directory is owned by the eks-operator user so c_rehash works here. + - mountPath: /etc/rancher/ssl/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + # This directory is root-owned so c_rehash doesn't work here, + # but the cert is here in case update-ca-certificates is called in the future or by the OS. + - mountPath: /etc/pki/trust/anchors/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + volumes: + - name: tls-ca-additional-volume + secret: + defaultMode: 0400 + secretName: tls-ca-additional + {{- end }} diff --git a/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/serviceaccount.yaml b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/serviceaccount.yaml new file mode 100644 index 0000000000..934de07e0d --- /dev/null +++ b/charts/rancher-eks-operator/102.3.0+up1.2.4/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: cattle-system + name: eks-operator diff --git a/charts/rancher-eks-operator/102.3.0+up1.2.4/values.yaml b/charts/rancher-eks-operator/102.3.0+up1.2.4/values.yaml new file mode 100644 index 0000000000..5a4f669625 --- /dev/null +++ b/charts/rancher-eks-operator/102.3.0+up1.2.4/values.yaml @@ -0,0 +1,22 @@ +global: + cattle: + systemDefaultRegistry: "" + +eksOperator: + image: + repository: rancher/eks-operator + tag: v1.2.4 + +httpProxy: "" +httpsProxy: "" +noProxy: "" +additionalTrustedCAs: false +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" diff --git a/index.yaml b/index.yaml index 0360ec9ccb..09e8bb51f3 100755 --- a/index.yaml +++ b/index.yaml @@ -12623,6 +12623,30 @@ entries: urls: - assets/rancher-eks-operator/rancher-eks-operator-103.0.0+up1.3.0.tgz version: 103.0.0+up1.3.0 + - annotations: + catalog.cattle.io/auto-install: rancher-eks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: eksclusterconfigs.eks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.2-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-eks-operator + catalog.cattle.io/scope: management + apiVersion: v2 + appVersion: 1.2.4 + created: "2024-10-21T23:07:06.292571725-03:00" + description: A Helm chart for provisioning EKS clusters + digest: 22f56f4d509de7fe1debd52840aebe4b0c6ef6878056bb1642b127e547da9039 + home: https://github.com/rancher/eks-operator + name: rancher-eks-operator + sources: + - https://github.com/rancher/eks-operator + urls: + - assets/rancher-eks-operator/rancher-eks-operator-102.3.0+up1.2.4.tgz + version: 102.3.0+up1.2.4 - annotations: catalog.cattle.io/auto-install: rancher-eks-operator-crd=match catalog.cattle.io/certified: rancher diff --git a/release.yaml b/release.yaml index 082d4c2f3e..9aeabe18df 100644 --- a/release.yaml +++ b/release.yaml @@ -11,3 +11,5 @@ rancher-aks-operator: - 102.5.0+up1.1.5 rancher-aks-operator-crd: - 102.5.0+up1.1.5 +rancher-eks-operator: + - 102.3.0+up1.2.4 From 9a14201d9625c71afbc9f075dd3e91538ff97b40 Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:07:12 -0300 Subject: [PATCH 11/13] forward-port rancher-eks-operator-crd 102.3.0+up1.2.4 --- ...ncher-eks-operator-crd-102.3.0+up1.2.4.tgz | Bin 0 -> 1208 bytes .../102.3.0+up1.2.4/Chart.yaml | 12 + .../102.3.0+up1.2.4/templates/crds.yaml | 226 ++++++++++++++++++ index.yaml | 16 ++ release.yaml | 2 + 5 files changed, 256 insertions(+) create mode 100644 assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.3.0+up1.2.4.tgz create mode 100644 charts/rancher-eks-operator-crd/102.3.0+up1.2.4/Chart.yaml create mode 100644 charts/rancher-eks-operator-crd/102.3.0+up1.2.4/templates/crds.yaml diff --git a/assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.3.0+up1.2.4.tgz b/assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.3.0+up1.2.4.tgz new file mode 100644 index 0000000000000000000000000000000000000000..4d1077c5a5fd21f2745baaba6d4d8c525d7c0001 GIT binary patch literal 1208 zcmV;p1V{THiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI;`QzJJF=XpPc=U&@{4VTMx@^%xh9p+kkbD_K|Ua@iGwOz>$ zQlYcpo41`XA$dzd!hJ)H{fKgIq1*osqYYz#ixz-Wh8>xECT|jP>A^ zH9U-jkl;bvv@5}Tja_9AC6ZSc3X`FzYNdADR3!n2u6O->sZ3%oxpp_9MqupZ4qQjEQSlKtb&kZ!nxU84Ff}q51Un+1mZ%bLG=|<}JV%`Ezi=<(Kx}gY#fFvotpP;|qQ?Ofmw1rO(ip@^`M(G=33r0@Q zsv&WwJl@x@xv0jX*cwJ`m!4`Q*&EutiQ^v)co$V{@n$o)+5=~0%IpCp|9*V4`ic8I zM=2)L`cbD%D8hdNvL8F^Pbwa3?3$KHc{#bCLHbI$j90SRFc_86ICA{Jxa!8HDy%Ru z=wC@N{?%4rV5H;f_`D;^9p2vanP~$g=catHuEXfuCdtMFL_?k)eSmPJ=HT&@l*lzT zvBPQ6g^5=3i4Bhn=6wMNHNv#zgDMyI5&YRmT9j9=Z6=vf22y_U;KSt)$}c0$m28-0 zc1Uv5C*rxqUr+zr68|2Yt|6`l1$*#;x4ovj0Hp)rAIJ=8tM5KVg9ILv)5anB@y0VS zkYe)ttyAL3@smTGuiUKOmgik7LKyUymS*Mkamo8_X3I^1+og_|#-J~T>efp6%pRl0 zx;vKV=J{Na51>!WN^Y;%YP)7*vG@@tS+ULDQqGwxD`B!c&0goNqGR#ze|!7Q^-bR7 WP2S`=$o~NV0RR7-w}PAiCIA3F_F7i} literal 0 HcmV?d00001 diff --git a/charts/rancher-eks-operator-crd/102.3.0+up1.2.4/Chart.yaml b/charts/rancher-eks-operator-crd/102.3.0+up1.2.4/Chart.yaml new file mode 100644 index 0000000000..a3d81cf8d9 --- /dev/null +++ b/charts/rancher-eks-operator-crd/102.3.0+up1.2.4/Chart.yaml @@ -0,0 +1,12 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-eks-operator-crd +apiVersion: v2 +appVersion: 1.2.4 +description: EKS Operator CustomResourceDefinitions +name: rancher-eks-operator-crd +version: 102.3.0+up1.2.4 diff --git a/charts/rancher-eks-operator-crd/102.3.0+up1.2.4/templates/crds.yaml b/charts/rancher-eks-operator-crd/102.3.0+up1.2.4/templates/crds.yaml new file mode 100644 index 0000000000..f1c4534210 --- /dev/null +++ b/charts/rancher-eks-operator-crd/102.3.0+up1.2.4/templates/crds.yaml @@ -0,0 +1,226 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + helm.sh/resource-policy: keep + name: eksclusterconfigs.eks.cattle.io +spec: + group: eks.cattle.io + names: + kind: EKSClusterConfig + plural: eksclusterconfigs + shortNames: + - ekscc + singular: eksclusterconfig + preserveUnknownFields: false + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + amazonCredentialSecret: + nullable: true + type: string + displayName: + nullable: true + type: string + ebsCSIDriver: + nullable: true + type: boolean + imported: + type: boolean + kmsKey: + nullable: true + type: string + kubernetesVersion: + nullable: true + type: string + loggingTypes: + items: + nullable: true + type: string + nullable: true + type: array + nodeGroups: + items: + properties: + desiredSize: + nullable: true + type: integer + diskSize: + nullable: true + type: integer + ec2SshKey: + nullable: true + type: string + gpu: + nullable: true + type: boolean + imageId: + nullable: true + type: string + instanceType: + nullable: true + type: string + labels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + launchTemplate: + nullable: true + properties: + id: + nullable: true + type: string + name: + nullable: true + type: string + version: + nullable: true + type: integer + type: object + maxSize: + nullable: true + type: integer + minSize: + nullable: true + type: integer + nodeRole: + nullable: true + type: string + nodegroupName: + nullable: true + type: string + requestSpotInstances: + nullable: true + type: boolean + resourceTags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + spotInstanceTypes: + items: + nullable: true + type: string + nullable: true + type: array + subnets: + items: + nullable: true + type: string + nullable: true + type: array + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + userData: + nullable: true + type: string + version: + nullable: true + type: string + required: + - nodegroupName + type: object + nullable: true + type: array + privateAccess: + nullable: true + type: boolean + publicAccess: + nullable: true + type: boolean + publicAccessSources: + items: + nullable: true + type: string + nullable: true + type: array + region: + nullable: true + type: string + secretsEncryption: + nullable: true + type: boolean + securityGroups: + items: + nullable: true + type: string + nullable: true + type: array + serviceRole: + nullable: true + type: string + subnets: + items: + nullable: true + type: string + nullable: true + type: array + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + type: object + status: + properties: + failureMessage: + nullable: true + type: string + generatedNodeRole: + nullable: true + type: string + managedLaunchTemplateID: + nullable: true + type: string + managedLaunchTemplateVersions: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + networkFieldsSource: + nullable: true + type: string + phase: + nullable: true + type: string + securityGroups: + items: + nullable: true + type: string + nullable: true + type: array + subnets: + items: + nullable: true + type: string + nullable: true + type: array + templateVersionsToDelete: + items: + nullable: true + type: string + nullable: true + type: array + virtualNetwork: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/index.yaml b/index.yaml index 09e8bb51f3..d5d834531e 100755 --- a/index.yaml +++ b/index.yaml @@ -13054,6 +13054,22 @@ entries: urls: - assets/rancher-eks-operator-crd/rancher-eks-operator-crd-103.0.0+up1.3.0.tgz version: 103.0.0+up1.3.0 + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-eks-operator-crd + apiVersion: v2 + appVersion: 1.2.4 + created: "2024-10-21T23:07:09.91425597-03:00" + description: EKS Operator CustomResourceDefinitions + digest: 309290b6aacc9043b0dc2fdce8688e5556c9ab2ee3e7152367d39deed22db95e + name: rancher-eks-operator-crd + urls: + - assets/rancher-eks-operator-crd/rancher-eks-operator-crd-102.3.0+up1.2.4.tgz + version: 102.3.0+up1.2.4 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" diff --git a/release.yaml b/release.yaml index 9aeabe18df..19bd9d96f9 100644 --- a/release.yaml +++ b/release.yaml @@ -13,3 +13,5 @@ rancher-aks-operator-crd: - 102.5.0+up1.1.5 rancher-eks-operator: - 102.3.0+up1.2.4 +rancher-eks-operator-crd: + - 102.3.0+up1.2.4 From 1c538250502cd487f33ab8483a63aff4f29fd19e Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:07:16 -0300 Subject: [PATCH 12/13] forward-port rancher-gke-operator 102.2.0+up1.1.8 --- .../rancher-gke-operator-102.2.0+up1.1.8.tgz | Bin 0 -> 2036 bytes .../102.2.0+up1.1.8/Chart.yaml | 20 ++++++ .../102.2.0+up1.1.8/templates/NOTES.txt | 4 ++ .../102.2.0+up1.1.8/templates/_helpers.tpl | 25 +++++++ .../templates/clusterrole.yaml | 15 +++++ .../templates/clusterrolebinding.yaml | 13 ++++ .../102.2.0+up1.1.8/templates/deployment.yaml | 61 ++++++++++++++++++ .../templates/serviceaccount.yaml | 5 ++ .../102.2.0+up1.1.8/values.yaml | 22 +++++++ index.yaml | 24 +++++++ release.yaml | 2 + 11 files changed, 191 insertions(+) create mode 100644 assets/rancher-gke-operator/rancher-gke-operator-102.2.0+up1.1.8.tgz create mode 100644 charts/rancher-gke-operator/102.2.0+up1.1.8/Chart.yaml create mode 100644 charts/rancher-gke-operator/102.2.0+up1.1.8/templates/NOTES.txt create mode 100644 charts/rancher-gke-operator/102.2.0+up1.1.8/templates/_helpers.tpl create mode 100644 charts/rancher-gke-operator/102.2.0+up1.1.8/templates/clusterrole.yaml create mode 100644 charts/rancher-gke-operator/102.2.0+up1.1.8/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-gke-operator/102.2.0+up1.1.8/templates/deployment.yaml create mode 100644 charts/rancher-gke-operator/102.2.0+up1.1.8/templates/serviceaccount.yaml create mode 100644 charts/rancher-gke-operator/102.2.0+up1.1.8/values.yaml diff --git a/assets/rancher-gke-operator/rancher-gke-operator-102.2.0+up1.1.8.tgz b/assets/rancher-gke-operator/rancher-gke-operator-102.2.0+up1.1.8.tgz new file mode 100644 index 0000000000000000000000000000000000000000..abd9c1c3d35969a94f1a1774cd13358a734aa336 GIT binary patch literal 2036 zcmVDc zVQyr3R8em|NM&qo0PH$#Z{xVp`&qwY;NU@?URSc@ILSij7T9JNcg5W$L9)Geaab&9 zYHYElMIDE7*7fUs1PliMHHw?q}-)MLgzKVvY;cz%SItou;h0*aK8oq+?Nx1KTf(+BI!r#oR zt=xYJuq;!C8KE+YJpj%OlWG!hW{ku@s6H!<@yEfqJYw`OdHlrxSo zl#4zs$l$CKSy2p9WX0Fcw>j#WFywErUf+l;Q8(0$t<_v4Nd9E5W0*{l%YqDQuClS1 zP%xQd4SODS5?Nclq5B{>tyCWb_h_zBA|v#z1-idq=QiRh#~5ZTV-uWVW;~XQpVs{6 z1CQnT=HDoYf;V1*#I?wcTY3lIp_~D?kp#v{gENFh7uf{9{r&?~h9EChR7FW#J zq}rr0S0s$Gn4QjMkqn!}FfV<~vtD|s)z^}=^V#jcnc6aE0S-h_QJ@XK0XYq)Qa1enHj;3XxzxQwjQn z61nBr_YMv`yL9bVl#XG!vJ`(1WI&CZjFo+Wsxh0?+-&Lkr`XEUr+z{Ju`Fqdj!)d{@3jp=OkxbNTT{|0BdWCp2! ze(~|cbzr`l-*U!w`TyXk?f)mI(ed8@p94Or0#Y`|>VVn9mLgo0r^4mwjr(rW{c;IG z*&@8#6albWdGG55z{gb3X74upQ#1FEwVK(LvvT3gRYh=iMZy0}27X!C;s0M!lsRe& zO#b*%U|0Va9UZs)|MVn^_Wu7Iuw3@Pfw`E)KxkkrB$`EzZ)eslJjEEk>91Cvw_N&= z;8}=H&9+>N%#5M;f7I_iiU3N& z%|E@ZJeVc7o;|C$_t&y>TgM}~5mEw65~!3b6T7P^T&w4@J-xQ|2#ipwn`*h1&uy~4 zQFCmRRvHfL$ik3cFYY*FMYW8uoHH~|H?76 zlKA*`a990za?+ar4Z`C=xR3wO0aKABF;wN(m6F()^XL)d0V_yA6PEF)vCyCA9Q&5xoRZWlN|W@kdSLMRK1#`9=YWS zn#0#{C{INch~?ciDD$1-!~K6G zvP5K)M}&c0{y!X^wETY%9`F0VXMqQM`>jCnr}8{>gn@_00VVMY$9Cu1ZSIl61GpWn zIztZ?qrW3JZW3H>xkfz~9N%%Sip>1W0qdo|(!URO_Xi3xvLur;8(~*mSAS!4cu;l>*UJU zVALlzlie7)t!t-rb%Y(lQ6tKpcZFCBEeURov$q7h zCf&>Bof}uHUX4XdG+sDdl^OhMwg+QORo;oh@N~1Pi|if!g-|!vxylR^8S2f!^5Ncl z)e_1(68p8*XZD^UN&u_Xa=D#``v%qQ<--~M4WNU#+j>|&IOC<$g#PH|w zxiXg;30+Ps0kiqmI&1yD`}pzl%jMO@-#%?#ZRQO%5jGb(b+&aH*AFB@cTzdOcmRp& z?x^Fqcikk_*&H+uEX?ddCN~q`?gYC>WMFO-q7(r}kPYRT+d{^oaV8}u?!%=BB?pg4}l%^ zf0fZ$nb9BF1MKSmqoa2JA4RA8`QNiZ<5ykl(!bR$x6A)Ken{8RQopozd)UJs_OOS$ S;GY2i0RR6-S#>x7FaQ9= 1.20.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: gkeclusterconfigs.gke.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-gke-operator + catalog.cattle.io/scope: management +apiVersion: v2 +appVersion: 1.1.8 +description: A Helm chart for provisioning GKE clusters +home: https://github.com/rancher/gke-operator +name: rancher-gke-operator +sources: +- https://github.com/rancher/gke-operator +version: 102.2.0+up1.1.8 diff --git a/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/NOTES.txt b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/NOTES.txt new file mode 100644 index 0000000000..238173d1bd --- /dev/null +++ b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/NOTES.txt @@ -0,0 +1,4 @@ +You have deployed the Rancher GKE operator +Version: {{ .Chart.AppVersion }} +Description: This operator provisions GKE clusters +from GKEClusterConfig CRs. diff --git a/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/_helpers.tpl b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/_helpers.tpl new file mode 100644 index 0000000000..de3b332f6a --- /dev/null +++ b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/_helpers.tpl @@ -0,0 +1,25 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} + diff --git a/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/clusterrole.yaml b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/clusterrole.yaml new file mode 100644 index 0000000000..7c352696ee --- /dev/null +++ b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/clusterrole.yaml @@ -0,0 +1,15 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: gke-operator + namespace: cattle-system +rules: + - apiGroups: [''] + resources: ['secrets'] + verbs: ['get', 'list', 'create', 'watch'] + - apiGroups: ['gke.cattle.io'] + resources: ['gkeclusterconfigs'] + verbs: ['get', 'list', 'update', 'watch'] + - apiGroups: ['gke.cattle.io'] + resources: ['gkeclusterconfigs/status'] + verbs: ['update'] diff --git a/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/clusterrolebinding.yaml b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/clusterrolebinding.yaml new file mode 100644 index 0000000000..e2af390c71 --- /dev/null +++ b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/clusterrolebinding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: gke-operator + namespace: cattle-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: gke-operator +subjects: +- kind: ServiceAccount + name: gke-operator + namespace: cattle-system diff --git a/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/deployment.yaml b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/deployment.yaml new file mode 100644 index 0000000000..dbf549903a --- /dev/null +++ b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/deployment.yaml @@ -0,0 +1,61 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: gke-config-operator + namespace: cattle-system +spec: + replicas: 1 + selector: + matchLabels: + ke.cattle.io/operator: gke + template: + metadata: + labels: + ke.cattle.io/operator: gke + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + serviceAccountName: gke-operator + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + securityContext: + fsGroup: 1007 + runAsUser: 1007 + containers: + - name: rancher-gke-operator + image: {{ template "system_default_registry" . }}{{ .Values.gkeOperator.image.repository }}:{{ .Values.gkeOperator.image.tag }} + imagePullPolicy: IfNotPresent + env: + - name: HTTP_PROXY + value: {{ .Values.httpProxy }} + - name: HTTPS_PROXY + value: {{ .Values.httpsProxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} +{{- if .Values.additionalTrustedCAs }} + # gke-operator mounts the additional CAs in two places: + volumeMounts: + # This directory is owned by the gke-operator user so c_rehash works here. + - mountPath: /etc/rancher/ssl/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + # This directory is root-owned so c_rehash doesn't work here, + # but the cert is here in case update-ca-certificates is called in the future or by the OS. + - mountPath: /etc/pki/trust/anchors/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + volumes: + - name: tls-ca-additional-volume + secret: + defaultMode: 0400 + secretName: tls-ca-additional + {{- end }} diff --git a/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/serviceaccount.yaml b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/serviceaccount.yaml new file mode 100644 index 0000000000..ba52af6280 --- /dev/null +++ b/charts/rancher-gke-operator/102.2.0+up1.1.8/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: cattle-system + name: gke-operator diff --git a/charts/rancher-gke-operator/102.2.0+up1.1.8/values.yaml b/charts/rancher-gke-operator/102.2.0+up1.1.8/values.yaml new file mode 100644 index 0000000000..0f0f76ee01 --- /dev/null +++ b/charts/rancher-gke-operator/102.2.0+up1.1.8/values.yaml @@ -0,0 +1,22 @@ +global: + cattle: + systemDefaultRegistry: "" + +gkeOperator: + image: + repository: rancher/gke-operator + tag: v1.1.8 + +httpProxy: "" +httpsProxy: "" +noProxy: "" +additionalTrustedCAs: false +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" diff --git a/index.yaml b/index.yaml index d5d834531e..c92dbaf114 100755 --- a/index.yaml +++ b/index.yaml @@ -14333,6 +14333,30 @@ entries: urls: - assets/rancher-gke-operator/rancher-gke-operator-103.0.1+up1.2.0.tgz version: 103.0.1+up1.2.0 + - annotations: + catalog.cattle.io/auto-install: rancher-gke-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.20.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: gkeclusterconfigs.gke.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-gke-operator + catalog.cattle.io/scope: management + apiVersion: v2 + appVersion: 1.1.8 + created: "2024-10-21T23:07:13.576338842-03:00" + description: A Helm chart for provisioning GKE clusters + digest: 46399e4286ab2a8ee45e716607af92b312e55944bde43689e3ecc26750d8c6f2 + home: https://github.com/rancher/gke-operator + name: rancher-gke-operator + sources: + - https://github.com/rancher/gke-operator + urls: + - assets/rancher-gke-operator/rancher-gke-operator-102.2.0+up1.1.8.tgz + version: 102.2.0+up1.1.8 - annotations: catalog.cattle.io/auto-install: rancher-gke-operator-crd=match catalog.cattle.io/certified: rancher diff --git a/release.yaml b/release.yaml index 19bd9d96f9..42561400bb 100644 --- a/release.yaml +++ b/release.yaml @@ -15,3 +15,5 @@ rancher-eks-operator: - 102.3.0+up1.2.4 rancher-eks-operator-crd: - 102.3.0+up1.2.4 +rancher-gke-operator: + - 102.2.0+up1.1.8 From 67058b635c2dab9fe9e9852428b9eb46946c3171 Mon Sep 17 00:00:00 2001 From: nicholasSSUSE Date: Mon, 21 Oct 2024 23:07:19 -0300 Subject: [PATCH 13/13] forward-port rancher-gke-operator-crd 102.2.0+up1.1.8 --- ...ncher-gke-operator-crd-102.2.0+up1.1.8.tgz | Bin 0 -> 1412 bytes .../102.2.0+up1.1.8/Chart.yaml | 12 + .../102.2.0+up1.1.8/templates/crds.yaml | 250 ++++++++++++++++++ index.yaml | 16 ++ release.yaml | 2 + 5 files changed, 280 insertions(+) create mode 100644 assets/rancher-gke-operator-crd/rancher-gke-operator-crd-102.2.0+up1.1.8.tgz create mode 100644 charts/rancher-gke-operator-crd/102.2.0+up1.1.8/Chart.yaml create mode 100644 charts/rancher-gke-operator-crd/102.2.0+up1.1.8/templates/crds.yaml diff --git a/assets/rancher-gke-operator-crd/rancher-gke-operator-crd-102.2.0+up1.1.8.tgz b/assets/rancher-gke-operator-crd/rancher-gke-operator-crd-102.2.0+up1.1.8.tgz new file mode 100644 index 0000000000000000000000000000000000000000..ee3931f9565698c9fca93b05e36d108c5629ace6 GIT binary patch literal 1412 zcmV-~1$+7*iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI>{a~d}g_cNbDlh+n}!~|z}bBLSqq;;9lq|b}A94b0VBk8b7 zr{BG!6JU(*pSd%gX1p&RPP+ZA_RsJ3_H01X1)6TW#IDk4z$w$EhMkWWU|eqvi8yO2 zQ4~eP!65q^MbY8kXm}Bw^#_;HU@*A2==aZ}{=3U}!!r^!My?^Lbzsh-##o1k`=1C% zsT?@2q#bn#q2NHMxJSV`fjzFyDH_M;9NCC$awT`$f-{D4MBX@);+xzp5)!l;D2_-XMw7+Pw$cG;y*pRdX9o7>4awN52p(5lo>{D^ZddFInj1?Fmp5WVfa z?L|MOI$)hD{)P4LFwp`W+H-1{ZA1j+_20i74iD@9ayab2*8eGFKj}epymu)5FWXzb zx4w8*{mzn0HY&{VPJ#{?IPm;&KqrJOP$WIOI5(U7x>^ZN*CVn-)Ez=XeZ)(oBDD?; zRdUW_+l!a@P{AFmk$QcxQK`4`F1gVblHRYVs(6LZIG>-9wdLCm(4M*7~92aUt}r-%mj{z zC-f)F#d@=#E5pAl=|D^ryGot16a<%X-d;l7+B;~blt7Sq+MLtBDqtT#fTTyOk?8J} zSx&P23u$qTqOhuFe<5}GF1^vK!I(4iY^Mg*))_A2eAPaS+Ely$L~BtkN`K$ybcRNv zLwhCk0*(a8k3+0fEO2a)p>!O?6sbYi<{5aRm2t?P>MXO1>nkA?%@{CbTFa$%kYgW& zqRad=u7IgH{vOs8sgexL`U}Vy^HZ=TK!f0Ln$9-0dSsz1h9~ilr+rS*o)qkK(XhKX zyd+9$@kU<>4mLmG8}RXRM?l*ar$v4cFhh}JF))_3MIa`ngmQoq%*JJ%^&cFHk| zJ52s7TfrDuKQT3qxs0bF^V~2m$*vp9X(UJ!a!ZutPMMdfkHY6~ zW0j#Px-N1_gO<=g_9sf^adKfPRFwf#y}Q)R#X99ynkGT2I-ej3+}|pOW0lIBj`&cU zC&D-z>J@0?vNdg$wMI)`%UX0b<90da-|^F|xqrN_Km5*@HshWWkkPu^n4T0*Uyzd#mpaz~Z06sLiiiy0guR1os8q->3L=w24C}zh> zT4y{zyl_Zl$xGfdAWG7IRW$W!52VzqM-M)<;VW?X=o41U(}VD~F$qA|l4(^K@v7{4 zq{WKH8EI`SDu6E7{@{p}@=5flF=OuatA( zA~pCMS_^TjBM!X)`_iXQvl?|)AAe<82(DzEb6 S%fA5t0RR6_!}a?BDgXdj0J$ds literal 0 HcmV?d00001 diff --git a/charts/rancher-gke-operator-crd/102.2.0+up1.1.8/Chart.yaml b/charts/rancher-gke-operator-crd/102.2.0+up1.1.8/Chart.yaml new file mode 100644 index 0000000000..d1a6f13519 --- /dev/null +++ b/charts/rancher-gke-operator-crd/102.2.0+up1.1.8/Chart.yaml @@ -0,0 +1,12 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-gke-operator-crd +apiVersion: v2 +appVersion: 1.1.8 +description: GKE Operator CustomResourceDefinitions +name: rancher-gke-operator-crd +version: 102.2.0+up1.1.8 diff --git a/charts/rancher-gke-operator-crd/102.2.0+up1.1.8/templates/crds.yaml b/charts/rancher-gke-operator-crd/102.2.0+up1.1.8/templates/crds.yaml new file mode 100644 index 0000000000..aaa323f363 --- /dev/null +++ b/charts/rancher-gke-operator-crd/102.2.0+up1.1.8/templates/crds.yaml @@ -0,0 +1,250 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + helm.sh/resource-policy: keep + name: gkeclusterconfigs.gke.cattle.io +spec: + group: gke.cattle.io + names: + kind: GKEClusterConfig + plural: gkeclusterconfigs + shortNames: + - gkecc + singular: gkeclusterconfig + preserveUnknownFields: false + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + clusterAddons: + nullable: true + properties: + horizontalPodAutoscaling: + type: boolean + httpLoadBalancing: + type: boolean + networkPolicyConfig: + type: boolean + type: object + clusterIpv4Cidr: + nullable: true + type: string + clusterName: + nullable: true + type: string + description: + nullable: true + type: string + enableKubernetesAlpha: + nullable: true + type: boolean + googleCredentialSecret: + nullable: true + type: string + imported: + type: boolean + ipAllocationPolicy: + nullable: true + properties: + clusterIpv4CidrBlock: + nullable: true + type: string + clusterSecondaryRangeName: + nullable: true + type: string + createSubnetwork: + type: boolean + nodeIpv4CidrBlock: + nullable: true + type: string + servicesIpv4CidrBlock: + nullable: true + type: string + servicesSecondaryRangeName: + nullable: true + type: string + subnetworkName: + nullable: true + type: string + useIpAliases: + type: boolean + type: object + kubernetesVersion: + nullable: true + type: string + labels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + locations: + items: + nullable: true + type: string + nullable: true + type: array + loggingService: + nullable: true + type: string + maintenanceWindow: + nullable: true + type: string + masterAuthorizedNetworks: + nullable: true + properties: + cidrBlocks: + items: + properties: + cidrBlock: + nullable: true + type: string + displayName: + nullable: true + type: string + type: object + nullable: true + type: array + enabled: + type: boolean + type: object + monitoringService: + nullable: true + type: string + network: + nullable: true + type: string + networkPolicyEnabled: + nullable: true + type: boolean + nodePools: + items: + properties: + autoscaling: + nullable: true + properties: + enabled: + type: boolean + maxNodeCount: + type: integer + minNodeCount: + type: integer + type: object + config: + nullable: true + properties: + diskSizeGb: + type: integer + diskType: + nullable: true + type: string + imageType: + nullable: true + type: string + labels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + localSsdCount: + type: integer + machineType: + nullable: true + type: string + oauthScopes: + items: + nullable: true + type: string + nullable: true + type: array + preemptible: + type: boolean + tags: + items: + nullable: true + type: string + nullable: true + type: array + taints: + items: + properties: + effect: + nullable: true + type: string + key: + nullable: true + type: string + value: + nullable: true + type: string + type: object + nullable: true + type: array + type: object + initialNodeCount: + nullable: true + type: integer + management: + nullable: true + properties: + autoRepair: + type: boolean + autoUpgrade: + type: boolean + type: object + maxPodsConstraint: + nullable: true + type: integer + name: + nullable: true + type: string + version: + nullable: true + type: string + type: object + nullable: true + type: array + privateClusterConfig: + nullable: true + properties: + enablePrivateEndpoint: + type: boolean + enablePrivateNodes: + type: boolean + masterIpv4CidrBlock: + nullable: true + type: string + type: object + projectID: + nullable: true + type: string + region: + nullable: true + type: string + subnetwork: + nullable: true + type: string + zone: + nullable: true + type: string + type: object + status: + properties: + failureMessage: + nullable: true + type: string + phase: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/index.yaml b/index.yaml index c92dbaf114..02de43649c 100755 --- a/index.yaml +++ b/index.yaml @@ -14644,6 +14644,22 @@ entries: urls: - assets/rancher-gke-operator-crd/rancher-gke-operator-crd-103.0.1+up1.2.0.tgz version: 103.0.1+up1.2.0 + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-gke-operator-crd + apiVersion: v2 + appVersion: 1.1.8 + created: "2024-10-21T23:07:17.213384905-03:00" + description: GKE Operator CustomResourceDefinitions + digest: ca845130061fab1c388e14b6a3918308e9b4eead8315cc3e8767b090ca61cea3 + name: rancher-gke-operator-crd + urls: + - assets/rancher-gke-operator-crd/rancher-gke-operator-crd-102.2.0+up1.1.8.tgz + version: 102.2.0+up1.1.8 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" diff --git a/release.yaml b/release.yaml index 42561400bb..e540a4b133 100644 --- a/release.yaml +++ b/release.yaml @@ -17,3 +17,5 @@ rancher-eks-operator-crd: - 102.3.0+up1.2.4 rancher-gke-operator: - 102.2.0+up1.1.8 +rancher-gke-operator-crd: + - 102.2.0+up1.1.8