From 1dac942bdd87f1e0ca5e772ab38ebca5594864ce Mon Sep 17 00:00:00 2001 From: Julia Bier Date: Fri, 25 Oct 2024 13:21:54 -0400 Subject: [PATCH 1/5] PACKAGE=rancher-backup CHART=rancher-backup VERSION=105.0.0+up6.0.0-rc.6 make remove --- .../rancher-backup-105.0.0+up6.0.0-rc.6.tgz | Bin 11618 -> 0 bytes .../105.0.0+up6.0.0-rc.6/Chart.yaml | 26 --- .../105.0.0+up6.0.0-rc.6/README.md | 79 ------- .../105.0.0+up6.0.0-rc.6/app-readme.md | 33 --- .../default-resourceset-contents/aks.yaml | 25 -- .../default-resourceset-contents/eks.yaml | 17 -- .../elemental.yaml | 49 ---- .../default-resourceset-contents/fleet.yaml | 60 ----- .../default-resourceset-contents/gke.yaml | 17 -- .../provisioningv2.yaml | 23 -- .../rancher-operator.yaml | 28 --- .../default-resourceset-contents/rancher.yaml | 69 ------ .../templates/_helpers.tpl | 87 ------- .../templates/clusterrolebinding.yaml | 14 -- .../templates/deployment.yaml | 79 ------- .../templates/hardened.yaml | 124 ---------- .../105.0.0+up6.0.0-rc.6/templates/psp.yaml | 31 --- .../105.0.0+up6.0.0-rc.6/templates/pvc.yaml | 27 --- .../templates/rancher-resourceset.yaml | 13 -- .../templates/s3-secret.yaml | 31 --- .../templates/serviceaccount.yaml | 11 - .../templates/validate-install-crd.yaml | 16 -- .../templates/validate-psp-install.yaml | 7 - .../tests/deployment_test.yaml | 216 ------------------ .../105.0.0+up6.0.0-rc.6/tests/pvc_test.yaml | 102 --------- .../tests/s3-secret_test.yaml | 141 ------------ .../105.0.0+up6.0.0-rc.6/values.yaml | 81 ------- index.yaml | 30 --- 28 files changed, 1436 deletions(-) delete mode 100644 assets/rancher-backup/rancher-backup-105.0.0+up6.0.0-rc.6.tgz delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/Chart.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/README.md delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/app-readme.md delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/aks.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/eks.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/elemental.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/fleet.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/gke.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/provisioningv2.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/rancher-operator.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/rancher.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/_helpers.tpl delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/clusterrolebinding.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/deployment.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/hardened.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/psp.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/pvc.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/rancher-resourceset.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/s3-secret.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/serviceaccount.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/validate-install-crd.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/validate-psp-install.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/deployment_test.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/pvc_test.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/s3-secret_test.yaml delete mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.6/values.yaml diff --git a/assets/rancher-backup/rancher-backup-105.0.0+up6.0.0-rc.6.tgz b/assets/rancher-backup/rancher-backup-105.0.0+up6.0.0-rc.6.tgz deleted file mode 100644 index 3d052fb8751ad435d72fa378071c001f5d3fadcc..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 11618 zcmV-oEuGRIiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYKbKAI%9La~X+3?r9$A(gZ?a7-j-A^{ zAQF-oQ3OMPvgNp|=KK81`6W+b;ZAC?9VdOqsIHDh0tW{NI4i&d7uxz5xyk_Q6VKUf zjG;?Qb2zpB@pwg5Rdr`;i~p;tYVzNTS}Fgdy!A%iezQ|mx3~YHmbcWM?SBCE5pl>Z z9-+|vhx*{Yl7su36lmL+LTX~0)CvITkU|TON;;&}LM0P#LXTp_vNbwrk**KmG~I zrOMlqs;J<1P%c#~?9X2^o3c)b19emb;-TUqf<0G9L?LrR(KNFeCN*H0ws({H)Z%cU(L(4MddD%&mc-`>;kSc!ucategqNpNJS0Dy6b2sZc4E%lTAr zk%b^ZlH~D8&1^t)?4TN$LK}|I6xlSh7M-(7y5$jyT!mt6WmfY{MaNSI+sLLX_3k-@ zx(H6g(e9MkKwZ7GQ-F@y_aDzH1?V{aj9LaFx@$U=KR=T*0N}v1OgaY?1J*t88~|;D z%?ZUW0(6Xm^#~ouGIh==!1Zj~v_}O1unnL+2S?rjxi+GR_@ghFI_qgnsY7a;n>v%L zq$J16`HB!k$)<%zm~2XRlKqy*Y*d(_`89S8QY$FYzDYp=rag2ap{}P>&qW2s4gD-; z_@$6JzX1`;>NX?Le|k=YP(NBAJ(njf3H?8VmWRkA8vsl6|JIwzc2fUWx726-{}jcX z!VzMc-$f24CdKYN5Eu!uq+kcRkYc9ADIC?nEFv}vFJ6E>G=!c-0jYw4r%wGSnOJWEuf(ihHvk!9&oaP3NO2|z0Uq+dMP;C4n?jSxaZtbLM1YZ!0N=&HBM2PSPk@Fk zv;hok|3VpbK*uHlLlapB(^na2)IhPA^GaGD{Jo1tToUsif@YD{Lu?tyl|PVeIM`$g zGxoDlmk&&vAl-9O_qfxUm`n$n!?{l`HajjF3Vl@Dtpq0DrQ;wP{&$VgUqa{RX%;=@?A0XVWuC$6#{? z-A&6J$hAcZ5s(@4EN0?h2n;kdZPpcA9dLvi79>Q_>i6iQKY|u~o-imX#jHlf;s&@L zoB9|SCShF?V9aeeHFd!4Go~ShiWks4TVeoSu{C6frT!YQ1uiRf%TCw-8!~)xxknfczui zD*^n}w&s92DA2S)CxQvH3M~s?Gb7NvWq6+T$^ThM(1C?Vn-#VEc2j+`S*~pQEtND) z6^~8261LxDbTw~L4OI5cLg59d8wRlO2v}%_EHJd-i1_AdC>;w18h9h0NvO*uiqGmC z%MavFMw}Z)Zg+-U;IOe7At<0*CbQ#Th-!go_?-y?M$SL}@9(S)GeZBU{qDKeAGO~d z?9xA27doC!At1431bV>0njj9#7RoWkP6{oW6H%UnUL!fI}QnEh&S*3vkvslMk8e4 zyucoH_!I2bz_-76r^j;Y*h|3Jf${}MvBhLM03)iYg0qFxU7GIm}UWGx;(03ZG= z6yR`Z+9sU~@NDgwI;!hBQvi%C(Rc%|;VAU{dD_Q_vlMWFokSAkVDhoICK9-~-VC*m53!;ya;aNhr(lI6|3bOF)rbN)EGJmOX=^Ozr2Bm-rVxlM-cx38{yX7_6 zmYe^>A<~&I(8e9vKYQ%k;Wbcfe)XVLOp+!O4I))SY@!L8&XC){QwO>T6n`(5%3F$B z1f>RaMA*zkq;wRBm49+L14LmdF6_c6YHU^)R?3~?hVNzgQ#$l4YYy13dC(a^ z$KiHisc?Y+bv;|>^(ok?0(}f!0tQHj%oZVdilW+$Ta(C)gz5m2_G6 z+8tJx8?z45UzgIeE##^u1A7cb20Wy6N$j|AKjBVb$?#);n$wOq9GW-WFpiKQNdX>P z6gV@JS%&ujB+SkV+-p&b8y8E_IfA7vj~cxitCRF zPp85zw-xi3(fJzbgDS8xFY!R~;qU1D+iG>&Z()=>YK{Wv;F@RWn$V!4K&1LYuG}& zVzOh~s_p>lCFs#HcFkLEua+ing^nv1rielVQpmjfHFX4#3QELFxM0X`X9ZgL4%nv6 zd~2}9AP{fx1?iOUl8T{pVzPS$oU(+y#4d7JAgQwWW3IQbg_wU|03b!npm%>u92!&8 zE&u=>bKk|Dvw*ZuByMu~-$0Iq=Tl@q{5a4O{@<>uZxa6hn@V}>ng5@nWN2ejEy)OI zrn>dtN$og@VJtAfbPPz913&A>HUs7EPtrVz3LWS;gvl4dReQm5 ze3-ylg{2=sEICMLt$oW{K;kE*jw7HK0#AD&VJABRO`lsO_y}ECv0^>lyRWyRFIEzV z#YEA^NS_dIx=E_BnRvwwFYvO|l~|T`Awhf-u((O83gMWyabK8PMJkasZ=G0f5gG2}#td(Bq8cijEdsean6 zH;#H|pE})Bt-jyMIrSVG8AY+B&n|T(V@4DTyPiNZc`^#*a ztkS;o5CHAd6%{Q9CW(PcBA>J*{<&%H}}$b6(c|u3A7kg6At$Y zlYb<-4uex3HBd~R^C(6-5ePXmMV16eXXJiR}p#?bBi<{ z5$@s%vj0_-hx`62{#j5ICH@hSF8~vv;{#;98``2F&TzLNG*Yo=0>o45eT4lp((FWN1t49LoB50i2)|?HjWm-rWf+0y_ zAvOj4BKBZ@Ss*`cL3h(0rR1iZl7}y2X}u}@yBqfZ70skz%`l#deANH|8o7uB!{m>| za_r8XaQFu{uO@#r#g8BDkUw$BjsGyY_DG)rFNyz@D_c8>_|NuE^?CpQNy@6aO&$t; zQtd{Zhbgv2I)%%cGyg@C=+J^9ImENp`QBP5bL-}p9G%1$-jC*zf8UZX|K$maN9bdz z{8y9tAGUYO&+-2!DN9ac=Sly-2t3Q;<+Y@Kas&2hPiR41M}(YUBa}}Xg2shwQgmwT zT%rdt4k7+hTdmQo2r@3}qOTqz;r6)PzZOFx<}FHo|G{){?1T95`7895pX86de=T~- zN^B4wfzPSJaftSn{Vhtyd6oE4`}n8z3~J>4N-&>yZ+~>jmH+;WNG`Jb>VswH|F?G% z^1o76E6@3Vo}|QLr5T@K1%h6aFFPn}CnULA6oP0$$2N7bWg(Ym&tUQ~3}*+u7Ue39RY`~+(M1SM{@ zmi8??07aghXw#2LM3z7QB%fik`Kvfv%C(}<2QPgPhzigVeN#z&!1|*nJyLS{KYl{@ zL47RY|4LQeN}d0xK7ar7BqjgEXRgU7&S|b?<7FQ1d>TVfsAV#CO30~Tik`}PgUG%E%uUW}0~GaK>5X&D*II@M^7kqrRB z3|eMr!{>GdrXHbSfc(r!Mll=Z$PC0zGWetsnajj8KZ_X~zI-0B{t^J9SkY9Rd}88L0#6-C&4Gn{V;4XYORObR9{F!AERty!L9~|?&TO0_2b*~2=VN2z zl+W|W8RlzSI7+|T_Z(x;N9G8_OmcFWMpMhNp{6QiE{M$hbD~O4YB~lxyH!3_WB$Xl z`|$9Rum58Q3LazxEVcjB-~Xyx&+-2!DUW^d>49I1Z~H5{d*8F*%lH4bQvQGSIsey_loyg+MijiVkPTj07&9}X zxaiJH+vI!1s~= z>W-?WpA}WH04F&!lgo?8!l|;aqh{8QFk0{WPgTaA4 z#D&kFKMx=o^9+(48c!7KGlrl_FN}JpDzyGvAa-->Mbwelw$j zV&`381r%|tT3qkMUF${NE$nJRH>rU(WW-V&=w`Bah%F0WbMueOPK%qL!f=#z*<%N~ zaEd5$iJ!JHfrOX?w&Lg*nQjpB6t~sX3WYmx=EDF0+=(+6d*PK&;=vsVt|+-H+$lkc z{2BXwSGWVI6eD+l4OD!|C*FeC+a>E2gg_}A2~?Bt*bDwq`=7aq#HaGciKICF?(RlsO5yQXN8@Uc`FhE=i225E>b{y=TXyOmQiz?U^ z*Xg{{qB{hg>IS!D#D)TU!e{Vx5^QXXBRXpmYNC3uv$4y}9{KCqq+@RM1g&2A)0pZn zvfa@1|76(7vG@y9Di@bGPq%K=B?>!R0NFY=m`_^gS9UCf7Q-t9o43&*R$r%c%-F&l z`kL!5!U9?6;e-^B3zl_|+8*;^qsU{yv2J?Jt3D?1TCHcE+>!E6_F~pYww|@ZnG1 zN09pF5l7?0Iktt{1og--in*CQ582yDWvULK=DW{KzVhY9g+kIj^;5ow za~(C-SiM5w0tr7D8ce*x&@AHw<>~HyFrOn=1Adl_%0HqY{PHJ?MU zwCnv-ltlaoI&7UnV~QRz2DBvpv$M06y8mFrNV-R!yrFJtj`-DMK2+Ws+bAP~#MKKh%ppHuOtWK5E$o7+ z*pP||`7yrs%|bSaA%bjd8&a@S46x^d56oH!<-24UaV>{iVlRVm5EJ?i93i3%v8xbo zFh^ewD)z5z%1}+gNw6Ctx!r%sqR;;o<=2^ItQhOA(om`gN*%oQSXsf54> zbMVze?%eksA{f-q4&)t&8^D43gm>X@P=*kqo)m@dfYlh9mbmVMz!@UIq=Dt+`*ud& zvAR;4SaK0Z+EQ^DXvi(54LVgN60N~J$%Uvz0P&bnMfjzj(V)x*|I@T1NiY46DobEb zoDmGI`wec8F>LhY6-miaY=D8sEF9!=2NCl0x6%#tO+f75!?(zv6~-Nc`dE%tK=wVk z$OTHmD}sv%A!vI*f#V`Rvl69iJNhL7k18|G?@#dt81qlCrp!5zrjvmjWE;rVO}2;- zy++8EeGz{OO%ic>{fIZRb$2dkAmd~k!p7x~naFT?A~$i>RAixwy&wW-a;Z-JH5Ix0 zm@jpY$Z-+ovPSw#7~zbYOcKaOX=Q(ia6mI`%Qz1a8nS=xZG-$O0+UN1$$*;@2gQIC zZoV!R6sZ${0_r~cY?bhh{#T#H%g?U`isI%MB3xg7W9uYX_sp?pODy1r2tD{MuM9wh z0#YW2p`4P$BnYH2=r(``7-OB^!5h7VEqHIT|0r^2{8DEH$ip3cJica%3`o9CkH`#` zb)YWr(#;QwOZ+Oy&?cuiDz~_s^Pl|4+5i04e-}Cwy8K$)xHrUWZGaDF*Z}@EB{-AW zl@?BO=-^8FNU zl?1Ak%cjq{e)MPm2ItS*QT`0fAyWloNCa6N7tKuU5o;b)q^^fPmkR&$U;oW0QuqV> z`fD3gRQvVU!XMxuwmB?sRodXOUmui=bc#HjnU@^OmGmr`HWl+P|+^IvBx;j@m!K=o(~? zQUtnqI51YBBX4{srSBQ3NcjINeEbL}WX*G6OV9t76ZxMjmF>#&`Tr*=sc&&jbVHFX zPF;luzGQMgqM;GGacZDgDi-4T8-q7&eFR5pUlt3=9wzYHr zjX{vjA^BBsX4XlC*n?5xVH8-sN9dT6GN~TdTmBi9{Lfl)SS_G_ zWGM*h4=seKa`#dE`_T0zR`lJ+)B@w*TSrnU0slhN=8fYb9?1x(K0))GK?+(2cgckp z{1*>w|Din94L%g9>xruZ?mhaP)y+d`FYhwf`QK!qk0k%s*Z&-WwLE|&`oFrB`u?w~ zZawS&Cn>A&ODOsC#ok&Bm;kss$Avrx9j6qJ3QLYt2J`T)$xOD3GM=AH?$5OZ$9e)8 z0CdAsSZJAqGp7!AsY3At+4rRe-x|*xb{o^|k&lrzmDjL@a0GAXO0g9PDka&2jf{s< zRf@2*>dm&QxcfPU&bnB9CuRFo2&`gFCRzOM zAFY3XbXnj28%@v?#DA;hXZ!Cd%HvB-wmud}$k^*AiZG8R=m+iXv7UcS=qKKD?)t_mKHDBy{{-|7NNL4i2Jl%yG@cJ3&V)(`nZ|%>l4Vape^Q&A9H(o=f6n&G+c9r zT$xNfd>l;F%e#+b=*|!uh9LUgNB_oRDYTi4OoyNqX>R-X$KA`-%NCx|Ris#WlxK4) z)5nX%{g|@8{P$b<%4N9*SSJ5d_y1S6E6?Y@o~9&4kpCsq6I*D>MU}JRl<PI6dN~ zR&F2njW~T*GcQfJC$VdncKZm1L~1Rr7|dG`u3ll5e>6irak;nrUn2&vME-AWS9X&7 zKU?av{C|@2X!}1h{&x4#QSLtK%H2ngAea5KAPC35|6JcJ&5!rkn6IeX;*2+SC zF~FD->Ov4ovQu;wRsE zc?g9v=<>8%H^CUv&6GQNl7@c~s>nf&+=1e;`tFl$^kmaHDoO4>IxhZ#bjlGEDGmk1 zb*Y~oQCHY9<3c$q8J{YskSQ!xhO)dY=I%l16`Jb+b@GmwvtX^kg9|%+-gUOUR;Wa%3NS z2WOTyGVPZc0VpZ5JX3La9Y4R&kGASoFRA?Rgfjcz_t`(O2M@ggaIyVgu2#y)`~Ti- zm7nkbc#=XqlcE~vB0|AlFztol9)MawiKG_cE1{r(_~noV1^Bmx7ZmVmj4TJaq(mL7 zK*c4<3NUHS{|=WR${DEufZt6m)dv7fzq(X18v5!%%NGm|q~jX!ZzU>8SOLF>p##Mi z6Pf*s%*c<3gby%^NxOd1?3~pb%?u=bTOzocxd7O6(L?HG4HOwQ`S0Qb(IyVkOFn=S z|CNPIbRdzwQv>lo|K{n7&pgW#iS!>IN!`zsOg^Z8meSot5w7!OHW}Ean*~Hqykgp9 z*v9nCMFiROJ5YU{0mV_tn1q2h0u~-wXojrlsQ8;2zgA|Q5lGy~nuCDuh{zT)W>f=3 zMd3(fpe=HiW}(gB{Ajc}5}CYYGALKxl+==1 zD%Yyz%G{()1fpsMAa(mb9o_#vgPTya~&8CG|e_wPuKM_9d(;Q@cB-G8f z8)Y^8^G&5x-r+yWm5uUm?AKfIb7!MOX8K0S-?I(EU#qVzkx*ia4Uu=s#=P!&D-Hk~ zpUGNL{3=^N#d^#qcmmfn-NNk6Ioz1esdWxI-DbPd{M2mM zcaNKUDN;lRqR4?fhzmqAxf32J%)^pr4?pAZiplKZ#l%>O&Pe8CW&3dP)FiTER)2ohG75Q;=k5D}2X@5)|gbB%4 zU4tMep?M7y&$Q-VvvtsJ?kWA#7Hu!{bu91-sxntGjIJK4rKlM zNweNj&ib8$tL9H36dr{+o@l|OrYh6&pFxU%f6iqIiG#%x&-5gM4f0A8O@gX{;&fi} z0Sg^dtE#G6OwJXLyYMi_eazIb2}Q1510S<{U6ypTR{Hg2hIr=^b&IV<)ZEF{0a-!mggJ@E_#*FuUE zqn#i^elW6e@VI${bdQ?Y4%>m)r2<{#PD%8ok{j~#-}AtqVUh`*J1F)p8tOZ+6R-UH zfZ|UTK!^dr{nko^uo>$ln`{pu+!E3)C*CshEhJzb2}2^L{kQN!hsWpC2=EW;pE6AzD<=mjmP;!$YnPF&3rdxgJp-&q&Nqj>r^8YIn6nwrI zMTB46>c7ZA|8Gm*`{7$&h;Ifx7f>_@<%Qxt2-b)zpw?RbD~kP87x}TQ5Q%g!OTP0L zoNuCgmL;RO-yyJ->^#q=k0SA-W8wcBOXmKMGt(bs<42Zd=fBEZiSxhZ9ko(<-v4=u z65anf>o?*XKM&s32>@g}z`hho`oRy``iZ;iD{uWg1*Yrn4~Z)aPna+C6u1g|H|#TM z5rCqGpmE`v6rI|cL2+W{0K+_>&m|Q9dTtvMo`Ks>*=x47f>@z zkywQ3ajBkbp+x%3-3N?DqMmF$L_5vczsxt|9~)b~BI2<)`BTyT&D+NqQ37b*@E&)O za0H@(N%4bUHN5h`Vkkw26a)5e9cgVYjkHE4=y3(gqVDg#7;|axqYa$rvan>@|H1K| z$MFJ|od4RYRNo}ef2rHg`5&I7MD71hRbFQu_X1Lfz3%4=B)~)jHK{JrHsSTvHBg*m z&lL}XV3@owI#dom9pKC6#U{KKs4`F4_u8T${wtpf*tTVe3 z`PA(Gbb|tXQ*)Whv=uX(Mh?XKQ4x}A%ITdmb<)qwFFS>^K9`d_VjJzcDHffZ?&{ZYqzVmcYEFOZntM0o=@6#hyCvLcN<^o zTZY}Qo>wl_PIFAP%6SFe_S@YlzSSfs}_Q|bLZd<24>;3uUdfvai z+`ibmx7yEAAV&h;;rGiW*&uzyu< zx7uGXtkxG}|Fq0tZeXw6F;wUDq~AX}?_TZnRoc@lm$!O# zcYdxOR*Z|A!;9$^>A&wcyZ!pSVQYubR5*>=_rX=xAGh9Pfscr zcAIwhC)X!m3~x|1_BG3>p4ghxnVf7J>dlGPEN`{#L)?FNz6GoOS^wST(fRvBr}t%d z>taGpt+%y(T<+Zt)N&d1`bUFzS95*x+hwP6<@NS@*MrI1xxU|q=k`@&P<49U4!yjx zwb^;u*zVcmqu%sjTW__yTHQH1|6)yh%@#erZC~jv=j3ExJG!ip8?8L9c6!=wuh(h} zZrg36((avKXpJj%`=Zlos#@>L?)7`y?RUMci}%)vF>O{(x`%eR?93a}t*vw0YMocw zp5AYLG0H9bqNiQ-zU+QIpJ=y+`rFlcPTRqkaRc@GdzY2%o8CnqYj#WP_sWgV`_WOz z7gvq*Ub%h#rQI3qpWOD|YgZ=|WAD7&+8b1^Z!X^V_j*0Lds%UIyFFh2pf@SE&Mj?M zYqqpbJpwte*#z8@c6zSks0UVemQxk&9BrO z3a$2$Q667+?4EjMxA#w*`uwUl-WpV#)1zDC@VwmeI+M}1zONlCe$7$FH zGc;AVH0z2Q<;l$G?%GE4%0?Ic^ULzp#o+z!S8b|RFV(Bl&P3n3tXy3h>iMnSY+d)i zjQgkiZLD{%_EBs1U3b!-U9_%j-8wnCEcdmOi3NMAc4(Aat;=d_*12sRb@q)$@8Y_m zz2AkszH@PMQQp%gmTR= 1.28.0-0 < 1.32.0-0' - catalog.cattle.io/namespace: cattle-resources-system - catalog.cattle.io/os: linux - catalog.cattle.io/permits-os: linux,windows - catalog.cattle.io/provides-gvr: resources.cattle.io.resourceset/v1 - catalog.cattle.io/rancher-version: '>= 2.10.0-0 < 2.11.0-0' - catalog.cattle.io/release-name: rancher-backup - catalog.cattle.io/scope: management - catalog.cattle.io/type: cluster-tool - catalog.cattle.io/ui-component: rancher-backup - catalog.cattle.io/upstream-version: 6.0.0-rc.6 -apiVersion: v2 -appVersion: 6.0.0-rc.6 -description: Provides ability to back up and restore the Rancher application running - on any Kubernetes cluster -icon: https://charts.rancher.io/assets/logos/backup-restore.svg -keywords: -- applications -- infrastructure -kubeVersion: '>= 1.28.0-0' -name: rancher-backup -version: 105.0.0+up6.0.0-rc.6 diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/README.md b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/README.md deleted file mode 100644 index 59bff44256..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/README.md +++ /dev/null @@ -1,79 +0,0 @@ -# Rancher Backup - -This chart provides ability to back up and restore the Rancher application running on any Kubernetes cluster. - -Refer [this](https://github.com/rancher/backup-restore-operator) repository for implementation details. - ------ - -### Get Repo Info -```bash -helm repo add rancher-chart https://charts.rancher.io -helm repo update -``` - ------ - -### Install Chart -```bash -helm install rancher-backup-crd rancher-chart/rancher-backup-crd -n cattle-resources-system --create-namespace -helm install rancher-backup rancher-chart/rancher-backup -n cattle-resources-system -``` - ------ - -### Configuration -The following table lists the configurable parameters of the rancher-backup chart and their default values: - -| Parameter | Description | Default | -|----------|---------------|-------| -| image.repository | Container image repository | rancher/backup-restore-operator | -| image.tag | Container image tag | v0.1.0-rc1 | -| s3.enabled | Configure S3 compatible default storage location. Current version supports S3 and MinIO | false | -| s3.credentialSecretName | Name of the Secret containing S3 credentials. This is an optional field. Skip this field in order to use IAM Role authentication. The Secret must contain following two keys, `accessKey` and `secretKey` | "" | -| s3.credentialSecretNamespace | Namespace of the Secret containing S3 credentials. This can be any namespace. | "" | -| s3.region | Region of the S3 Bucket (Required for S3, not valid for MinIO) | "" | -| s3.bucketName | Name of the Bucket | "" | -| s3.folder | Base folder within the Bucket (optional) | "" | -| s3.endpoint | Endpoint for the S3 storage provider | "" | -| s3.endpointCA | Base64 encoded CA cert for the S3 storage provider (optional) | "" | -| s3.insecureTLSSkipVerify | Skip SSL verification | false | -| persistence.enabled | Configure a Persistent Volume as the default storage location. It accepts either a StorageClass name to create a PVC, or directly accepts the PV to use. The Persistent Volume is mounted at `/var/lib/backups` in the operator pod | false | -| persistence.storageClass | StorageClass to use for dynamically provisioning the Persistent Volume, which will be used for storing backups | "" | -| persistence.volumeName | Persistent Volume to use for storing backups | "" | -| persistence.size | Requested size of the Persistent Volume (Applicable when using dynamic provisioning) | "" | -| debug | Set debug flag for backup-restore deployment | false | -| trace | Set trace flag for backup-restore deployment | false | -| nodeSelector | https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector | {} | -| tolerations | https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration | [] | -| affinity | https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity | {} | -| serviceAccount.annotations | Annotations to apply to created service account | {} | -| global.cattle.psp.enabled | Enable or disable PSPs in the chart | false | - ------ - -### PSPs - -We have added a configuration to the chart `values.yaml` which allows you to enable or disable PSPs to align with the PSP deprecation in Kubernetes `v1.25` and above. - ------ - -### CRDs - -Refer [this](https://github.com/rancher/backup-restore-operator#crds) section for information on CRDs that this chart installs. Also refer [this](https://github.com/rancher/backup-restore-operator/tree/master/examples) folder containing sample manifests for the CRDs. - ------ -### Upgrading Chart -```bash -helm upgrade rancher-backup-crd -n cattle-resources-system -helm upgrade rancher-backup -n cattle-resources-system -``` - ------ -### Uninstall Chart - -```bash -helm uninstall rancher-backup -n cattle-resources-system -helm uninstall rancher-backup-crd -n cattle-resources-system -``` - diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/app-readme.md b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/app-readme.md deleted file mode 100644 index b1406d5ee3..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/app-readme.md +++ /dev/null @@ -1,33 +0,0 @@ -# Rancher Backup - -This chart enables ability to capture backups of the Rancher application and restore from these backups. This chart can be used to migrate Rancher from one Kubernetes cluster to a different Kubernetes cluster. - -For more information on how to use the feature, refer to our [docs](https://ranchermanager.docs.rancher.com/pages-for-subheaders/backup-restore-and-disaster-recovery). - -This chart installs the following components: - -- [backup-restore-operator](https://github.com/rancher/backup-restore-operator) - - The operator handles backing up all Kubernetes resources and CRDs that Rancher creates and manages from the local cluster. It gathers these resources by querying the Kubernetes API server, packages all the resources to create a tarball file and saves it in the configured backup storage location. - - The operator can be configured to store backups in S3-compatible object stores such as AWS S3 and MinIO, and in persistent volumes. During deployment, you can create a default storage location, but there is always the option to override the default storage location with each backup, but will be limited to using an S3-compatible object store. - - It preserves the ownerReferences on all resources, hence maintaining dependencies between objects. - - This operator provides encryption support, to encrypt user specified resources before saving them in the backup file. It uses the same encryption configuration that is used to enable [Kubernetes Encryption at Rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/). -- Backup - A backup is a CRD (`Backup`) that defines when to take backups, where to store the backup and what encryption to use (optional). Backups can be taken ad hoc or scheduled to be taken in intervals. -- Restore - A restore is a CRD (`Restore`) that defines which backup to use to restore the Rancher application to. - -## Upgrading to Kubernetes v1.25+ - ​ -Starting in Kubernetes v1.25, [Pod Security Policies](https://kubernetes.io/docs/concepts/security/pod-security-policy/) have been removed from the Kubernetes API. - ​ -As a result, **before upgrading to Kubernetes v1.25** (or on a fresh install in a Kubernetes v1.25+ cluster), users are expected to perform an in-place upgrade of this chart with `global.cattle.psp.enabled` set to `false` if it has been previously set to `true`. -​ -> **Note:** -> In this chart release, any previous field that was associated with any PSP resources have been removed in favor of a single global field: `global.cattle.psp.enabled`. - ​ -> **Note:** -> If you upgrade your cluster to Kubernetes v1.25+ before removing PSPs via a `helm upgrade` (even if you manually clean up resources), **it will leave the Helm release in a broken state within the cluster such that further Helm operations will not work (`helm uninstall`, `helm upgrade`, etc.).** -> -> If your charts get stuck in this state, please consult the Rancher docs on how to clean up your Helm release secrets. -​ -Upon setting `global.cattle.psp.enabled` to false, the chart will remove any PSP resources deployed on its behalf from the cluster. This is the default setting for this chart. -​ -As a replacement for PSPs, [Pod Security Admission](https://kubernetes.io/docs/concepts/security/pod-security-admission/) should be used. Please consult the Rancher docs for more details on how to configure your chart release namespaces to work with the new Pod Security Admission and apply Pod Security Standards. diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/aks.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/aks.yaml deleted file mode 100644 index 7797420589..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/aks.yaml +++ /dev/null @@ -1,25 +0,0 @@ -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "aks.cattle.io$" -- apiVersion: "aks.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - namespaces: - - "cattle-system" - resourceNames: - - "aks-config-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNames: - - "aks-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNames: - - "aks-operator" -- apiVersion: "v1" - kindsRegexp: "^serviceaccounts$" - namespaces: - - "cattle-system" - resourceNames: - - "aks-operator" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/eks.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/eks.yaml deleted file mode 100644 index ae57baddf4..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/eks.yaml +++ /dev/null @@ -1,17 +0,0 @@ -- apiVersion: "eks.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - resourceNames: - - "eks-config-operator" -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "eks.cattle.io$" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNames: - - "eks-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNames: - - "eks-operator" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/elemental.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/elemental.yaml deleted file mode 100644 index 1d38b1229c..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/elemental.yaml +++ /dev/null @@ -1,49 +0,0 @@ -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "elemental.cattle.io$" -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - namespaces: - - "cattle-elemental-system" - resourceNames: - - "elemental-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNames: - - "elemental-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNames: - - "elemental-operator" -- apiVersion: "v1" - kindsRegexp: "^serviceaccounts$" - namespaces: - - "cattle-elemental-system" - resourceNames: - - "elemental-operator" -- apiVersion: "management.cattle.io/v3" - kindsRegexp: "^globalrole$" - resourceNames: - - "elemental-operator" -- apiVersion: "management.cattle.io/v3" - kindsRegexp: "^apiservice$" - resourceNameRegexp: "elemental.cattle.io$" -- apiVersion: "elemental.cattle.io/v1beta1" - kindsRegexp: "." - namespaceRegexp: "^cattle-fleet-|^fleet-" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^roles$|^rolebindings$" - labelSelectors: - matchExpressions: - - key: "elemental.cattle.io/managed" - operator: "In" - values: ["true"] - namespaceRegexp: "^cattle-fleet-|^fleet-" -- apiVersion: "v1" - kindsRegexp: "^secrets$|^serviceaccounts$" - labelSelectors: - matchExpressions: - - key: "elemental.cattle.io/managed" - operator: "In" - values: ["true"] - namespaceRegexp: "^cattle-fleet-|^fleet-" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/fleet.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/fleet.yaml deleted file mode 100644 index 7909be6375..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/fleet.yaml +++ /dev/null @@ -1,60 +0,0 @@ -- apiVersion: "v1" - kindsRegexp: "^namespaces$" - resourceNameRegexp: "^fleet-" -- apiVersion: "v1" - kindsRegexp: "^namespaces$" - labelSelectors: - matchExpressions: - - key: "app.kubernetes.io/managed-by" - operator: "In" - values: ["rancher"] -- apiVersion: "v1" - kindsRegexp: "^secrets$" - namespaceRegexp: "^cattle-fleet-|^fleet-" - excludeResourceNameRegexp: "^import-token" - labelSelectors: - matchExpressions: - - key: "owner" - operator: "NotIn" - values: ["helm"] - - key: "fleet.cattle.io/managed" - operator: "In" - values: ["true"] -- apiVersion: "v1" - kindsRegexp: "^serviceaccounts$" - namespaceRegexp: "^cattle-fleet-|^fleet-" - excludeResourceNameRegexp: "^default$" -- apiVersion: "v1" - kindsRegexp: "^configmaps$" - namespaceRegexp: "^cattle-fleet-|^fleet-" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^roles$|^rolebindings$" - namespaceRegexp: "^cattle-fleet-|^fleet-" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNameRegexp: "^fleet-|^gitjob-" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNameRegexp: "^fleet-" - resourceNames: - - "gitjob" -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "fleet.cattle.io$|gitjob.cattle.io$" -- apiVersion: "fleet.cattle.io/v1alpha1" - kindsRegexp: "." - excludeKinds: - - "bundledeployments" -- apiVersion: "gitjob.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - namespaceRegexp: "^cattle-fleet-|^fleet-" - resourceNameRegexp: "^fleet-" - resourceNames: - - "gitjob" -- apiVersion: "apps/v1" - kindsRegexp: "^services$" - namespaceRegexp: "^cattle-fleet-|^fleet-" - resourceNames: - - "gitjob" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/gke.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/gke.yaml deleted file mode 100644 index a87eef3645..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/gke.yaml +++ /dev/null @@ -1,17 +0,0 @@ -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "gke.cattle.io$" -- apiVersion: "gke.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - resourceNames: - - "gke-config-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNames: - - "gke-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNames: - - "gke-operator" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/provisioningv2.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/provisioningv2.yaml deleted file mode 100644 index e250d423ff..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/provisioningv2.yaml +++ /dev/null @@ -1,23 +0,0 @@ -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "provisioning.cattle.io$|rke-machine-config.cattle.io$|rke-machine.cattle.io$|rke.cattle.io$|cluster.x-k8s.io$" -- apiVersion: "provisioning.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "rke-machine-config.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "rke-machine.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "rke.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "cluster.x-k8s.io/v1beta1" - kindsRegexp: "." -- apiVersion: "v1" - kindsRegexp: "^secrets$" - resourceNameRegexp: "machine-plan$|rke-state$|machine-state$|machine-driver-secret$|machine-provision$|^harvesterconfig|^registryconfig-auth" - namespaces: - - "fleet-default" -- apiVersion: "v1" - kindsRegexp: "^configmaps$" - resourceNames: - - "provisioning-log" - namespaceRegexp: "^c-m-" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/rancher-operator.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/rancher-operator.yaml deleted file mode 100644 index f30c2fd96d..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/rancher-operator.yaml +++ /dev/null @@ -1,28 +0,0 @@ -- apiVersion: "rancher.cattle.io/v1" - kindsRegexp: "." -- apiVersion: "apps/v1" - kindsRegexp: "^deployments$" - resourceNames: - - "rancher-operator" - namespaces: - - "rancher-operator-system" -- apiVersion: "v1" - kindsRegexp: "^serviceaccounts$" - namespaces: - - "rancher-operator-system" - excludeResourceNameRegexp: "^default$" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNames: - - "rancher-operator" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNames: - - "rancher-operator" -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "rancher.cattle.io$" -- apiVersion: "v1" - kindsRegexp: "^namespaces$" - resourceNames: - - "rancher-operator-system" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/rancher.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/rancher.yaml deleted file mode 100644 index 070bd8ec94..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/files/default-resourceset-contents/rancher.yaml +++ /dev/null @@ -1,69 +0,0 @@ -- apiVersion: "v1" - kindsRegexp: "^namespaces$" - resourceNameRegexp: "^cattle-|^p-|^c-|^user-|^u-" - resourceNames: - - "local" -- apiVersion: "v1" - kindsRegexp: "^secrets$" - namespaceRegexp: "^cattle-|^p-|^c-|^local$|^user-|^u-" - labelSelectors: - matchExpressions: - - key: "owner" - operator: "NotIn" - values: ["helm"] - excludeResourceNameRegexp: "^bootstrap-secret$|^rancher-csp-adapter|^csp-adapter-cache$" -- apiVersion: "v1" - kindsRegexp: "^serviceaccounts$" - namespaceRegexp: "^cattle-|^p-|^c-|^local$|^user-|^u-" - excludeResourceNameRegexp: "^default$|^rancher-csp-adapter$" -- apiVersion: "v1" - kindsRegexp: "^configmaps$" - namespaces: - - "cattle-system" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^roles$|^rolebindings$" - namespaceRegexp: "^cattle-|^p-|^c-|^local$|^user-|^u-" - excludeResourceNameRegexp: "^rancher-csp-adapter" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterrolebindings$" - resourceNameRegexp: "^cattle-|^clusterrolebinding-|^globaladmin-user-|^grb-u-|^crb-" -- apiVersion: "rbac.authorization.k8s.io/v1" - kindsRegexp: "^clusterroles$" - resourceNameRegexp: "^cattle-|^p-|^c-|^local-|^user-|^u-|^project-|^create-ns$" - excludeResourceNameRegexp: "^rancher-csp-adapter-" -- apiVersion: "scheduling.k8s.io/v1" - kindsRegexp: "^priorityclasses$" - resourceNameRegexp: "^rancher-critical$" -- apiVersion: "apiextensions.k8s.io/v1" - kindsRegexp: "." - resourceNameRegexp: "management.cattle.io$|project.cattle.io$|catalog.cattle.io$|resources.cattle.io$" -- apiVersion: "management.cattle.io/v3" - kindsRegexp: "." - excludeKinds: - - "tokens" - - "rancherusernotifications" -- apiVersion: "management.cattle.io/v3" - kindsRegexp: "^tokens$" - labelSelectors: - matchExpressions: - - key: "authn.management.cattle.io/kind" - operator: "NotIn" - values: [ "provisioning" ] -- apiVersion: "project.cattle.io/v3" - kindsRegexp: "." -- apiVersion: "catalog.cattle.io/v1" - kindsRegexp: "^clusterrepos$" -- apiVersion: "resources.cattle.io/v1" - kindsRegexp: "^ResourceSet$" -- apiVersion: "v1" - kindsRegexp: "^secrets$" - namespaceRegexp: "^.*$" - labelSelectors: - matchExpressions: - - key: "resources.cattle.io/backup" - operator: "In" - values: ["true"] -- apiVersion: catalog.cattle.io/v1 - kindsRegexp: ^UIPlugin$ - namespaces: - - cattle-ui-plugin-system diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/_helpers.tpl b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/_helpers.tpl deleted file mode 100644 index a5e4852439..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/_helpers.tpl +++ /dev/null @@ -1,87 +0,0 @@ -{{- define "system_default_registry" -}} -{{- if .Values.global.cattle.systemDefaultRegistry -}} -{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} -{{- else -}} -{{- "" -}} -{{- end -}} -{{- end -}} - -{{/* -Windows cluster will add default taint for linux nodes, -add below linux tolerations to workloads could be scheduled to those linux nodes -*/}} -{{- define "linux-node-tolerations" -}} -- key: "cattle.io/os" - value: "linux" - effect: "NoSchedule" - operator: "Equal" -{{- end -}} - -{{- define "linux-node-selector" -}} -{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}} -beta.kubernetes.io/os: linux -{{- else -}} -kubernetes.io/os: linux -{{- end -}} -{{- end -}} - -{{/* -Create a default fully qualified app name. -We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). -*/}} -{{- define "backupRestore.fullname" -}} -{{- .Chart.Name | trunc 63 | trimSuffix "-" }} -{{- end }} - -{{/* -Create chart name and version as used by the chart label. -*/}} -{{- define "backupRestore.chart" -}} -{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }} -{{- end }} - -{{/* -Common labels -*/}} -{{- define "backupRestore.labels" -}} -helm.sh/chart: {{ include "backupRestore.chart" . }} -{{ include "backupRestore.selectorLabels" . }} -{{- if .Chart.AppVersion }} -app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} -{{- end }} -app.kubernetes.io/managed-by: {{ .Release.Service }} -{{- end }} - -{{/* -Selector labels -*/}} -{{- define "backupRestore.selectorLabels" -}} -app.kubernetes.io/name: {{ include "backupRestore.fullname" . }} -app.kubernetes.io/instance: {{ .Release.Name }} -resources.cattle.io/operator: backup-restore -{{- end }} - - -{{/* -Create the name of the service account to use -*/}} -{{- define "backupRestore.serviceAccountName" -}} -{{ include "backupRestore.fullname" . }} -{{- end }} - - -{{- define "backupRestore.s3SecretName" -}} -{{- printf "%s-%s" .Chart.Name "s3" | replace "+" "_" | trunc 63 | trimSuffix "-" }} -{{- end }} - -{{/* -Create PVC name using release and revision number, unless a volumeName is given. -*/}} -{{- define "backupRestore.pvcName" -}} -{{- if and .Values.persistence.volumeName }} -{{- printf "%s" .Values.persistence.volumeName }} -{{- else -}} -{{- printf "%s-%d" .Release.Name .Release.Revision }} -{{- end }} -{{- end }} - diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/clusterrolebinding.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/clusterrolebinding.yaml deleted file mode 100644 index cf4abf6703..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/clusterrolebinding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: {{ include "backupRestore.fullname" . }} - labels: - {{- include "backupRestore.labels" . | nindent 4 }} -subjects: -- kind: ServiceAccount - name: {{ include "backupRestore.serviceAccountName" . }} - namespace: {{ .Release.Namespace }} -roleRef: - kind: ClusterRole - name: cluster-admin - apiGroup: rbac.authorization.k8s.io diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/deployment.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/deployment.yaml deleted file mode 100644 index 631fa458b8..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/deployment.yaml +++ /dev/null @@ -1,79 +0,0 @@ -{{- if and .Values.s3.enabled .Values.persistence.enabled }} -{{- fail "\n\nCannot configure both s3 and PV for storing backups" }} -{{- end }} -apiVersion: apps/v1 -kind: Deployment -metadata: - name: {{ include "backupRestore.fullname" . }} - namespace: {{ .Release.Namespace }} - labels: - {{- include "backupRestore.labels" . | nindent 4 }} -spec: - selector: - matchLabels: - {{- include "backupRestore.selectorLabels" . | nindent 6 }} - template: - metadata: - labels: - {{- include "backupRestore.selectorLabels" . | nindent 8 }} - annotations: - checksum/s3: {{ include (print $.Template.BasePath "/s3-secret.yaml") . | sha256sum }} - checksum/pvc: {{ include (print $.Template.BasePath "/pvc.yaml") . | sha256sum }} - spec: - serviceAccountName: {{ include "backupRestore.serviceAccountName" . }} - {{- if .Values.imagePullSecrets }} - imagePullSecrets: - {{ toYaml .Values.imagePullSecrets | indent 6 }} - {{- end }} - {{- if .Values.priorityClassName }} - priorityClassName: {{ .Values.priorityClassName }} - {{- end }} - containers: - - name: {{ .Chart.Name }} - image: {{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} - imagePullPolicy: {{ default "Always" .Values.imagePullPolicy }} - args: -{{- if .Values.debug }} - - "--debug" -{{- end }} -{{- if .Values.trace }} - - "--trace" -{{- end }} - env: - - name: CHART_NAMESPACE - value: {{ .Release.Namespace }} - {{- if .Values.s3.enabled }} - - name: DEFAULT_S3_BACKUP_STORAGE_LOCATION - value: {{ include "backupRestore.s3SecretName" . }} - {{- end }} - {{- if .Values.proxy }} - - name: HTTP_PROXY - value: {{ .Values.proxy }} - - name: HTTPS_PROXY - value: {{ .Values.proxy }} - - name: NO_PROXY - value: {{ .Values.noProxy }} - {{- end }} - {{- if .Values.persistence.enabled }} - - name: DEFAULT_PERSISTENCE_ENABLED - value: "persistence-enabled" - volumeMounts: - - mountPath: "/var/lib/backups" - name: pv-storage - volumes: - - name: pv-storage - persistentVolumeClaim: - claimName: {{ include "backupRestore.pvcName" . }} - {{- end }} - nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} -{{- if .Values.nodeSelector }} -{{ toYaml .Values.nodeSelector | indent 8 }} -{{- end }} - {{- with .Values.affinity }} - affinity: - {{- toYaml . | nindent 8 }} - {{- end }} - tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} -{{- if .Values.tolerations }} -{{ toYaml .Values.tolerations | indent 8 }} -{{- end }} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/hardened.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/hardened.yaml deleted file mode 100644 index bf8492ce0b..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/hardened.yaml +++ /dev/null @@ -1,124 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - name: {{ include "backupRestore.fullname" . }}-patch-sa - namespace: {{ .Release.Namespace }} - labels: {{ include "backupRestore.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": post-install, post-upgrade - "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation -spec: - backoffLimit: 1 - template: - spec: - serviceAccountName: {{ include "backupRestore.fullname" . }}-patch-sa - securityContext: - runAsNonRoot: true - runAsUser: 1000 - restartPolicy: Never - nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} -{{- if .Values.nodeSelector }} -{{ toYaml .Values.nodeSelector | indent 8 }} -{{- end }} - tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} -{{- if .Values.tolerations }} -{{ toYaml .Values.tolerations | indent 8 }} -{{- end }} - containers: - - name: {{ include "backupRestore.fullname" . }}-patch-sa - image: {{ include "system_default_registry" . }}{{ .Values.global.kubectl.repository }}:{{ .Values.global.kubectl.tag }} - imagePullPolicy: IfNotPresent - command: ["kubectl", "-n", {{ .Release.Namespace | quote }}, "patch", "serviceaccount", "default", "-p", "{\"automountServiceAccountToken\": false}"] ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ include "backupRestore.fullname" . }}-patch-sa - namespace: {{ .Release.Namespace }} - labels: {{ include "backupRestore.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": post-install, post-upgrade - "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: {{ include "backupRestore.fullname" . }}-patch-sa - labels: {{ include "backupRestore.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": post-install, post-upgrade - "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation -rules: - - apiGroups: [""] - resources: ["serviceaccounts"] - verbs: ["get", "patch"] -{{- if .Values.global.cattle.psp.enabled}} - - apiGroups: ["policy"] - resources: ["podsecuritypolicies"] - verbs: ["use"] - resourceNames: - - {{ include "backupRestore.fullname" . }}-patch-sa -{{- end}} ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: {{ include "backupRestore.fullname" . }}-patch-sa - labels: {{ include "backupRestore.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": post-install, post-upgrade - "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: {{ include "backupRestore.fullname" . }}-patch-sa -subjects: - - kind: ServiceAccount - name: {{ include "backupRestore.fullname" . }}-patch-sa - namespace: {{ .Release.Namespace }} ---- -{{- if .Values.global.cattle.psp.enabled}} -apiVersion: policy/v1beta1 -kind: PodSecurityPolicy -metadata: - name: {{ include "backupRestore.fullname" . }}-patch-sa - labels: {{ include "backupRestore.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": post-install, post-upgrade - "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation -spec: - privileged: false - hostNetwork: false - hostIPC: false - hostPID: false - runAsUser: - rule: 'MustRunAsNonRoot' - seLinux: - rule: 'RunAsAny' - supplementalGroups: - rule: 'MustRunAs' - ranges: - - min: 1 - max: 65535 - fsGroup: - rule: 'MustRunAs' - ranges: - - min: 1 - max: 65535 - readOnlyRootFilesystem: false - volumes: - - 'secret' -{{- end}} ---- -apiVersion: networking.k8s.io/v1 -kind: NetworkPolicy -metadata: - name: {{ include "backupRestore.fullname" . }}-default-allow-all - namespace: {{ .Release.Namespace }} -spec: - podSelector: {} - egress: - - {} - policyTypes: - - Ingress - - Egress diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/psp.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/psp.yaml deleted file mode 100644 index 34bc96ee72..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/psp.yaml +++ /dev/null @@ -1,31 +0,0 @@ -{{- if .Values.global.cattle.psp.enabled -}} -apiVersion: policy/v1beta1 -kind: PodSecurityPolicy -metadata: - name: {{ include "backupRestore.fullname" . }}-psp - labels: {{ include "backupRestore.labels" . | nindent 4 }} -spec: - privileged: false - allowPrivilegeEscalation: false - hostNetwork: false - hostIPC: false - hostPID: false - runAsUser: - rule: 'MustRunAsNonRoot' - seLinux: - rule: 'RunAsAny' - supplementalGroups: - rule: 'MustRunAs' - ranges: - - min: 1 - max: 65535 - fsGroup: - rule: 'MustRunAs' - ranges: - - min: 1 - max: 65535 - readOnlyRootFilesystem: false - volumes: - - 'persistentVolumeClaim' - - 'secret' -{{- end -}} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/pvc.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/pvc.yaml deleted file mode 100644 index ff57e4dabd..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/pvc.yaml +++ /dev/null @@ -1,27 +0,0 @@ -{{- if and .Values.persistence.enabled -}} -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: {{ include "backupRestore.pvcName" . }} - namespace: {{ .Release.Namespace }} - labels: - {{- include "backupRestore.labels" . | nindent 4 }} -spec: - accessModes: - - ReadWriteOnce - resources: - {{- with .Values.persistence }} - requests: - storage: {{ .size | quote }} -{{- if .storageClass }} -{{- if (eq "-" .storageClass) }} - storageClassName: "" -{{- else }} - storageClassName: {{ .storageClass | quote }} -{{- end }} -{{- end }} -{{- if .volumeName }} - volumeName: {{ .volumeName | quote }} -{{- end }} -{{- end }} -{{- end }} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/rancher-resourceset.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/rancher-resourceset.yaml deleted file mode 100644 index 05add88245..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/rancher-resourceset.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: resources.cattle.io/v1 -kind: ResourceSet -metadata: - name: rancher-resource-set -controllerReferences: - - apiVersion: "apps/v1" - resource: "deployments" - name: "rancher" - namespace: "cattle-system" -resourceSelectors: -{{- range $path, $_ := .Files.Glob "files/default-resourceset-contents/*.yaml" -}} - {{- $.Files.Get $path | nindent 2 -}} -{{- end -}} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/s3-secret.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/s3-secret.yaml deleted file mode 100644 index 7265097307..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/s3-secret.yaml +++ /dev/null @@ -1,31 +0,0 @@ -{{- if .Values.s3.enabled -}} -apiVersion: v1 -kind: Secret -metadata: - name: {{ include "backupRestore.s3SecretName" . }} - namespace: {{ .Release.Namespace }} - labels: - {{- include "backupRestore.labels" . | nindent 4 }} -type: Opaque -stringData: - {{- with .Values.s3 }} - {{- if .credentialSecretName }} - credentialSecretName: {{ .credentialSecretName }} - credentialSecretNamespace: {{ required "When providing a Secret containing S3 credentials, a valid .Values.credentialSecretNamespace must be provided" .credentialSecretNamespace }} - {{- end }} - {{- if .region }} - region: {{ .region | quote }} - {{- end }} - bucketName: {{ required "A valid .Values.bucketName is required for configuring S3 compatible storage as the default backup storage location" .bucketName | quote }} - {{- if .folder }} - folder: {{ .folder | quote }} - {{- end }} - endpoint: {{ required "A valid .Values.endpoint is required for configuring S3 compatible storage as the default backup storage location" .endpoint | quote }} - {{- if .endpointCA }} - endpointCA: {{ .endpointCA }} - {{- end }} - {{- if .insecureTLSSkipVerify }} - insecureTLSSkipVerify: {{ .insecureTLSSkipVerify | quote }} - {{- end }} - {{- end }} -{{ end }} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/serviceaccount.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/serviceaccount.yaml deleted file mode 100644 index 754e1fe89e..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/serviceaccount.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ include "backupRestore.serviceAccountName" . }} - namespace: {{ .Release.Namespace }} - labels: - {{- include "backupRestore.labels" . | nindent 4 }} -{{- if .Values.serviceAccount.annotations }} - annotations: - {{- toYaml .Values.serviceAccount.annotations | nindent 4 }} -{{- end }} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/validate-install-crd.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/validate-install-crd.yaml deleted file mode 100644 index f63fd2e2e2..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/validate-install-crd.yaml +++ /dev/null @@ -1,16 +0,0 @@ -#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}} -# {{- $found := dict -}} -# {{- set $found "resources.cattle.io/v1/Backup" false -}} -# {{- set $found "resources.cattle.io/v1/ResourceSet" false -}} -# {{- set $found "resources.cattle.io/v1/Restore" false -}} -# {{- range .Capabilities.APIVersions -}} -# {{- if hasKey $found (toString .) -}} -# {{- set $found (toString .) true -}} -# {{- end -}} -# {{- end -}} -# {{- range $_, $exists := $found -}} -# {{- if (eq $exists false) -}} -# {{- required "Required CRDs are missing. Please install the corresponding CRD chart before installing this chart." "" -}} -# {{- end -}} -# {{- end -}} -#{{- end -}} \ No newline at end of file diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/validate-psp-install.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/validate-psp-install.yaml deleted file mode 100644 index a30c59d3b7..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/templates/validate-psp-install.yaml +++ /dev/null @@ -1,7 +0,0 @@ -#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}} -#{{- if .Values.global.cattle.psp.enabled }} -#{{- if not (.Capabilities.APIVersions.Has "policy/v1beta1/PodSecurityPolicy") }} -#{{- fail "The target cluster does not have the PodSecurityPolicy API resource. Please disable PSPs in this chart before proceeding." -}} -#{{- end }} -#{{- end }} -#{{- end }} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/deployment_test.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/deployment_test.yaml deleted file mode 100644 index 671d415db0..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/deployment_test.yaml +++ /dev/null @@ -1,216 +0,0 @@ -suite: Test Deployment -templates: -- deployment.yaml -- s3-secret.yaml -- pvc.yaml -- _helpers.tpl -tests: -- it: should set name - template: deployment.yaml - asserts: - - equal: - path: metadata.name - value: "rancher-backup" -- it: should set namespace - template: deployment.yaml - asserts: - - equal: - path: metadata.namespace - value: "NAMESPACE" -- it: should set priorityClassName - set: - priorityClassName: "testClass" - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.priorityClassName - value: "testClass" -- it: should set default imagePullPolicy - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.containers[0].imagePullPolicy - value: "Always" -- it: should set imagePullPolicy - set: - imagePullPolicy: "IfNotPresent" - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.containers[0].imagePullPolicy - value: "IfNotPresent" -- it: should set debug loglevel - set: - debug: true - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].args - content: "--debug" -- it: should set trace loglevel - set: - trace: true - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].args - content: "--trace" -- it: should set proxy environment variables - set: - proxy: "https://127.0.0.1:3128" - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].env - content: - name: HTTP_PROXY - value: "https://127.0.0.1:3128" - - contains: - path: spec.template.spec.containers[0].env - content: - name: HTTPS_PROXY - value: "https://127.0.0.1:3128" - - contains: - path: spec.template.spec.containers[0].env - content: - name: NO_PROXY - value: "127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.svc,.cluster.local" -- it: should set proxy environment variables with modified noproxy - set: - proxy: "https://127.0.0.1:3128" - noProxy: "192.168.0.0/24" - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].env - content: - name: NO_PROXY - value: "192.168.0.0/24" -- it: should set persistence variables - set: - persistence.enabled: true - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].env - content: - name: DEFAULT_PERSISTENCE_ENABLED - value: "persistence-enabled" - - contains: - path: spec.template.spec.containers[0].volumeMounts - content: - mountPath: "/var/lib/backups" - name: "pv-storage" - - equal: - path: spec.template.spec.volumes[0].name - value: "pv-storage" - - equal: - path: spec.template.spec.volumes[0].persistentVolumeClaim - value: - claimName: RELEASE-NAME-0 -- it: should set claim from custom static volumeName - set: - persistence.enabled: true - persistence.volumeName: "PREDEFINED-VOLUME" - persistence.storageClass: "PREDEFINED-STORAGECLASS" - persistence.size: "PREDIFINED-SAMEAS-PVSIZE" - template: deployment.yaml - asserts: - - contains: - path: spec.template.spec.containers[0].env - content: - name: DEFAULT_PERSISTENCE_ENABLED - value: "persistence-enabled" - - equal: - path: spec.template.spec.volumes[0].persistentVolumeClaim - value: - claimName: PREDEFINED-VOLUME -- it: should set private registry - template: deployment.yaml - set: - global.cattle.systemDefaultRegistry: "my.registry.local:3000" - asserts: - - matchRegex: - path: spec.template.spec.containers[0].image - pattern: ^my.registry.local:3000/rancher/backup-restore-operator:.*$ -- it: should set nodeselector - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.nodeSelector - value: - kubernetes.io/os: linux -- it: should not set default affinity - template: deployment.yaml - asserts: - - isNull: - path: spec.template.spec.affinity -- it: should set custom affinity - template: deployment.yaml - set: - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: disktype - operator: In - values: - - ssd - asserts: - - equal: - path: spec.template.spec.affinity - value: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: disktype - operator: In - values: - - ssd -- it: should set tolerations - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.tolerations[0] - value: - key: "cattle.io/os" - value: "linux" - effect: "NoSchedule" - operator: "Equal" -- it: should set custom tolerations - template: deployment.yaml - set: - tolerations: - - key: "example-key" - operator: "Exists" - effect: "NoSchedule" - asserts: - - equal: - path: spec.template.spec.tolerations[0] - value: - key: "cattle.io/os" - value: "linux" - effect: "NoSchedule" - operator: "Equal" - - equal: - path: spec.template.spec.tolerations[1] - value: - key: "example-key" - operator: "Exists" - effect: "NoSchedule" -- it: should not set default imagePullSecrets - template: deployment.yaml - asserts: - - isNull: - path: spec.template.spec.imagePullSecrets -- it: should set imagePullSecrets - set: - imagePullSecrets: - - name: "pull-secret" - template: deployment.yaml - asserts: - - equal: - path: spec.template.spec.imagePullSecrets[0].name - value: "pull-secret" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/pvc_test.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/pvc_test.yaml deleted file mode 100644 index 3a1c40698f..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/pvc_test.yaml +++ /dev/null @@ -1,102 +0,0 @@ -suite: Test PVC -templates: -- pvc.yaml -- _helpers.tpl -tests: -- it: should set name - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - equal: - path: metadata.name - value: "RELEASE-NAME-0" -- it: should set namespace - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - equal: - path: metadata.namespace - value: "NAMESPACE" -- it: should set accessModes - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - equal: - path: spec.accessModes[0] - value: "ReadWriteOnce" -- it: should set size - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - equal: - path: spec.resources.requests.storage - value: "2Gi" -- it: should set size - template: pvc.yaml - set: - persistence: - enabled: true - size: "10Gi" - asserts: - - equal: - path: spec.resources.requests.storage - value: "10Gi" -- it: should not set volumeName - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - isNull: - path: spec.volumeName -- it: should set default storageClass - template: pvc.yaml - set: - persistence: - enabled: true - asserts: - - equal: - path: spec.storageClassName - value: "" -- it: should set custom storageClass - template: pvc.yaml - set: - persistence: - enabled: true - storageClass: "storage-class" - asserts: - - equal: - path: spec.storageClassName - value: "storage-class" -- it: should set custom volumeName - template: pvc.yaml - set: - persistence: - enabled: true - volumeName: "volume-name" - asserts: - - equal: - path: spec.volumeName - value: "volume-name" -- it: should set claim from custom static volumeName - set: - persistence.enabled: true - persistence.volumeName: "PREDEFINED-VOLUME" - persistence.storageClass: "PREDEFINED-STORAGECLASS" - persistence.size: "PREDEFINED-SAMEAS-PVSIZE" - template: pvc.yaml - asserts: - - equal: - path: spec.resources.requests.storage - value: "PREDEFINED-SAMEAS-PVSIZE" - - equal: - path: spec.storageClassName - value: "PREDEFINED-STORAGECLASS" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/s3-secret_test.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/s3-secret_test.yaml deleted file mode 100644 index af130dd293..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/tests/s3-secret_test.yaml +++ /dev/null @@ -1,141 +0,0 @@ -suite: Test S3 Secret -templates: -- s3-secret.yaml -- _helpers.tpl -tests: -- it: should set name - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - equal: - path: metadata.name - value: "rancher-backup-s3" -- it: should set namespace - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - equal: - path: metadata.namespace - value: "NAMESPACE" -- it: should not set credentialSecretName - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - isNull: - path: stringData.credentialSecretName -- it: should set credentialSecretName - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - credentialSecretName: "credential-secret-name" - credentialSecretNamespace: "credential-secret-namespace" - asserts: - - equal: - path: stringData.credentialSecretName - value: "credential-secret-name" - - equal: - path: stringData.credentialSecretNamespace - value: "credential-secret-namespace" -- it: should not set folder - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - isNull: - path: stringData.folder -- it: should set folder - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - folder: "myfolder" - asserts: - - equal: - path: stringData.folder - value: "myfolder" -- it: should not set region - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - isNull: - path: stringData.region -- it: should set region - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - region: "us-west-1" - asserts: - - equal: - path: stringData.region - value: "us-west-1" -- it: should not set endpointCA - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - isNull: - path: stringData.endpointCA -- it: should set endpointCA - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - endpointCA: "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURHakNDQWdLZ0F3SUJBZ0lKQUtpWFZpNEpBb0J5TUEwR0NTcUdTSWIzRFFFQkN3VUFNQkl4RURBT0JnTlYKQkFNTUIzUmxjM1F0WTJFd0hoY05NakF3T0RNd01UZ3lOVFE1V2hjTk1qQXhNREk1TVRneU5UUTVXakFTTVJBdwpEZ1lEVlFRRERBZDBaWE4wTFdOaE1JSUJJakFOQmdrcWhraUc5dzBCQVFFRkFBT0NBUThBTUlJQkNnS0NBUUVBCjA4dnV3Q2Y0SEhtR2Q2azVNTmozRW5NOG00T2RpS3czSGszd1NlOUlXQkwyVzY5WDZxenBhN2I2M3U2L05mMnkKSnZWNDVqeXplRFB6bFJycjlpbEpWaVZ1NFNqWlFjdG9jWmFCaVNsL0xDbEFDdkFaUlYvKzN0TFVTZSs1ZDY0QQpWcUhDQlZObU5xM3E3aVY0TE1aSVpRc3N6K0FxaU1Sd0pOMVVKQTZ6V0tUc2Yzc3ByQ0J2dWxJWmZsVXVETVAyCnRCTCt6cXZEc0pDdWlhNEEvU2JNT29tVmM2WnNtTGkwMjdub3dGRld3MnRpSkM5d0xMRE14NnJoVHQ4a3VvVHYKQXJpUjB4WktiRU45L1Uzb011eUVKbHZyck9YS2ZuUDUwbk8ycGNaQnZCb3pUTStYZnRvQ1d5UnhKUmI5cFNTRApKQjlmUEFtLzNZcFpMMGRKY2sxR1h3SURBUUFCbzNNd2NUQWRCZ05WSFE0RUZnUVU5NHU4WXlMdmE2MTJnT1pyCm44QnlFQ2NucVFjd1FnWURWUjBqQkRzd09ZQVU5NHU4WXlMdmE2MTJnT1pybjhCeUVDY25xUWVoRnFRVU1CSXgKRURBT0JnTlZCQU1NQjNSbGMzUXRZMkdDQ1FDb2wxWXVDUUtBY2pBTUJnTlZIUk1FQlRBREFRSC9NQTBHQ1NxRwpTSWIzRFFFQkN3VUFBNElCQVFER1JRZ1RtdzdVNXRQRHA5Q2psOXlLRW9Vd2pYWWM2UlAwdm1GSHpubXJ3dUVLCjFrTkVJNzhBTUw1MEpuS29CY0ljVDNEeGQ3TGdIbTNCRE5mVVh2anArNnZqaXhJYXR2UWhsSFNVaWIyZjJsSTkKVEMxNzVyNCtROFkzelc1RlFXSDdLK08vY3pJTGh5ei93aHRDUlFkQ29lS1dXZkFiby8wd0VSejZzNkhkVFJzNwpHcWlGNWZtWGp6S0lOcTBjMHRyZ0xtalNKd1hwSnU0ZnNGOEcyZUh4b2pOKzdJQ1FuSkg5cGRIRVpUQUtOL2ppCnIvem04RlZtd1kvdTBndEZneWVQY1ZWbXBqRm03Y0ZOSkc4Y2ZYd0QzcEFwVjhVOGNocTZGeFBHTkVvWFZnclMKY1VRMklaU0RJd1FFY3FvSzFKSGdCUWw2RXBaUVpWMW1DRklrdFBwSQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t" - asserts: - - equal: - path: stringData.endpointCA - value: "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" -- it: should not set insecureTLSSkipVerify - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - asserts: - - isNull: - path: stringData.insecureTLSSkipVerify -- it: should set insecureTLSSkipVerify - template: s3-secret.yaml - set: - s3: - enabled: true - bucketName: "yourbucket" - endpoint: "https://s3.amazonaws.com" - insecureTLSSkipVerify: "true" - asserts: - - equal: - path: stringData.insecureTLSSkipVerify - value: "true" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/values.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.6/values.yaml deleted file mode 100644 index 517cd9b720..0000000000 --- a/charts/rancher-backup/105.0.0+up6.0.0-rc.6/values.yaml +++ /dev/null @@ -1,81 +0,0 @@ -image: - repository: rancher/backup-restore-operator - tag: v6.0.0-rc.6 - -## Default s3 bucket for storing all backup files created by the backup-restore-operator -s3: - enabled: false - ## credentialSecretName if set, should be the name of the Secret containing AWS credentials. - ## To use IAM Role, don't set this field - credentialSecretName: "" - credentialSecretNamespace: "" - region: "" - bucketName: "" - folder: "" - endpoint: "" - endpointCA: "" - insecureTLSSkipVerify: false - -## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ -## If persistence is enabled, operator will create a PVC with mountPath /var/lib/backups -persistence: - enabled: false - - ## If defined, storageClassName: - ## If set to "-", storageClassName: "", which disables dynamic provisioning - ## If undefined (the default) or set to null, no storageClassName spec is - ## set, choosing the default provisioner. (gp2 on AWS, standard on - ## GKE, AWS & OpenStack). - ## Refer https://kubernetes.io/docs/concepts/storage/persistent-volumes/#class-1 - ## - storageClass: "-" - - ## If you want to disable dynamic provisioning by setting storageClass to "-" above, - ## and want to target a particular PV, provide name of the target volume - volumeName: "" - - ## Only certain StorageClasses allow resizing PVs; Refer https://kubernetes.io/blog/2018/07/12/resizing-persistent-volumes-using-kubernetes/ - size: 2Gi - -# Add log level flags to backup-restore -debug: false -trace: false - -# http[s] proxy server passed to backup client -# proxy: http://@:: - -# comma separated list of domains or ip addresses that will not use the proxy -noProxy: 127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.svc,.cluster.local - -global: - cattle: - systemDefaultRegistry: "" - psp: - enabled: false # PSP enablement should default to false - kubectl: - repository: rancher/kubectl - tag: v1.28.14 - -## Node labels for pod assignment -## Ref: https://kubernetes.io/docs/user-guide/node-selection/ -## -nodeSelector: {} - -## List of node taints to tolerate (requires Kubernetes >= 1.6) -tolerations: [] - -affinity: {} - -serviceAccount: - annotations: {} - -priorityClassName: "" - -# Override imagePullPolicy for image -# options: Always, Never, IfNotPresent -# Defaults to Always -imagePullPolicy: "Always" - -## Optional array of imagePullSecrets containing private registry credentials -## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ -imagePullSecrets: [] diff --git a/index.yaml b/index.yaml index 60a127f703..9eee4f6a7e 100755 --- a/index.yaml +++ b/index.yaml @@ -6372,36 +6372,6 @@ entries: - assets/rancher-alerting-drivers/rancher-alerting-drivers-101.0.0.tgz version: 101.0.0 rancher-backup: - - annotations: - catalog.cattle.io/auto-install: rancher-backup-crd=match - catalog.cattle.io/certified: rancher - catalog.cattle.io/display-name: Rancher Backups - catalog.cattle.io/kube-version: '>= 1.28.0-0 < 1.32.0-0' - catalog.cattle.io/namespace: cattle-resources-system - catalog.cattle.io/os: linux - catalog.cattle.io/permits-os: linux,windows - catalog.cattle.io/provides-gvr: resources.cattle.io.resourceset/v1 - catalog.cattle.io/rancher-version: '>= 2.10.0-0 < 2.11.0-0' - catalog.cattle.io/release-name: rancher-backup - catalog.cattle.io/scope: management - catalog.cattle.io/type: cluster-tool - catalog.cattle.io/ui-component: rancher-backup - catalog.cattle.io/upstream-version: 6.0.0-rc.6 - apiVersion: v2 - appVersion: 6.0.0-rc.6 - created: "2024-10-22T13:51:40.9005-04:00" - description: Provides ability to back up and restore the Rancher application running - on any Kubernetes cluster - digest: 4995048b25dceebad9db173964f37d087804cc98e16fc7a8df4ff6d4500ff416 - icon: https://charts.rancher.io/assets/logos/backup-restore.svg - keywords: - - applications - - infrastructure - kubeVersion: '>= 1.28.0-0' - name: rancher-backup - urls: - - assets/rancher-backup/rancher-backup-105.0.0+up6.0.0-rc.6.tgz - version: 105.0.0+up6.0.0-rc.6 - annotations: catalog.cattle.io/auto-install: rancher-backup-crd=match catalog.cattle.io/certified: rancher From 80da457a34736b2f3fd6b56a14393fb4aa11e943 Mon Sep 17 00:00:00 2001 From: Julia Bier Date: Fri, 25 Oct 2024 13:23:03 -0400 Subject: [PATCH 2/5] PACKAGE=rancher-backup CHART=rancher-backup-crd VERSION=105.0.0+up6.0.0-rc.6 make remove --- ...ancher-backup-crd-105.0.0+up6.0.0-rc.6.tgz | Bin 1780 -> 0 bytes .../105.0.0+up6.0.0-rc.6/Chart.yaml | 11 -- .../105.0.0+up6.0.0-rc.6/README.md | 3 - .../templates/backup.yaml | 141 ------------------ .../templates/resourceset.yaml | 118 --------------- .../templates/restore.yaml | 122 --------------- index.yaml | 15 -- 7 files changed, 410 deletions(-) delete mode 100644 assets/rancher-backup-crd/rancher-backup-crd-105.0.0+up6.0.0-rc.6.tgz delete mode 100644 charts/rancher-backup-crd/105.0.0+up6.0.0-rc.6/Chart.yaml delete mode 100644 charts/rancher-backup-crd/105.0.0+up6.0.0-rc.6/README.md delete mode 100644 charts/rancher-backup-crd/105.0.0+up6.0.0-rc.6/templates/backup.yaml delete mode 100644 charts/rancher-backup-crd/105.0.0+up6.0.0-rc.6/templates/resourceset.yaml delete mode 100644 charts/rancher-backup-crd/105.0.0+up6.0.0-rc.6/templates/restore.yaml diff --git a/assets/rancher-backup-crd/rancher-backup-crd-105.0.0+up6.0.0-rc.6.tgz b/assets/rancher-backup-crd/rancher-backup-crd-105.0.0+up6.0.0-rc.6.tgz deleted file mode 100644 index 9fee0c364537208985683c10cb223fe137de4a6e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1780 zcmVDc zVQyr3R8em|NM&qo0PI_DZ`(E#&uf1QBF~FH&ofw+lh_#y6l>Yw$luKoV?;L`68&ivlh;HrOy{D%0KQmizVXa2K! zLpc>>xz2#!SpTg0*JgQSp|5)O1E67^2ixoYNLG2!IdKxt1}UJEw3Q zf{HMKA+m#A2};D0faUZ;?wUPdrPIEol0iS9a&D~>(CZ+Lze zM;YG#_9mB*!~Zpe5yKkP+f)(HJqpVGzvo~2gPi|g`&XB(|DS@g&VwTgPa3%SOL-69 zE8~8Tz0L#W!4QpNrA0VSUG^4cl+(oaL(n+D8k_UOx{S3O<*ogDwrOU%|xk}*a3JZ4y~Mmq>8B8-!cSgdq%W~DBgz;+Q1f<$`E zK1<3q$dO=i$Wx|W^i2u=8SBLmc}im)D^F=5@f<#h)a6k^cEPzpdp;;FDW4bOSxN7g z5o|$a25P~~CbdcP*1f6YUVH_vJTuB^f%5)$3q(-4%#VYCH% zGv8iqfHf4Zl?ZNkP5u7Ef8TrNjd$QVo%heDr_wuR$H> zPQqQuE1-)#BSF7(jaGtI0~?ygY~!5pBWRKa2%U(n2*FRlK^7!XrK#vMv#+wmE)GL1 z9f9UhNT((33|f6;u+t@GN8;(aQm_&)bv5+Y-!Hkq_QI*O{N64-W`=ue@9hRFwExdI;4_ZR<>BX66mBr3Y5vysL3Uj6sPPRt{%Q4L1DQaFx53f%QQK+}<=gMlEY_1Tw$NCEOR9;S4 zB?-qmZPpB4*%2&H5Sg+(UX^+d$+n70%$xkEGCA9Y=YaAQw$rA&^`u6_ zjm7)mYT-!{&9ho~ZNE*$H@*)?`2G+81N(VQ#CifoUyg7Y;-|Fd#4iAMS1b1E6FPhi zbk2o@J1L!)v9eFgk&OAFqPP*;&Jxsimb9HEN95FYmL$|g&d^(mbx32$q@dW`wwAQ5 zCHwMdTT6<{0ncrzNN)@y5k?FW4`{TPq;0Ec>7|mR{xiP2x&7tN3xlS3RQ>+5cX6Hn z{b%pG{r%TT=s##|Eg&s8pwalY)45rXk_DC;=>^s%b Date: Fri, 25 Oct 2024 13:24:22 -0400 Subject: [PATCH 3/5] Update package sources --- packages/rancher-backup/rancher-backup-crd/package.yaml | 2 +- packages/rancher-backup/rancher-backup/package.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/packages/rancher-backup/rancher-backup-crd/package.yaml b/packages/rancher-backup/rancher-backup-crd/package.yaml index 92dbb3d343..64aed900f3 100644 --- a/packages/rancher-backup/rancher-backup-crd/package.yaml +++ b/packages/rancher-backup/rancher-backup-crd/package.yaml @@ -1,2 +1,2 @@ -url: https://github.com/rancher/backup-restore-operator/releases/download/v6.0.0-rc.6/rancher-backup-crd-6.0.0-rc.6.tgz +url: https://github.com/rancher/backup-restore-operator/releases/download/v6.0.0-rc.7/rancher-backup-crd-6.0.0-rc.7.tgz version: 105.0.0 diff --git a/packages/rancher-backup/rancher-backup/package.yaml b/packages/rancher-backup/rancher-backup/package.yaml index 3812681a91..001219303f 100644 --- a/packages/rancher-backup/rancher-backup/package.yaml +++ b/packages/rancher-backup/rancher-backup/package.yaml @@ -1,2 +1,2 @@ -url: https://github.com/rancher/backup-restore-operator/releases/download/v6.0.0-rc.6/rancher-backup-6.0.0-rc.6.tgz +url: https://github.com/rancher/backup-restore-operator/releases/download/v6.0.0-rc.7/rancher-backup-6.0.0-rc.7.tgz version: 105.0.0 From b87a58d9b81a3ea73e13351498d3778ad1a81a59 Mon Sep 17 00:00:00 2001 From: Julia Bier Date: Fri, 25 Oct 2024 14:14:26 -0400 Subject: [PATCH 4/5] PACKAGE=rancher-backup make charts --- ...ancher-backup-crd-105.0.0+up6.0.0-rc.7.tgz | Bin 0 -> 1780 bytes .../rancher-backup-105.0.0+up6.0.0-rc.7.tgz | Bin 0 -> 11616 bytes .../105.0.0+up6.0.0-rc.7/Chart.yaml | 11 + .../105.0.0+up6.0.0-rc.7/README.md | 3 + .../templates/backup.yaml | 141 ++++++++++++ .../templates/resourceset.yaml | 118 ++++++++++ .../templates/restore.yaml | 122 ++++++++++ .../105.0.0+up6.0.0-rc.7/Chart.yaml | 26 +++ .../105.0.0+up6.0.0-rc.7/README.md | 79 +++++++ .../105.0.0+up6.0.0-rc.7/app-readme.md | 33 +++ .../default-resourceset-contents/aks.yaml | 25 ++ .../default-resourceset-contents/eks.yaml | 17 ++ .../elemental.yaml | 49 ++++ .../default-resourceset-contents/fleet.yaml | 60 +++++ .../default-resourceset-contents/gke.yaml | 17 ++ .../provisioningv2.yaml | 23 ++ .../rancher-operator.yaml | 28 +++ .../default-resourceset-contents/rancher.yaml | 69 ++++++ .../templates/_helpers.tpl | 87 +++++++ .../templates/clusterrolebinding.yaml | 14 ++ .../templates/deployment.yaml | 79 +++++++ .../templates/hardened.yaml | 124 ++++++++++ .../105.0.0+up6.0.0-rc.7/templates/psp.yaml | 31 +++ .../105.0.0+up6.0.0-rc.7/templates/pvc.yaml | 27 +++ .../templates/rancher-resourceset.yaml | 13 ++ .../templates/s3-secret.yaml | 31 +++ .../templates/serviceaccount.yaml | 11 + .../templates/validate-install-crd.yaml | 16 ++ .../templates/validate-psp-install.yaml | 7 + .../tests/deployment_test.yaml | 216 ++++++++++++++++++ .../105.0.0+up6.0.0-rc.7/tests/pvc_test.yaml | 102 +++++++++ .../tests/s3-secret_test.yaml | 141 ++++++++++++ .../105.0.0+up6.0.0-rc.7/values.yaml | 81 +++++++ index.yaml | 45 ++++ 34 files changed, 1846 insertions(+) create mode 100644 assets/rancher-backup-crd/rancher-backup-crd-105.0.0+up6.0.0-rc.7.tgz create mode 100644 assets/rancher-backup/rancher-backup-105.0.0+up6.0.0-rc.7.tgz create mode 100644 charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/Chart.yaml create mode 100644 charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/README.md create mode 100644 charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/backup.yaml create mode 100644 charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/resourceset.yaml create mode 100644 charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/restore.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/Chart.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/README.md create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/app-readme.md create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/aks.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/eks.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/elemental.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/fleet.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/gke.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/provisioningv2.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/rancher-operator.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/rancher.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/_helpers.tpl create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/deployment.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/hardened.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/psp.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/pvc.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/rancher-resourceset.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/s3-secret.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/serviceaccount.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/validate-install-crd.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/validate-psp-install.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/deployment_test.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/pvc_test.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/s3-secret_test.yaml create mode 100644 charts/rancher-backup/105.0.0+up6.0.0-rc.7/values.yaml diff --git a/assets/rancher-backup-crd/rancher-backup-crd-105.0.0+up6.0.0-rc.7.tgz b/assets/rancher-backup-crd/rancher-backup-crd-105.0.0+up6.0.0-rc.7.tgz new file mode 100644 index 0000000000000000000000000000000000000000..65559b273042a54738da200a1b3dae92ee291b91 GIT binary patch literal 1780 zcmVDc zVQyr3R8em|NM&qo0PI_DZ`(E#&uf1QBF~FH&ofw+^T!?x6l>$DaA@-dFDTx zSAKD?gfQnqV@(BD!wy0OYs|#lBUoz&9u;p1NKI!Hf+0$6#W`(3g8=vtoogAxxpNA~ zA*cuw7$Q5^m7qi{38=1GDh;9YH3SY8&grkU2lIX7UxZ>FJuMN-d z;wZ!W-`?aBa`?Z7Fk)DPdYdZZxko{{|M&b$zn}B}fq(6{{(lO}IuDL0JZa$OFXcUa zuZ;UW_Bs!g2SYT9l@{SRb=g~(QBD)v4?*JqYi!OB>oV4El(+WpjXQT#1jNjoOA$vy zw*#+kY?fIazq;0O5{xuId-aM-XxUve5NJw;ZPeV`|htU@7 z&3t>c0oG8sRwB6FHTC-s|9$V7H{QKF9|I1S=l}b|3qdJ7-xhn4yjdi%o%7hUMno16 z;$b>hM8I!8fBbSe*&0SDk|HuOab=*ER%X2+_dG+uiCiX;Xe9WI&L=>m)p&j;LR(?W zOhICnL@oOgB7$p7IpyIemF9Rr#148BbFVGET#(NBLqJI2U(Cnm8PQ4%)ZJJyEqK7 zbOf41A)S`AGiddZ!A_T$9f_ywO2JCJ)YZ^mf4}4c+Y6`C`rlgR@T~6v74`pq|2kLy zyYPGc%eMY^3OY*tFJm`N76J1ms8uB}%g&w_>vCY`QFTqQxoQv*TuZ?i$T7@70w?*T z&Y1<4Wq_HDa)j*4uwNST-C?;2)WTcm^PnXppI)4KR$1)a6tS9?sW4|M0d?m}n=20k zl9Ya4uHnEFVQ~OIQyw_?qVTR$D^aaTQ)`Ou%0<_buZ|RRxg5hBo}%WJ^ziz$lZbpQ zeK0%)R$$#V@vE-NA=YGZ_Y_G`%6$vBRI&qg*jRdilG04As`?d#tZePvzx= zRg!S5(`L=!l^wzI1d%Dr<5j8WkZh}{#JtImDwDHai0*E>_PXjERrh}_Bs{kPsN()V z@GtZIe}jubd;dQP9qayY?55$nzk$r(`x7?1cm8y0<2^vuOD2iHsdw5H+fJMA){`0y zHx}=MtA!^;G|y_`wf!~~-}pWp;rl}X4D9DI5$g#UeL2Eqh@aA)6Tbl5U9H%sPw4P9 z&^Z?p?xb{H#>ze|M>6JzisD9WJ4;a8S<-fv9FbGoS&~o}IYVzL)*+20lY(M%+gj4L zmh8);Z7nG(2Ryf>BE2z;L>MthJfP8DlD4g)rI$*M`p@|8=JuC6FASREQT6-J-o+sQ z`_Bu%{r%TT=s##|Eg&s8pwalY)45rXk_DC;=>^s%bDc zVQyr3R8em|NM&qo0PMYKbKAITG|LXN*`)t*WRp+ zphF8YI5Ge6bVXHFb!Tgf|EsEM{NIvVD*mImwX5#zZtw1vcK)Fjx76L8e*pCfamXw# zq0sq<`slvmgZrBlXjzy-YG8|0asX(MLK6=Q8l==j1p{wFmtw`R2!*Cu0nz26Xpa8R z38dO6wW)?2Y77jd`|VPz=?1Y)I8!V*K^4#vHNhV5fuyz=yM3fgkwXk@Rlsk5{u2}n zrMCrDQNbUeSSXj+pTDIxWt|WkYN!IlL&ZS^yN-s4LS}@bNoq4pD!?=>_crydjhu-= ziQ?DVxG^jp-=t%2J9uj7h$zFUQvrVWL5+g{4AISLF%^h65fLhs3Pn{?p;Raqv#H=9 z6G4I`$)l5++JI=-MinrD7964pvS?~8I%AbI(zkvh9@?*kVTj3-L(mI z5S#>~-6^nvI$B{j2W_M0J)V|w(6)OiwRA)@$FM1XelBMKz`kJ`bOtB}tb5?v09rbm z6N()K=m`1i5!$wCXq;1k<64$s4RZis3qWfIj@>?TEJP9UMxQe@*3*bmn^ZP8H6~X{ zL5`L46(NX{O%o3>*_7-g`z?^^FgHfC8|>($l2gKclbiw!Yv4da9ap2SgK~@;dTGq? zTP}5eeIgdsZAPH~bnOtKezrh*E^93@{Xd1Ki^vlj01Nd0)^2G#uK&y1#b^D$j$%yU z5HZc~AR7~dVrS+HjF?zbu#Fr@G1KA{4l7_95*xV}FTg$;K-Z*zltJIs#)yIeb^vQ@ zSVI6!69|A{V3Yy*AI1_{b5BT4rGSIL^p~2)hs9v^1z(_%W?_l5(1P-gGpoLAe z0d#ErMj3QKM+N}{1DQJ0S1D*zKt7-GN?ITMy@Q5a67wH|W}(&tZ0g97Kai!{*kB4X z^0QWz4-AVS&2>=cq}?7HOa~f+nMW=*I}REMeN@@x29(fO+yKKG*>nkVl%Z?rh?z6Q zAQV|tnPStOAhO8-91ej0Mnk|L-lS{*Z?eFRVVZJc0R-p08n`j&2u!eR(Q`;gU~>wc zP1EShwMB9vkSX&lX5w%FbTlw5))iYFaENLqBt+2akMN^E{T6(lFvu(Uv_|>-2Dlj+ z+6d?dVO43(=is=$!I$p;56*04wJFrb zujSfpp#gGy>my~lHEe0fresrMn>Oh$G&TgK$U){nWMCCW*kF2Q*abJx;)IX{O{FJe zc7iBne}=)ynF6qnr)WcfWtNx+lR{^RD1g9*4mC8_gbq0GZ2)OYNBCRT6{E-j`G?O} z0{EF_&H!^zpkaY_2oq)%nkK$sMxb%W@I3F4|1+1MeG?BiOKS1$rn}Jv*TZgYQAXrg9!pg&OiU}AFK^CLjSD%;X3A@l|O9k z&_7uh8lFrbAjpOem*J*CD5JlQC(y76V++FuP}d#ANlHhM3gKX3%Ec<1Dc*C=!sh~m zVriEtl!ChXcB7~Uf9{qFMXqW#i=~a?@9fuG@pEURK&IM8K^ol!6Kl}S<%TBiLsR;* z)Z~H%0O8(ACDlShgHWdIxby_TCbp;+mqFkKIB%cJhs^cyREx*86#Ghv&8tRD0VqwQ z$_o6w(4pK|FK%%W-NZTqChQ}VaMfvJ9Y8{ip~YP;!Pk{}Y#ox~7S@qMkcl+rH!umF zV~^VW33e*r+jrjSiJUt25-@h4e8Ev{GMSFRD+hgb4F{31m&3h`o!2>8i-!-uhre<; zI2ag~L1zLyTYH9vs+z_W03%B{-oUHaj)5J6&LXmzEwQsHava9n+(bEdP4gU^hBo7r z;m>j}0JbHls(AxvWCJwO6geBt7r^Bp(i{3{J&B;c6vxWUfY z#87AKFWn2Gjgan|LbuWpCMXOt_hwTf=uw%!RJe2w0T+W(z!))66b?Kx^~Bxsifqfx z|G@xh%ok|lw(Orh_U!Nq$k)HR(9Fk4lZpnBDj_n_1Wl&Mso{wY9R%`!6br>IMa_dk z4ca1XW*|~H4q{J*1B1#xIh;PCun-k?K@>GIt8*)5PI1liGQ24rxTZM+Y}h>L44`du zyReYEM1VT3rSbX{?395vf(`+Fq(Nqj5IjL)?Z&N1?%ol=MsFGugL)He5b#R6tozM2 ztILg98)>f#$=MciwIu_43`GV!pmag(xNtw=USP@aV}BZxwmTRYx7;uekswY19$OSR zGm}|{_W&f!&hp)BQHvWF3(@3t^C|qR{0GTLP?mpt^M22a9usN^(OLLhicKp9w%M5xOt5g=v*aM9;=sl8o`ODyfKwSaLSS zg0)>p9|_+?Vs3t99DEsl|DH?P2iXk7SiO8h^MAFx0Y~W-Cf(0A z)qY6HwEv~$}3rp$;iz-u;R?0!RfV;w4-#q_;DDEqo6w!(zTQ z*kTZf+y8A`)y6@9T1J1i!O zHbUB%xRXs%j?Ba>Zg_#0g^t9sum=g^n}GREQdS5zeYtSSzvexX5iD)*5O)&v7y@rk zwdLX4Q*AC}Z-V&W2?g*#b>R~^2$LnE#(u>_;MNBKD87OdGaJS|h%N)KU&%zNh$O=7 zLCus1JY$W;4HJF(F>8M`O2DCEKPEK4;s634ww%W~fk;N^5N^C}A=qaD-@jK9uPGcR z`U}VXzkTx~NZuAelJs)xAp{3HLsE%HMftW|xRwI)io&1f<8DQ$8Q;K5G~-Vr&Aivh znpQ$}1&M3#s;$naX7#k*KCjm5{(C=qI7i+^M8qIX6GV^`9q!i~)$U2>Q@i|WuUb3q zo_}h0&RW%j`lpk#TD5a{)=b4Ai?1TSa3P6Tj0Pzy9N*5;@O;Mny_5QW60dv+s3L*p{c6JDK4tQc zgx8^e%A*4E@pB&eP$vQ*d#cD20J$(&l3dw|nydtS>pkACW-WOR*U=g}_yvt~otq`dcZkN#5HK8eu%nSAdNP^}b`- z5Wie|=s+DMt1CJ(5k-p4t-gE(@Q1|JG=y}dZ-71;U}PkXrUkxgL%OLMuUjxCCAX&~ku*Q$~xwptj|3ZRaQqOZCHITcV;RaHKB5Mv7J zS;+iM&EG)@{-VlBS|bVPDB>PHXv#svf$~8t>p#ge81hhBwj&j*7xSo6e5%OttB^s4 zClkm-%ZI##mEQn)#maAF$c12&bOYr1*jWR~G;&XmJ&_~j&}{bqZ~w|emtt;_MkB%< zJVw^P^73%s_xxWuMNy(35qSbI7D|4Wh0DvrI8Ep7ASC1FPebazI}sh%6z-7XZx|59 zJNdul`BJ%K&Yneig2*aUzy-Sm>|$hq-KGdyXWhM67o?h7=rZtb00$S29ox z4^}?pU4mk*`Qi^kMyt=Y6t>^LKXT!Dn_tiCkFURAYipSet9ct>tCKI-*<(v0V{h*< zv$LEiX6tDMZV4|vLF~W=nZzp z(T9iUwdjNM!~NhvVA~2|@femivuZG{Zt-}pAo2{RBQ^?04CHRJDH+ZJd4p(zDn zD#+i&Q)mst;%s7A!VM5*0&go|XM4N6odaM%1Y123I0r%f%ra+eU=71W!VnBd5(%*> z;5V@c^V=NxX$iU;)-WMA<&->r8B6O;;ose`|1W7K`D=#pROqV)0MO7u#2+SqB$i`m zW(UJRw0Jf7t1f>0Y=?Z!B{TlRNa^ObgkNr z*pE|e^K=TAHRs-oI?m4etZLVy(hGwrXfO3u^z~$7J~YvV^DNvXY%SKBEj~!+`kq>BE}txfB(UBaO8vd;Q1@`m7nB~yniivN=s}I z9D&cM!f^=qmHsVC%6XOOQTynp^$cq0{ZcTWcW-}o$&~-zi%>4Ihw6hx=l{2NV)DOK zRLjr#f7VhWvC@=JuzW$^k}umRZ6_qYS`>n4PQw;;uxTQPXU|~rF$ib-z2@aX-+Uw_ zTmkvu1iCyuB)ZDWzVh)Hp8RT7rt!=BUzB;V0eM`HTeje(4e4kDy!-?z{{#hYwH6Lc z+y{A{oM_XFNraX^|0JJbv-w7xE#+EK=!2IY2t)<_9MsW_mMinAd{S2rs33bY^aF}sS6@C|D33jk(!RdPH&Y>)rkM_>^?lc zWb6OPfr3XF0SoQ_J?^dd~l~mhwWf%aDRsCbGaQ6JusZBKLn@=3iW?X(&wb z(DqEcB-@IxK{WeS_54r@PZFwW48RDIV>I*ndPQ-YJ076$TGspjV(3JwP{$4T>_rXI ze#v0Qrw#BD-5P`vMsNu;g3&AV)vv;b7QrO2Pg~w!wbs5!el;-&F|1($oQw1@QXYt; zQrK}2u`xe2$C}7AQ{sq^S5>6BHHdgw$a^W=<_<6P<7e~8zjIkE|7~J>I^f61e|1My z6Y_ueIsUtr@+0K`(q~FSl`Txct4!%ycn1l{M~|FrCJvkAU;7Y6R*FuL4cbctsbfTV zXCpWj>B16VK=u64k3;)n&&z6k-aaS5utEaOlXkX)HH3JkqExWpXQ#N>|1gQxtvI>{(-U6U$49z z$wPyV+Fe-EXE;P^_#A ztbihpRg3GLxNAMHySZJ>=_WDInv7VA1Kmva4zOwB8*ct_*=cg~Qy7l2E_-Z42Tl-0 z4)M}9#*h$mz*Za`A;a-Qp5nHeN-lQ~&OI0afO~P~Vn4X@Nj$g*{uL$nxqHPgp+6(P z?{oJckz(W?uz`v%`NUfgdAne}f&eImLxE}>9(%#xOw~e>U$9c-%|e?q_dc~zEIRDb zCLRYafST(#$fACNSmN3?b|_&07;R4t>+noqB%B}FXX=i|J!sCoQYE@UQ2<=37z98| z=4^+i$go=g?Xh8pZd75)6+1d|WU@~G0v5om5eCp3P$%e_?`p{I!^`dlgE5+s4e(hU z^f^Ye&wQ|-#pWje&4--N&l|7zIb!hlY9rU61^S3fL7yoL@s9nyla~0y>!J+y#C1Ba zTHzgnc6ozaGGar4J>fI>Iu16n#Sxx02{l&T-`Ut>W{>=JW6%*ddi++eylG7I7us&9 zdw(+QsuG2rEr2Wy>&z#u@+&*$LW|%PfX&)y5Ua1)+eYtG0$BqB2_#gW@|HUM^jZa7Gz z=FD%;t=OJq7r_=ugbX6`vmhNn3O>j4vwQ|}dVN7 zuYsXyIC?ko@MP_MB+^%>WQ_|ZHX{w}JxC!y2(6{y$y0iuC64kTo!`^q@lF!{tE#Yk zm=L}hAxmb}O}hmrv@}J=sC&>xRQ^3M;gDk))gT}^4ilLckvmEN5Pz=-AohX%Qg;T4 zl=Fr)RM6BA_lt;oO8C_k4C3Ysp8h_7`|Z0xH}b*!Lp$Ty`xR*Eq0jljJ^1h!@54`h z^Ms@EVDe6(MGYm?iyYhBZGvj(7scF6o(1f!Co)z0P_x}&T zpZwOMkfSdRXi@-GlVIRH4v9_bAhbDw%n{l|w~#q5ixCXdA?y$$)rW}3G#$I746bV=ucBW4*9Hz(xN}% z2+_d76IPM-8x9ds2G~)E+aDpQ zBPV{pGq)j_j^sJP9i-tYa%Qg!5!!pYMquW9wEo4}q>{@i;6sLPc~B^gAIsVbO zNi4aDLv5+J3^d>t!vgKH5{lMfp5#K*B7nHes3QDQ&u~y?ga2t*p`@4IN0kMzFU|-C z*8K)I$QU+S{EDRbC^kUfWfl%{xPu6J`djG+dL|(D?%|u~&kExXL2V?*Dj<8FT<8KN z;T6Gogb=hnq`-C%pIM30jTQcqfJc>?=J%#}1C015SQF+PNYhD2HnMbNX$D(Fh~6M% z$-am;g$4;Zy~z!4PoQ*$4q26JdvBYYAUo)#a*ymRANKL;)$2 zgHTREV&VtV7<3Cj9gMKX@8Atz!sfp>*nbo`Q+}zl0_5QiJ|0gqg$5*FCr4!X%i32L zc;V&;#RYzqWMGq19F|+$&G}D$%Vht3LSneZqys%wKl+qbF2ezn-ZMM>`HT| zIq+{~vrXpBdOu`(md)3~0qirraL@!#ksiqBsFW=LAK5A+nuCaI(hczDja>BZypg_n z172Z=Gc6c6h>ZO02!lOJ5XMsruQxceiL)r^)<&8XBsOxGGH0U1uoQ72lIN#ztHf8O zTsD2q^rJs}H#mRhj`C+<445hyK_bXvJ7{WPmzXoZB6VE!xsdyx|N3u6k=&o)&6_5s zsPg7b?oV(S*&LR)DsAxCuLnv-y2Y)ykN`*s)(jp8;K;JN%u5dBN^+JA3k=|tk#qnc zU{cjYGFTwMSLThm;Ll|Yd2yGsN5~nofI_BLa+>7abFBDn$;{`U8W2G6IqW-r2CvYR z@ucWr0xg$^1vL{viy0RFSYNXxWk}^=B5$Amo!Dse4j};u`VMAXPAF4yp$N5yFIT6W z#sk;kAyy7U2zwrg@oyx)!Oj@G`W$sCKX1f_umKR&3a<-{Qa-I5G0_AJ5z}9;HujGP zaLhJB`)2nIzMuT zt;dKr=mFV$?cLWb9Sr|ON9KGCJa<8E9)~B$5Bdi)?@y7xv*TYC8pOOTbOX{yDFR(Q z92lw4mN&kW!jFtp#QgsyK7NE_vf??gh39{ZvHZ`a(sudz{Qp`?;#*t;-BM(UQ&+)( zFPYqrw9pXU+7*y5G+f>lmUkFF5ehhsh{4yW@#=y_! z5dSJTHS46p@lphL`wnpekGW^!lE{Uw&=c5Y_xuC8l(+UhxaU;(u{5I(r+K3HpUnvW zOUvr=A3e4FS9iB|6Y_uiIsUtr5@UMwL#1=N6hcc#-Y3vYXue+hF|r-~G}(@pldcco ze=jH9(o$dn|Ce@lY|qQ}*ie@Z3qvz822^Qj+N3WE9r z6CtYHe-!^dc72Hzeg84B!1(vpp;Su1yU?_LYdeTXGJL9!(JW(-g4X_Ba=``v`9sTl zC{J~R4|(di;;MiLk3M5{^HAE$`_y&*HyP*?$^X^$KSy9C4`6}*FK;Ej|0}CI&-#BY zWf^`6B!9NpTZsW<0GH>ufajoX7ot&N$#F`57Th(N%64JK^K!}kwUXdiO&|k+Zg~oe zRx06)iH#kqP&`J~L#e^H##4vg#58^6BV z8E9IBraj8E>f{nWW^eof^<7IhQ6&3itd}?*KQ4^E1RFl_tYx7nrN!g$OZNY>_3zIv ztJ{CWFX79{BuG-(VjEse|7#3f5y~9Vhia;$X zUebGCQqIgnadi+6X}fZpI7Q}$5m)tbQ|H$skZnRs%o{)E_VV6)5&Nk-#uPa+nRxKn zpQxAjA4kxcA~p;`^!tzAjm1)EGZ~o-K`YYS_U?~+kgJz2Jj1Izh^EaHHa8oO@kB3H_ zeyEw3B-~o;+J)UdfgzDti%SOc=7g)4nB||%kZUdvmj5fn02au9{;_Xt|7WZCEdSS1 zo^1a|#^3Hg+RFV$O}YQ*66COd<^`ML7k!K=p$@ct z)A*yGiH+C_)S*q0bN?~)L(!l%LQ9Il)wWj_P;M#BmpXt)?!aW8DPH@|%VQ{%LYMV! z-S}fjHdF59NgDn|s3He7boz?R>N{)O=t-w@Sd!d-v>p5fX_O--QXC41t5QEXrXUN@ z+_Bh>fgOX+G!qgscQ}5pjzJB!V19&+ly-LM<-Md*Bys{NG;uWKlFWdf#Bu4vQQ7-h zd}mu;;TBk4Y*H;u{gi9TU9RQNWr-dhewM(cBdd_w9qVW%;UA41SnHjF1&g0^rRsz%+<%9OGu+>d}JTHhv%j{G_02? z0VpZ5Ttl&W9WTGo&$jB8FNyr`gfjcz^VvVK2aml0aK8OtESHM$`~P;gO3(Lytfdgw zpr`^mh)}TaPkYY42cVKuLa9agO2{c7dO2iH0p4xlIR$(gA=5?^f0t{O5 zzQZMmaz@Gl;B`|;^Z@|VuMU-rhQ7Mc^aO(q>8Jv{TZsx1me21&=s@wrL~8#cGx8H6 z;QRfr*DEnj$kiD*mRzua#M41QIv0;vk?iB(jB!8C5`DQ8*GQXp5Ys zX=w8|KO1e1L@Mv%+ZjOC)NruH(-};mWAJooQ7*=}Y#Dip42q@Qf?7}u#Y(wYdb`qs zdf>Q_HH{6+w~oYJZtpss^H1lkv-ej~vuQ5YKNg+#FN9C?ECU%233c=BMo|s^+$|M~ zJN!qnv{C$>{dy~Y?rapuRNE+cd$xY~Yx%V$5=u<4F7i%UnAcrx#Q|X9b6G2lUuo-? zSdZBRkKvl6TadjugBz2Xyw@gQ7LI$r-l%p@I-kz#t@dHNQ*YMlpX$x(-bsBwL5k2o z6giMbae+uCcgh2WSy=My;pZG)KAt^19~(>Fo+>g$Tz&;@D0A8|j8crcN5c%V=ZTcv zH4_?>NGJX_x+HR+`Gw!?|4rTr7X}#K3&U@{{ z>-sMt6rO}R*0f*}QWiJDl-8eKwzR?H8hZx(YavC7(Y7BUKO9=v ze_X#snoA9A1?@oOQh^R~CM5h)$qe~1u}uMA%0LE<2Ui%CAA z5;*q;kI`U&G|Hp+a&Ay+D7ns%OffVi(=9*rz^4tG#J(XG`TvzM@;_e;Bf>9k^2(W+aNNaszq%|}_Pb*O7b^qYSm`Q`5ZQwkYxh2*9_mB5HjTf-s{MS~g zyc<9NrS3fEe^^Ti+yCvdyv{o61tbo8J?F3vdGOumx{OLBo?}^wRRD$rMsv+N<~*jd>O4#IrxsZc6`E$DeA@Qpd1{`-}vs zLrGd7zxIGxNkg#$^1)+?pl`8dHR1~*vn7AKl)<-v#?cj*jpjpur>*I^!%1D`;zHhE zXqs19*An@}O8(^r#fm_R?_i5RS6pEJpu!U#z)GE62MrBu{X&FTWp*X#>Jy{xAhK=oBJ1+`pLE0D7U*ud)KOYe9@)$ zW#igz*6qE%dbHi?)^A#Bv!iwOPW$rkuGMHXF2>DruiI!|jLof9x3$+%kF1V)b$l^y zG&|kHyYA%n%W1KpUUrTex;nyF>UI;38|9ALYU*mSdtElqdX0LqR~mikjEi3{-jABC z`ncHXwJg-#?shx9_i)_kbb3d7`i)(`E}He8*=V)ut-b60J$PB)y6H6ZGgxQiI68vk z#@WS0ceKlq1H0O`ez#Y<=rtOxabvHeHut)n(O#!(9$k!^R-66q_V#LDs$06%D_@kZ z)OLMDTcwKzeN`#y7Lx-PQKx{`D=g z_D0RpVd=EoEuE;_lT&Ma+_tVSoBO@5=)G;W8hbna#?egsV%q(>eF=Nl#b%@V_0nv7 z(GPzAaye<#V6RC|)Z6`jy|J&48?b9$O^@%IYNyfbT(?Q_djCqjxUes^?r8tQyguu9 zw{K6&^)l>TshxTewtIFrwJ)y6IC7TdaNpPlx4#}}RJot{d&TIuReEAP!N)T5Gq zd3$s@xhB2$y?Uotoz<*Xty7~r+WYIerrP`Zr8#QW>(g%OsM#s~PJ5Hn(xug;orCes z=@;GYm-T~|sh3Z!mfaqoZtLppX{%n`YFbCQ_wHf~mV49QyQ|}i_eXa3%ih-Im>R9_ z*7ixUd)HTsMbzyb_upO5wDIp(?b5Z|-S6J?$8TraK@(nB*R_7x?snSr>e^~eFN*qh z*BTvnCx_cwquFUy?c<9t=A>J1(3897wbrmtPY+thS0!@WDvrwSZfmdGZPfaA&8A*z zb}uelwQF_zvfZewt?sqe?RB@C@48!;@6A(vQZJo$j;v16p4BE>TNjquxF|JUt=IUX z7aP`Pw{_Y5viJ33+`7}%->)w++V;PUYN*@Wzbb9tb}xIlWi?v8Zn4&WKRgcj;<|Rx zEjBN{G~4}y)4T5b*7fOF-@hm}_WPxq+spU8{ce};U6t&;PM6m|?2e0#3$wM?syABg z+V9Pa&fdF=V)M3jW5;=LuUR+QTCcZ?N3H8(i|TiJulc@p(Rx?iz9`w`?7ex?y8OMT zm+Y&{%hOWVtlsF8;z9eJ?e^avmGy4#r1quZbjH1-<{jgco8oERcH5=jYgelIrMKU# zql1fb=RiN~cbc_UeS6aDjY`m}I!){PD||mXx_aL#buUMx-DvjU<>Bo5%ModJ#>c(- z>233_H*3~t>#Q-pL#9@2nT_}Def{KEeLKA>+ee*)(Ka%EFT;1O{jS*puJ4-T(YV(*x@+Fp@3c$vpm}*sFAwaUwrZYfoxLxo?^?5K^_D`j zd8`*lH*Kq{UR%wBv${6B?vA$lCHw67PCvRRHr)1jxUC(u4qH9Dd(ow5CnejiS%*_J zQMX#=HPwsbsovSM^!l}hE_)YO#p}!d`@OHNiCVr=ug}_JZR@IZeWj}xcUrx1)B7^& zogFl>*10}FjlFlBac_FrxVAL&^!TdSYn_fw*i~Ccda=>CDmSL>yT)<*K(BQ#Z%VEA zd$8NHFHbLv`>nC*=#9Ob_66p0`lQ=CYt_x*Z7@vJYN^~Jxt zzDV`h42$35i#jLm_Smp{$T0@9U&y~%#d%8~OY#`sFFs^eQgN&Rky&9i&7U>gun{1@ e{_O3M=ki>h%X9g+E&ne70RR63BWim93IPB{1lke+ literal 0 HcmV?d00001 diff --git a/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/Chart.yaml b/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/Chart.yaml new file mode 100644 index 0000000000..8a781a5488 --- /dev/null +++ b/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/Chart.yaml @@ -0,0 +1,11 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-resources-system + catalog.cattle.io/release-name: rancher-backup-crd +apiVersion: v2 +appVersion: 6.0.0-rc.7 +description: Installs the CRDs for rancher-backup. +name: rancher-backup-crd +type: application +version: 105.0.0+up6.0.0-rc.7 diff --git a/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/README.md b/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/README.md new file mode 100644 index 0000000000..046410962b --- /dev/null +++ b/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/README.md @@ -0,0 +1,3 @@ +# Rancher Backup CRD + +A Rancher chart that installs the CRDs used by `rancher-backup`. diff --git a/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/backup.yaml b/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/backup.yaml new file mode 100644 index 0000000000..75ad5bf7b8 --- /dev/null +++ b/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/backup.yaml @@ -0,0 +1,141 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: backups.resources.cattle.io +spec: + group: resources.cattle.io + names: + kind: Backup + plural: backups + singular: backup + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .status.storageLocation + name: Location + type: string + - jsonPath: .status.backupType + name: Type + type: string + - jsonPath: .status.filename + name: Latest-Backup + type: string + - jsonPath: .spec.resourceSetName + name: ResourceSet + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - jsonPath: .status.conditions[?(@.type=="Ready")].message + name: Status + type: string + name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + encryptionConfigSecretName: + description: Name of the Secret containing the encryption config + nullable: true + type: string + resourceSetName: + description: Name of the ResourceSet CR to use for backup + nullable: true + type: string + retentionCount: + minimum: 1 + type: integer + schedule: + description: Cron schedule for recurring backups + example: + Descriptors: '@midnight' + Standard crontab specs: 0 0 * * * + nullable: true + type: string + storageLocation: + nullable: true + properties: + s3: + nullable: true + properties: + bucketName: + nullable: true + type: string + credentialSecretName: + nullable: true + type: string + credentialSecretNamespace: + nullable: true + type: string + endpoint: + nullable: true + type: string + endpointCA: + nullable: true + type: string + folder: + nullable: true + type: string + insecureTLSSkipVerify: + type: boolean + region: + nullable: true + type: string + type: object + type: object + required: + - resourceSetName + type: object + status: + properties: + backupType: + nullable: true + type: string + conditions: + items: + properties: + lastTransitionTime: + nullable: true + type: string + lastUpdateTime: + nullable: true + type: string + message: + nullable: true + type: string + reason: + nullable: true + type: string + status: + nullable: true + type: string + type: + nullable: true + type: string + type: object + nullable: true + type: array + filename: + nullable: true + type: string + lastSnapshotTs: + nullable: true + type: string + nextSnapshotAt: + nullable: true + type: string + observedGeneration: + type: integer + storageLocation: + nullable: true + type: string + summary: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/resourceset.yaml b/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/resourceset.yaml new file mode 100644 index 0000000000..4b71d7ecb0 --- /dev/null +++ b/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/resourceset.yaml @@ -0,0 +1,118 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: resourcesets.resources.cattle.io +spec: + group: resources.cattle.io + names: + kind: ResourceSet + plural: resourcesets + singular: resourceset + scope: Cluster + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + controllerReferences: + items: + properties: + apiVersion: + nullable: true + type: string + name: + nullable: true + type: string + namespace: + nullable: true + type: string + replicas: + type: integer + resource: + nullable: true + type: string + type: object + nullable: true + type: array + resourceSelectors: + items: + properties: + apiVersion: + nullable: true + type: string + excludeKinds: + items: + nullable: true + type: string + nullable: true + type: array + excludeResourceNameRegexp: + nullable: true + type: string + kinds: + items: + nullable: true + type: string + nullable: true + type: array + kindsRegexp: + nullable: true + type: string + labelSelectors: + nullable: true + properties: + matchExpressions: + items: + properties: + key: + nullable: true + type: string + operator: + nullable: true + type: string + values: + items: + nullable: true + type: string + nullable: true + type: array + type: object + nullable: true + type: array + matchLabels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + type: object + namespaceRegexp: + nullable: true + type: string + namespaces: + items: + nullable: true + type: string + nullable: true + type: array + resourceNameRegexp: + nullable: true + type: string + resourceNames: + items: + nullable: true + type: string + nullable: true + type: array + type: object + nullable: true + required: + - apiVersion + type: array + required: + - resourceSelectors + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/restore.yaml b/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/restore.yaml new file mode 100644 index 0000000000..0f39ecf06d --- /dev/null +++ b/charts/rancher-backup-crd/105.0.0+up6.0.0-rc.7/templates/restore.yaml @@ -0,0 +1,122 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: restores.resources.cattle.io +spec: + group: resources.cattle.io + names: + kind: Restore + plural: restores + singular: restore + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .status.backupSource + name: Backup-Source + type: string + - jsonPath: .spec.backupFilename + name: Backup-File + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - jsonPath: .status.conditions[?(@.type=="Ready")].message + name: Status + type: string + name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + backupFilename: + nullable: true + type: string + deleteTimeoutSeconds: + maximum: 10 + type: integer + encryptionConfigSecretName: + nullable: true + type: string + ignoreErrors: + type: boolean + prune: + nullable: true + type: boolean + storageLocation: + nullable: true + properties: + s3: + nullable: true + properties: + bucketName: + nullable: true + type: string + credentialSecretName: + nullable: true + type: string + credentialSecretNamespace: + nullable: true + type: string + endpoint: + nullable: true + type: string + endpointCA: + nullable: true + type: string + folder: + nullable: true + type: string + insecureTLSSkipVerify: + type: boolean + region: + nullable: true + type: string + type: object + type: object + required: + - backupFilename + type: object + status: + properties: + backupSource: + nullable: true + type: string + conditions: + items: + properties: + lastTransitionTime: + nullable: true + type: string + lastUpdateTime: + nullable: true + type: string + message: + nullable: true + type: string + reason: + nullable: true + type: string + status: + nullable: true + type: string + type: + nullable: true + type: string + type: object + nullable: true + type: array + observedGeneration: + type: integer + restoreCompletionTs: + nullable: true + type: string + summary: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/Chart.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/Chart.yaml new file mode 100644 index 0000000000..9fbaea03fd --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/Chart.yaml @@ -0,0 +1,26 @@ +annotations: + catalog.cattle.io/auto-install: rancher-backup-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/display-name: Rancher Backups + catalog.cattle.io/kube-version: '>= 1.28.0-0 < 1.32.0-0' + catalog.cattle.io/namespace: cattle-resources-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: resources.cattle.io.resourceset/v1 + catalog.cattle.io/rancher-version: '>= 2.10.0-0 < 2.11.0-0' + catalog.cattle.io/release-name: rancher-backup + catalog.cattle.io/scope: management + catalog.cattle.io/type: cluster-tool + catalog.cattle.io/ui-component: rancher-backup + catalog.cattle.io/upstream-version: 6.0.0-rc.7 +apiVersion: v2 +appVersion: 6.0.0-rc.7 +description: Provides ability to back up and restore the Rancher application running + on any Kubernetes cluster +icon: https://charts.rancher.io/assets/logos/backup-restore.svg +keywords: +- applications +- infrastructure +kubeVersion: '>= 1.28.0-0' +name: rancher-backup +version: 105.0.0+up6.0.0-rc.7 diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/README.md b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/README.md new file mode 100644 index 0000000000..59bff44256 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/README.md @@ -0,0 +1,79 @@ +# Rancher Backup + +This chart provides ability to back up and restore the Rancher application running on any Kubernetes cluster. + +Refer [this](https://github.com/rancher/backup-restore-operator) repository for implementation details. + +----- + +### Get Repo Info +```bash +helm repo add rancher-chart https://charts.rancher.io +helm repo update +``` + +----- + +### Install Chart +```bash +helm install rancher-backup-crd rancher-chart/rancher-backup-crd -n cattle-resources-system --create-namespace +helm install rancher-backup rancher-chart/rancher-backup -n cattle-resources-system +``` + +----- + +### Configuration +The following table lists the configurable parameters of the rancher-backup chart and their default values: + +| Parameter | Description | Default | +|----------|---------------|-------| +| image.repository | Container image repository | rancher/backup-restore-operator | +| image.tag | Container image tag | v0.1.0-rc1 | +| s3.enabled | Configure S3 compatible default storage location. Current version supports S3 and MinIO | false | +| s3.credentialSecretName | Name of the Secret containing S3 credentials. This is an optional field. Skip this field in order to use IAM Role authentication. The Secret must contain following two keys, `accessKey` and `secretKey` | "" | +| s3.credentialSecretNamespace | Namespace of the Secret containing S3 credentials. This can be any namespace. | "" | +| s3.region | Region of the S3 Bucket (Required for S3, not valid for MinIO) | "" | +| s3.bucketName | Name of the Bucket | "" | +| s3.folder | Base folder within the Bucket (optional) | "" | +| s3.endpoint | Endpoint for the S3 storage provider | "" | +| s3.endpointCA | Base64 encoded CA cert for the S3 storage provider (optional) | "" | +| s3.insecureTLSSkipVerify | Skip SSL verification | false | +| persistence.enabled | Configure a Persistent Volume as the default storage location. It accepts either a StorageClass name to create a PVC, or directly accepts the PV to use. The Persistent Volume is mounted at `/var/lib/backups` in the operator pod | false | +| persistence.storageClass | StorageClass to use for dynamically provisioning the Persistent Volume, which will be used for storing backups | "" | +| persistence.volumeName | Persistent Volume to use for storing backups | "" | +| persistence.size | Requested size of the Persistent Volume (Applicable when using dynamic provisioning) | "" | +| debug | Set debug flag for backup-restore deployment | false | +| trace | Set trace flag for backup-restore deployment | false | +| nodeSelector | https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector | {} | +| tolerations | https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration | [] | +| affinity | https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity | {} | +| serviceAccount.annotations | Annotations to apply to created service account | {} | +| global.cattle.psp.enabled | Enable or disable PSPs in the chart | false | + +----- + +### PSPs + +We have added a configuration to the chart `values.yaml` which allows you to enable or disable PSPs to align with the PSP deprecation in Kubernetes `v1.25` and above. + +----- + +### CRDs + +Refer [this](https://github.com/rancher/backup-restore-operator#crds) section for information on CRDs that this chart installs. Also refer [this](https://github.com/rancher/backup-restore-operator/tree/master/examples) folder containing sample manifests for the CRDs. + +----- +### Upgrading Chart +```bash +helm upgrade rancher-backup-crd -n cattle-resources-system +helm upgrade rancher-backup -n cattle-resources-system +``` + +----- +### Uninstall Chart + +```bash +helm uninstall rancher-backup -n cattle-resources-system +helm uninstall rancher-backup-crd -n cattle-resources-system +``` + diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/app-readme.md b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/app-readme.md new file mode 100644 index 0000000000..b1406d5ee3 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/app-readme.md @@ -0,0 +1,33 @@ +# Rancher Backup + +This chart enables ability to capture backups of the Rancher application and restore from these backups. This chart can be used to migrate Rancher from one Kubernetes cluster to a different Kubernetes cluster. + +For more information on how to use the feature, refer to our [docs](https://ranchermanager.docs.rancher.com/pages-for-subheaders/backup-restore-and-disaster-recovery). + +This chart installs the following components: + +- [backup-restore-operator](https://github.com/rancher/backup-restore-operator) + - The operator handles backing up all Kubernetes resources and CRDs that Rancher creates and manages from the local cluster. It gathers these resources by querying the Kubernetes API server, packages all the resources to create a tarball file and saves it in the configured backup storage location. + - The operator can be configured to store backups in S3-compatible object stores such as AWS S3 and MinIO, and in persistent volumes. During deployment, you can create a default storage location, but there is always the option to override the default storage location with each backup, but will be limited to using an S3-compatible object store. + - It preserves the ownerReferences on all resources, hence maintaining dependencies between objects. + - This operator provides encryption support, to encrypt user specified resources before saving them in the backup file. It uses the same encryption configuration that is used to enable [Kubernetes Encryption at Rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/). +- Backup - A backup is a CRD (`Backup`) that defines when to take backups, where to store the backup and what encryption to use (optional). Backups can be taken ad hoc or scheduled to be taken in intervals. +- Restore - A restore is a CRD (`Restore`) that defines which backup to use to restore the Rancher application to. + +## Upgrading to Kubernetes v1.25+ + ​ +Starting in Kubernetes v1.25, [Pod Security Policies](https://kubernetes.io/docs/concepts/security/pod-security-policy/) have been removed from the Kubernetes API. + ​ +As a result, **before upgrading to Kubernetes v1.25** (or on a fresh install in a Kubernetes v1.25+ cluster), users are expected to perform an in-place upgrade of this chart with `global.cattle.psp.enabled` set to `false` if it has been previously set to `true`. +​ +> **Note:** +> In this chart release, any previous field that was associated with any PSP resources have been removed in favor of a single global field: `global.cattle.psp.enabled`. + ​ +> **Note:** +> If you upgrade your cluster to Kubernetes v1.25+ before removing PSPs via a `helm upgrade` (even if you manually clean up resources), **it will leave the Helm release in a broken state within the cluster such that further Helm operations will not work (`helm uninstall`, `helm upgrade`, etc.).** +> +> If your charts get stuck in this state, please consult the Rancher docs on how to clean up your Helm release secrets. +​ +Upon setting `global.cattle.psp.enabled` to false, the chart will remove any PSP resources deployed on its behalf from the cluster. This is the default setting for this chart. +​ +As a replacement for PSPs, [Pod Security Admission](https://kubernetes.io/docs/concepts/security/pod-security-admission/) should be used. Please consult the Rancher docs for more details on how to configure your chart release namespaces to work with the new Pod Security Admission and apply Pod Security Standards. diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/aks.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/aks.yaml new file mode 100644 index 0000000000..7797420589 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/aks.yaml @@ -0,0 +1,25 @@ +- apiVersion: "apiextensions.k8s.io/v1" + kindsRegexp: "." + resourceNameRegexp: "aks.cattle.io$" +- apiVersion: "aks.cattle.io/v1" + kindsRegexp: "." +- apiVersion: "apps/v1" + kindsRegexp: "^deployments$" + namespaces: + - "cattle-system" + resourceNames: + - "aks-config-operator" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterroles$" + resourceNames: + - "aks-operator" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterrolebindings$" + resourceNames: + - "aks-operator" +- apiVersion: "v1" + kindsRegexp: "^serviceaccounts$" + namespaces: + - "cattle-system" + resourceNames: + - "aks-operator" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/eks.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/eks.yaml new file mode 100644 index 0000000000..ae57baddf4 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/eks.yaml @@ -0,0 +1,17 @@ +- apiVersion: "eks.cattle.io/v1" + kindsRegexp: "." +- apiVersion: "apps/v1" + kindsRegexp: "^deployments$" + resourceNames: + - "eks-config-operator" +- apiVersion: "apiextensions.k8s.io/v1" + kindsRegexp: "." + resourceNameRegexp: "eks.cattle.io$" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterroles$" + resourceNames: + - "eks-operator" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterrolebindings$" + resourceNames: + - "eks-operator" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/elemental.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/elemental.yaml new file mode 100644 index 0000000000..1d38b1229c --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/elemental.yaml @@ -0,0 +1,49 @@ +- apiVersion: "apiextensions.k8s.io/v1" + kindsRegexp: "." + resourceNameRegexp: "elemental.cattle.io$" +- apiVersion: "apps/v1" + kindsRegexp: "^deployments$" + namespaces: + - "cattle-elemental-system" + resourceNames: + - "elemental-operator" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterroles$" + resourceNames: + - "elemental-operator" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterrolebindings$" + resourceNames: + - "elemental-operator" +- apiVersion: "v1" + kindsRegexp: "^serviceaccounts$" + namespaces: + - "cattle-elemental-system" + resourceNames: + - "elemental-operator" +- apiVersion: "management.cattle.io/v3" + kindsRegexp: "^globalrole$" + resourceNames: + - "elemental-operator" +- apiVersion: "management.cattle.io/v3" + kindsRegexp: "^apiservice$" + resourceNameRegexp: "elemental.cattle.io$" +- apiVersion: "elemental.cattle.io/v1beta1" + kindsRegexp: "." + namespaceRegexp: "^cattle-fleet-|^fleet-" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^roles$|^rolebindings$" + labelSelectors: + matchExpressions: + - key: "elemental.cattle.io/managed" + operator: "In" + values: ["true"] + namespaceRegexp: "^cattle-fleet-|^fleet-" +- apiVersion: "v1" + kindsRegexp: "^secrets$|^serviceaccounts$" + labelSelectors: + matchExpressions: + - key: "elemental.cattle.io/managed" + operator: "In" + values: ["true"] + namespaceRegexp: "^cattle-fleet-|^fleet-" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/fleet.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/fleet.yaml new file mode 100644 index 0000000000..7909be6375 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/fleet.yaml @@ -0,0 +1,60 @@ +- apiVersion: "v1" + kindsRegexp: "^namespaces$" + resourceNameRegexp: "^fleet-" +- apiVersion: "v1" + kindsRegexp: "^namespaces$" + labelSelectors: + matchExpressions: + - key: "app.kubernetes.io/managed-by" + operator: "In" + values: ["rancher"] +- apiVersion: "v1" + kindsRegexp: "^secrets$" + namespaceRegexp: "^cattle-fleet-|^fleet-" + excludeResourceNameRegexp: "^import-token" + labelSelectors: + matchExpressions: + - key: "owner" + operator: "NotIn" + values: ["helm"] + - key: "fleet.cattle.io/managed" + operator: "In" + values: ["true"] +- apiVersion: "v1" + kindsRegexp: "^serviceaccounts$" + namespaceRegexp: "^cattle-fleet-|^fleet-" + excludeResourceNameRegexp: "^default$" +- apiVersion: "v1" + kindsRegexp: "^configmaps$" + namespaceRegexp: "^cattle-fleet-|^fleet-" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^roles$|^rolebindings$" + namespaceRegexp: "^cattle-fleet-|^fleet-" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterrolebindings$" + resourceNameRegexp: "^fleet-|^gitjob-" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterroles$" + resourceNameRegexp: "^fleet-" + resourceNames: + - "gitjob" +- apiVersion: "apiextensions.k8s.io/v1" + kindsRegexp: "." + resourceNameRegexp: "fleet.cattle.io$|gitjob.cattle.io$" +- apiVersion: "fleet.cattle.io/v1alpha1" + kindsRegexp: "." + excludeKinds: + - "bundledeployments" +- apiVersion: "gitjob.cattle.io/v1" + kindsRegexp: "." +- apiVersion: "apps/v1" + kindsRegexp: "^deployments$" + namespaceRegexp: "^cattle-fleet-|^fleet-" + resourceNameRegexp: "^fleet-" + resourceNames: + - "gitjob" +- apiVersion: "apps/v1" + kindsRegexp: "^services$" + namespaceRegexp: "^cattle-fleet-|^fleet-" + resourceNames: + - "gitjob" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/gke.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/gke.yaml new file mode 100644 index 0000000000..a87eef3645 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/gke.yaml @@ -0,0 +1,17 @@ +- apiVersion: "apiextensions.k8s.io/v1" + kindsRegexp: "." + resourceNameRegexp: "gke.cattle.io$" +- apiVersion: "gke.cattle.io/v1" + kindsRegexp: "." +- apiVersion: "apps/v1" + kindsRegexp: "^deployments$" + resourceNames: + - "gke-config-operator" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterroles$" + resourceNames: + - "gke-operator" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterrolebindings$" + resourceNames: + - "gke-operator" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/provisioningv2.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/provisioningv2.yaml new file mode 100644 index 0000000000..e250d423ff --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/provisioningv2.yaml @@ -0,0 +1,23 @@ +- apiVersion: "apiextensions.k8s.io/v1" + kindsRegexp: "." + resourceNameRegexp: "provisioning.cattle.io$|rke-machine-config.cattle.io$|rke-machine.cattle.io$|rke.cattle.io$|cluster.x-k8s.io$" +- apiVersion: "provisioning.cattle.io/v1" + kindsRegexp: "." +- apiVersion: "rke-machine-config.cattle.io/v1" + kindsRegexp: "." +- apiVersion: "rke-machine.cattle.io/v1" + kindsRegexp: "." +- apiVersion: "rke.cattle.io/v1" + kindsRegexp: "." +- apiVersion: "cluster.x-k8s.io/v1beta1" + kindsRegexp: "." +- apiVersion: "v1" + kindsRegexp: "^secrets$" + resourceNameRegexp: "machine-plan$|rke-state$|machine-state$|machine-driver-secret$|machine-provision$|^harvesterconfig|^registryconfig-auth" + namespaces: + - "fleet-default" +- apiVersion: "v1" + kindsRegexp: "^configmaps$" + resourceNames: + - "provisioning-log" + namespaceRegexp: "^c-m-" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/rancher-operator.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/rancher-operator.yaml new file mode 100644 index 0000000000..f30c2fd96d --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/rancher-operator.yaml @@ -0,0 +1,28 @@ +- apiVersion: "rancher.cattle.io/v1" + kindsRegexp: "." +- apiVersion: "apps/v1" + kindsRegexp: "^deployments$" + resourceNames: + - "rancher-operator" + namespaces: + - "rancher-operator-system" +- apiVersion: "v1" + kindsRegexp: "^serviceaccounts$" + namespaces: + - "rancher-operator-system" + excludeResourceNameRegexp: "^default$" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterrolebindings$" + resourceNames: + - "rancher-operator" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterroles$" + resourceNames: + - "rancher-operator" +- apiVersion: "apiextensions.k8s.io/v1" + kindsRegexp: "." + resourceNameRegexp: "rancher.cattle.io$" +- apiVersion: "v1" + kindsRegexp: "^namespaces$" + resourceNames: + - "rancher-operator-system" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/rancher.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/rancher.yaml new file mode 100644 index 0000000000..070bd8ec94 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/files/default-resourceset-contents/rancher.yaml @@ -0,0 +1,69 @@ +- apiVersion: "v1" + kindsRegexp: "^namespaces$" + resourceNameRegexp: "^cattle-|^p-|^c-|^user-|^u-" + resourceNames: + - "local" +- apiVersion: "v1" + kindsRegexp: "^secrets$" + namespaceRegexp: "^cattle-|^p-|^c-|^local$|^user-|^u-" + labelSelectors: + matchExpressions: + - key: "owner" + operator: "NotIn" + values: ["helm"] + excludeResourceNameRegexp: "^bootstrap-secret$|^rancher-csp-adapter|^csp-adapter-cache$" +- apiVersion: "v1" + kindsRegexp: "^serviceaccounts$" + namespaceRegexp: "^cattle-|^p-|^c-|^local$|^user-|^u-" + excludeResourceNameRegexp: "^default$|^rancher-csp-adapter$" +- apiVersion: "v1" + kindsRegexp: "^configmaps$" + namespaces: + - "cattle-system" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^roles$|^rolebindings$" + namespaceRegexp: "^cattle-|^p-|^c-|^local$|^user-|^u-" + excludeResourceNameRegexp: "^rancher-csp-adapter" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterrolebindings$" + resourceNameRegexp: "^cattle-|^clusterrolebinding-|^globaladmin-user-|^grb-u-|^crb-" +- apiVersion: "rbac.authorization.k8s.io/v1" + kindsRegexp: "^clusterroles$" + resourceNameRegexp: "^cattle-|^p-|^c-|^local-|^user-|^u-|^project-|^create-ns$" + excludeResourceNameRegexp: "^rancher-csp-adapter-" +- apiVersion: "scheduling.k8s.io/v1" + kindsRegexp: "^priorityclasses$" + resourceNameRegexp: "^rancher-critical$" +- apiVersion: "apiextensions.k8s.io/v1" + kindsRegexp: "." + resourceNameRegexp: "management.cattle.io$|project.cattle.io$|catalog.cattle.io$|resources.cattle.io$" +- apiVersion: "management.cattle.io/v3" + kindsRegexp: "." + excludeKinds: + - "tokens" + - "rancherusernotifications" +- apiVersion: "management.cattle.io/v3" + kindsRegexp: "^tokens$" + labelSelectors: + matchExpressions: + - key: "authn.management.cattle.io/kind" + operator: "NotIn" + values: [ "provisioning" ] +- apiVersion: "project.cattle.io/v3" + kindsRegexp: "." +- apiVersion: "catalog.cattle.io/v1" + kindsRegexp: "^clusterrepos$" +- apiVersion: "resources.cattle.io/v1" + kindsRegexp: "^ResourceSet$" +- apiVersion: "v1" + kindsRegexp: "^secrets$" + namespaceRegexp: "^.*$" + labelSelectors: + matchExpressions: + - key: "resources.cattle.io/backup" + operator: "In" + values: ["true"] +- apiVersion: catalog.cattle.io/v1 + kindsRegexp: ^UIPlugin$ + namespaces: + - cattle-ui-plugin-system diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/_helpers.tpl b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/_helpers.tpl new file mode 100644 index 0000000000..a5e4852439 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/_helpers.tpl @@ -0,0 +1,87 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}} +beta.kubernetes.io/os: linux +{{- else -}} +kubernetes.io/os: linux +{{- end -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +*/}} +{{- define "backupRestore.fullname" -}} +{{- .Chart.Name | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "backupRestore.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Common labels +*/}} +{{- define "backupRestore.labels" -}} +helm.sh/chart: {{ include "backupRestore.chart" . }} +{{ include "backupRestore.selectorLabels" . }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- end }} + +{{/* +Selector labels +*/}} +{{- define "backupRestore.selectorLabels" -}} +app.kubernetes.io/name: {{ include "backupRestore.fullname" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +resources.cattle.io/operator: backup-restore +{{- end }} + + +{{/* +Create the name of the service account to use +*/}} +{{- define "backupRestore.serviceAccountName" -}} +{{ include "backupRestore.fullname" . }} +{{- end }} + + +{{- define "backupRestore.s3SecretName" -}} +{{- printf "%s-%s" .Chart.Name "s3" | replace "+" "_" | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Create PVC name using release and revision number, unless a volumeName is given. +*/}} +{{- define "backupRestore.pvcName" -}} +{{- if and .Values.persistence.volumeName }} +{{- printf "%s" .Values.persistence.volumeName }} +{{- else -}} +{{- printf "%s-%d" .Release.Name .Release.Revision }} +{{- end }} +{{- end }} + diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/clusterrolebinding.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/clusterrolebinding.yaml new file mode 100644 index 0000000000..cf4abf6703 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/clusterrolebinding.yaml @@ -0,0 +1,14 @@ +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: {{ include "backupRestore.fullname" . }} + labels: + {{- include "backupRestore.labels" . | nindent 4 }} +subjects: +- kind: ServiceAccount + name: {{ include "backupRestore.serviceAccountName" . }} + namespace: {{ .Release.Namespace }} +roleRef: + kind: ClusterRole + name: cluster-admin + apiGroup: rbac.authorization.k8s.io diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/deployment.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/deployment.yaml new file mode 100644 index 0000000000..631fa458b8 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/deployment.yaml @@ -0,0 +1,79 @@ +{{- if and .Values.s3.enabled .Values.persistence.enabled }} +{{- fail "\n\nCannot configure both s3 and PV for storing backups" }} +{{- end }} +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ include "backupRestore.fullname" . }} + namespace: {{ .Release.Namespace }} + labels: + {{- include "backupRestore.labels" . | nindent 4 }} +spec: + selector: + matchLabels: + {{- include "backupRestore.selectorLabels" . | nindent 6 }} + template: + metadata: + labels: + {{- include "backupRestore.selectorLabels" . | nindent 8 }} + annotations: + checksum/s3: {{ include (print $.Template.BasePath "/s3-secret.yaml") . | sha256sum }} + checksum/pvc: {{ include (print $.Template.BasePath "/pvc.yaml") . | sha256sum }} + spec: + serviceAccountName: {{ include "backupRestore.serviceAccountName" . }} + {{- if .Values.imagePullSecrets }} + imagePullSecrets: + {{ toYaml .Values.imagePullSecrets | indent 6 }} + {{- end }} + {{- if .Values.priorityClassName }} + priorityClassName: {{ .Values.priorityClassName }} + {{- end }} + containers: + - name: {{ .Chart.Name }} + image: {{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} + imagePullPolicy: {{ default "Always" .Values.imagePullPolicy }} + args: +{{- if .Values.debug }} + - "--debug" +{{- end }} +{{- if .Values.trace }} + - "--trace" +{{- end }} + env: + - name: CHART_NAMESPACE + value: {{ .Release.Namespace }} + {{- if .Values.s3.enabled }} + - name: DEFAULT_S3_BACKUP_STORAGE_LOCATION + value: {{ include "backupRestore.s3SecretName" . }} + {{- end }} + {{- if .Values.proxy }} + - name: HTTP_PROXY + value: {{ .Values.proxy }} + - name: HTTPS_PROXY + value: {{ .Values.proxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} + {{- end }} + {{- if .Values.persistence.enabled }} + - name: DEFAULT_PERSISTENCE_ENABLED + value: "persistence-enabled" + volumeMounts: + - mountPath: "/var/lib/backups" + name: pv-storage + volumes: + - name: pv-storage + persistentVolumeClaim: + claimName: {{ include "backupRestore.pvcName" . }} + {{- end }} + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/hardened.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/hardened.yaml new file mode 100644 index 0000000000..bf8492ce0b --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/hardened.yaml @@ -0,0 +1,124 @@ +apiVersion: batch/v1 +kind: Job +metadata: + name: {{ include "backupRestore.fullname" . }}-patch-sa + namespace: {{ .Release.Namespace }} + labels: {{ include "backupRestore.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +spec: + backoffLimit: 1 + template: + spec: + serviceAccountName: {{ include "backupRestore.fullname" . }}-patch-sa + securityContext: + runAsNonRoot: true + runAsUser: 1000 + restartPolicy: Never + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + containers: + - name: {{ include "backupRestore.fullname" . }}-patch-sa + image: {{ include "system_default_registry" . }}{{ .Values.global.kubectl.repository }}:{{ .Values.global.kubectl.tag }} + imagePullPolicy: IfNotPresent + command: ["kubectl", "-n", {{ .Release.Namespace | quote }}, "patch", "serviceaccount", "default", "-p", "{\"automountServiceAccountToken\": false}"] +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "backupRestore.fullname" . }}-patch-sa + namespace: {{ .Release.Namespace }} + labels: {{ include "backupRestore.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ include "backupRestore.fullname" . }}-patch-sa + labels: {{ include "backupRestore.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +rules: + - apiGroups: [""] + resources: ["serviceaccounts"] + verbs: ["get", "patch"] +{{- if .Values.global.cattle.psp.enabled}} + - apiGroups: ["policy"] + resources: ["podsecuritypolicies"] + verbs: ["use"] + resourceNames: + - {{ include "backupRestore.fullname" . }}-patch-sa +{{- end}} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: {{ include "backupRestore.fullname" . }}-patch-sa + labels: {{ include "backupRestore.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: {{ include "backupRestore.fullname" . }}-patch-sa +subjects: + - kind: ServiceAccount + name: {{ include "backupRestore.fullname" . }}-patch-sa + namespace: {{ .Release.Namespace }} +--- +{{- if .Values.global.cattle.psp.enabled}} +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + name: {{ include "backupRestore.fullname" . }}-patch-sa + labels: {{ include "backupRestore.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +spec: + privileged: false + hostNetwork: false + hostIPC: false + hostPID: false + runAsUser: + rule: 'MustRunAsNonRoot' + seLinux: + rule: 'RunAsAny' + supplementalGroups: + rule: 'MustRunAs' + ranges: + - min: 1 + max: 65535 + fsGroup: + rule: 'MustRunAs' + ranges: + - min: 1 + max: 65535 + readOnlyRootFilesystem: false + volumes: + - 'secret' +{{- end}} +--- +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + name: {{ include "backupRestore.fullname" . }}-default-allow-all + namespace: {{ .Release.Namespace }} +spec: + podSelector: {} + egress: + - {} + policyTypes: + - Ingress + - Egress diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/psp.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/psp.yaml new file mode 100644 index 0000000000..34bc96ee72 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/psp.yaml @@ -0,0 +1,31 @@ +{{- if .Values.global.cattle.psp.enabled -}} +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + name: {{ include "backupRestore.fullname" . }}-psp + labels: {{ include "backupRestore.labels" . | nindent 4 }} +spec: + privileged: false + allowPrivilegeEscalation: false + hostNetwork: false + hostIPC: false + hostPID: false + runAsUser: + rule: 'MustRunAsNonRoot' + seLinux: + rule: 'RunAsAny' + supplementalGroups: + rule: 'MustRunAs' + ranges: + - min: 1 + max: 65535 + fsGroup: + rule: 'MustRunAs' + ranges: + - min: 1 + max: 65535 + readOnlyRootFilesystem: false + volumes: + - 'persistentVolumeClaim' + - 'secret' +{{- end -}} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/pvc.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/pvc.yaml new file mode 100644 index 0000000000..ff57e4dabd --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/pvc.yaml @@ -0,0 +1,27 @@ +{{- if and .Values.persistence.enabled -}} +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: {{ include "backupRestore.pvcName" . }} + namespace: {{ .Release.Namespace }} + labels: + {{- include "backupRestore.labels" . | nindent 4 }} +spec: + accessModes: + - ReadWriteOnce + resources: + {{- with .Values.persistence }} + requests: + storage: {{ .size | quote }} +{{- if .storageClass }} +{{- if (eq "-" .storageClass) }} + storageClassName: "" +{{- else }} + storageClassName: {{ .storageClass | quote }} +{{- end }} +{{- end }} +{{- if .volumeName }} + volumeName: {{ .volumeName | quote }} +{{- end }} +{{- end }} +{{- end }} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/rancher-resourceset.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/rancher-resourceset.yaml new file mode 100644 index 0000000000..05add88245 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/rancher-resourceset.yaml @@ -0,0 +1,13 @@ +apiVersion: resources.cattle.io/v1 +kind: ResourceSet +metadata: + name: rancher-resource-set +controllerReferences: + - apiVersion: "apps/v1" + resource: "deployments" + name: "rancher" + namespace: "cattle-system" +resourceSelectors: +{{- range $path, $_ := .Files.Glob "files/default-resourceset-contents/*.yaml" -}} + {{- $.Files.Get $path | nindent 2 -}} +{{- end -}} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/s3-secret.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/s3-secret.yaml new file mode 100644 index 0000000000..7265097307 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/s3-secret.yaml @@ -0,0 +1,31 @@ +{{- if .Values.s3.enabled -}} +apiVersion: v1 +kind: Secret +metadata: + name: {{ include "backupRestore.s3SecretName" . }} + namespace: {{ .Release.Namespace }} + labels: + {{- include "backupRestore.labels" . | nindent 4 }} +type: Opaque +stringData: + {{- with .Values.s3 }} + {{- if .credentialSecretName }} + credentialSecretName: {{ .credentialSecretName }} + credentialSecretNamespace: {{ required "When providing a Secret containing S3 credentials, a valid .Values.credentialSecretNamespace must be provided" .credentialSecretNamespace }} + {{- end }} + {{- if .region }} + region: {{ .region | quote }} + {{- end }} + bucketName: {{ required "A valid .Values.bucketName is required for configuring S3 compatible storage as the default backup storage location" .bucketName | quote }} + {{- if .folder }} + folder: {{ .folder | quote }} + {{- end }} + endpoint: {{ required "A valid .Values.endpoint is required for configuring S3 compatible storage as the default backup storage location" .endpoint | quote }} + {{- if .endpointCA }} + endpointCA: {{ .endpointCA }} + {{- end }} + {{- if .insecureTLSSkipVerify }} + insecureTLSSkipVerify: {{ .insecureTLSSkipVerify | quote }} + {{- end }} + {{- end }} +{{ end }} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/serviceaccount.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/serviceaccount.yaml new file mode 100644 index 0000000000..754e1fe89e --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/serviceaccount.yaml @@ -0,0 +1,11 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "backupRestore.serviceAccountName" . }} + namespace: {{ .Release.Namespace }} + labels: + {{- include "backupRestore.labels" . | nindent 4 }} +{{- if .Values.serviceAccount.annotations }} + annotations: + {{- toYaml .Values.serviceAccount.annotations | nindent 4 }} +{{- end }} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/validate-install-crd.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/validate-install-crd.yaml new file mode 100644 index 0000000000..f63fd2e2e2 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/validate-install-crd.yaml @@ -0,0 +1,16 @@ +#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}} +# {{- $found := dict -}} +# {{- set $found "resources.cattle.io/v1/Backup" false -}} +# {{- set $found "resources.cattle.io/v1/ResourceSet" false -}} +# {{- set $found "resources.cattle.io/v1/Restore" false -}} +# {{- range .Capabilities.APIVersions -}} +# {{- if hasKey $found (toString .) -}} +# {{- set $found (toString .) true -}} +# {{- end -}} +# {{- end -}} +# {{- range $_, $exists := $found -}} +# {{- if (eq $exists false) -}} +# {{- required "Required CRDs are missing. Please install the corresponding CRD chart before installing this chart." "" -}} +# {{- end -}} +# {{- end -}} +#{{- end -}} \ No newline at end of file diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/validate-psp-install.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/validate-psp-install.yaml new file mode 100644 index 0000000000..a30c59d3b7 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/templates/validate-psp-install.yaml @@ -0,0 +1,7 @@ +#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}} +#{{- if .Values.global.cattle.psp.enabled }} +#{{- if not (.Capabilities.APIVersions.Has "policy/v1beta1/PodSecurityPolicy") }} +#{{- fail "The target cluster does not have the PodSecurityPolicy API resource. Please disable PSPs in this chart before proceeding." -}} +#{{- end }} +#{{- end }} +#{{- end }} diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/deployment_test.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/deployment_test.yaml new file mode 100644 index 0000000000..671d415db0 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/deployment_test.yaml @@ -0,0 +1,216 @@ +suite: Test Deployment +templates: +- deployment.yaml +- s3-secret.yaml +- pvc.yaml +- _helpers.tpl +tests: +- it: should set name + template: deployment.yaml + asserts: + - equal: + path: metadata.name + value: "rancher-backup" +- it: should set namespace + template: deployment.yaml + asserts: + - equal: + path: metadata.namespace + value: "NAMESPACE" +- it: should set priorityClassName + set: + priorityClassName: "testClass" + template: deployment.yaml + asserts: + - equal: + path: spec.template.spec.priorityClassName + value: "testClass" +- it: should set default imagePullPolicy + template: deployment.yaml + asserts: + - equal: + path: spec.template.spec.containers[0].imagePullPolicy + value: "Always" +- it: should set imagePullPolicy + set: + imagePullPolicy: "IfNotPresent" + template: deployment.yaml + asserts: + - equal: + path: spec.template.spec.containers[0].imagePullPolicy + value: "IfNotPresent" +- it: should set debug loglevel + set: + debug: true + template: deployment.yaml + asserts: + - contains: + path: spec.template.spec.containers[0].args + content: "--debug" +- it: should set trace loglevel + set: + trace: true + template: deployment.yaml + asserts: + - contains: + path: spec.template.spec.containers[0].args + content: "--trace" +- it: should set proxy environment variables + set: + proxy: "https://127.0.0.1:3128" + template: deployment.yaml + asserts: + - contains: + path: spec.template.spec.containers[0].env + content: + name: HTTP_PROXY + value: "https://127.0.0.1:3128" + - contains: + path: spec.template.spec.containers[0].env + content: + name: HTTPS_PROXY + value: "https://127.0.0.1:3128" + - contains: + path: spec.template.spec.containers[0].env + content: + name: NO_PROXY + value: "127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.svc,.cluster.local" +- it: should set proxy environment variables with modified noproxy + set: + proxy: "https://127.0.0.1:3128" + noProxy: "192.168.0.0/24" + template: deployment.yaml + asserts: + - contains: + path: spec.template.spec.containers[0].env + content: + name: NO_PROXY + value: "192.168.0.0/24" +- it: should set persistence variables + set: + persistence.enabled: true + template: deployment.yaml + asserts: + - contains: + path: spec.template.spec.containers[0].env + content: + name: DEFAULT_PERSISTENCE_ENABLED + value: "persistence-enabled" + - contains: + path: spec.template.spec.containers[0].volumeMounts + content: + mountPath: "/var/lib/backups" + name: "pv-storage" + - equal: + path: spec.template.spec.volumes[0].name + value: "pv-storage" + - equal: + path: spec.template.spec.volumes[0].persistentVolumeClaim + value: + claimName: RELEASE-NAME-0 +- it: should set claim from custom static volumeName + set: + persistence.enabled: true + persistence.volumeName: "PREDEFINED-VOLUME" + persistence.storageClass: "PREDEFINED-STORAGECLASS" + persistence.size: "PREDIFINED-SAMEAS-PVSIZE" + template: deployment.yaml + asserts: + - contains: + path: spec.template.spec.containers[0].env + content: + name: DEFAULT_PERSISTENCE_ENABLED + value: "persistence-enabled" + - equal: + path: spec.template.spec.volumes[0].persistentVolumeClaim + value: + claimName: PREDEFINED-VOLUME +- it: should set private registry + template: deployment.yaml + set: + global.cattle.systemDefaultRegistry: "my.registry.local:3000" + asserts: + - matchRegex: + path: spec.template.spec.containers[0].image + pattern: ^my.registry.local:3000/rancher/backup-restore-operator:.*$ +- it: should set nodeselector + template: deployment.yaml + asserts: + - equal: + path: spec.template.spec.nodeSelector + value: + kubernetes.io/os: linux +- it: should not set default affinity + template: deployment.yaml + asserts: + - isNull: + path: spec.template.spec.affinity +- it: should set custom affinity + template: deployment.yaml + set: + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + - key: disktype + operator: In + values: + - ssd + asserts: + - equal: + path: spec.template.spec.affinity + value: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + - key: disktype + operator: In + values: + - ssd +- it: should set tolerations + template: deployment.yaml + asserts: + - equal: + path: spec.template.spec.tolerations[0] + value: + key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +- it: should set custom tolerations + template: deployment.yaml + set: + tolerations: + - key: "example-key" + operator: "Exists" + effect: "NoSchedule" + asserts: + - equal: + path: spec.template.spec.tolerations[0] + value: + key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" + - equal: + path: spec.template.spec.tolerations[1] + value: + key: "example-key" + operator: "Exists" + effect: "NoSchedule" +- it: should not set default imagePullSecrets + template: deployment.yaml + asserts: + - isNull: + path: spec.template.spec.imagePullSecrets +- it: should set imagePullSecrets + set: + imagePullSecrets: + - name: "pull-secret" + template: deployment.yaml + asserts: + - equal: + path: spec.template.spec.imagePullSecrets[0].name + value: "pull-secret" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/pvc_test.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/pvc_test.yaml new file mode 100644 index 0000000000..3a1c40698f --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/pvc_test.yaml @@ -0,0 +1,102 @@ +suite: Test PVC +templates: +- pvc.yaml +- _helpers.tpl +tests: +- it: should set name + template: pvc.yaml + set: + persistence: + enabled: true + asserts: + - equal: + path: metadata.name + value: "RELEASE-NAME-0" +- it: should set namespace + template: pvc.yaml + set: + persistence: + enabled: true + asserts: + - equal: + path: metadata.namespace + value: "NAMESPACE" +- it: should set accessModes + template: pvc.yaml + set: + persistence: + enabled: true + asserts: + - equal: + path: spec.accessModes[0] + value: "ReadWriteOnce" +- it: should set size + template: pvc.yaml + set: + persistence: + enabled: true + asserts: + - equal: + path: spec.resources.requests.storage + value: "2Gi" +- it: should set size + template: pvc.yaml + set: + persistence: + enabled: true + size: "10Gi" + asserts: + - equal: + path: spec.resources.requests.storage + value: "10Gi" +- it: should not set volumeName + template: pvc.yaml + set: + persistence: + enabled: true + asserts: + - isNull: + path: spec.volumeName +- it: should set default storageClass + template: pvc.yaml + set: + persistence: + enabled: true + asserts: + - equal: + path: spec.storageClassName + value: "" +- it: should set custom storageClass + template: pvc.yaml + set: + persistence: + enabled: true + storageClass: "storage-class" + asserts: + - equal: + path: spec.storageClassName + value: "storage-class" +- it: should set custom volumeName + template: pvc.yaml + set: + persistence: + enabled: true + volumeName: "volume-name" + asserts: + - equal: + path: spec.volumeName + value: "volume-name" +- it: should set claim from custom static volumeName + set: + persistence.enabled: true + persistence.volumeName: "PREDEFINED-VOLUME" + persistence.storageClass: "PREDEFINED-STORAGECLASS" + persistence.size: "PREDEFINED-SAMEAS-PVSIZE" + template: pvc.yaml + asserts: + - equal: + path: spec.resources.requests.storage + value: "PREDEFINED-SAMEAS-PVSIZE" + - equal: + path: spec.storageClassName + value: "PREDEFINED-STORAGECLASS" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/s3-secret_test.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/s3-secret_test.yaml new file mode 100644 index 0000000000..af130dd293 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/tests/s3-secret_test.yaml @@ -0,0 +1,141 @@ +suite: Test S3 Secret +templates: +- s3-secret.yaml +- _helpers.tpl +tests: +- it: should set name + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + asserts: + - equal: + path: metadata.name + value: "rancher-backup-s3" +- it: should set namespace + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + asserts: + - equal: + path: metadata.namespace + value: "NAMESPACE" +- it: should not set credentialSecretName + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + asserts: + - isNull: + path: stringData.credentialSecretName +- it: should set credentialSecretName + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + credentialSecretName: "credential-secret-name" + credentialSecretNamespace: "credential-secret-namespace" + asserts: + - equal: + path: stringData.credentialSecretName + value: "credential-secret-name" + - equal: + path: stringData.credentialSecretNamespace + value: "credential-secret-namespace" +- it: should not set folder + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + asserts: + - isNull: + path: stringData.folder +- it: should set folder + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + folder: "myfolder" + asserts: + - equal: + path: stringData.folder + value: "myfolder" +- it: should not set region + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + asserts: + - isNull: + path: stringData.region +- it: should set region + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + region: "us-west-1" + asserts: + - equal: + path: stringData.region + value: "us-west-1" +- it: should not set endpointCA + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + asserts: + - isNull: + path: stringData.endpointCA +- it: should set endpointCA + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + endpointCA: "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" + asserts: + - equal: + path: stringData.endpointCA + value: "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURHakNDQWdLZ0F3SUJBZ0lKQUtpWFZpNEpBb0J5TUEwR0NTcUdTSWIzRFFFQkN3VUFNQkl4RURBT0JnTlYKQkFNTUIzUmxjM1F0WTJFd0hoY05NakF3T0RNd01UZ3lOVFE1V2hjTk1qQXhNREk1TVRneU5UUTVXakFTTVJBdwpEZ1lEVlFRRERBZDBaWE4wTFdOaE1JSUJJakFOQmdrcWhraUc5dzBCQVFFRkFBT0NBUThBTUlJQkNnS0NBUUVBCjA4dnV3Q2Y0SEhtR2Q2azVNTmozRW5NOG00T2RpS3czSGszd1NlOUlXQkwyVzY5WDZxenBhN2I2M3U2L05mMnkKSnZWNDVqeXplRFB6bFJycjlpbEpWaVZ1NFNqWlFjdG9jWmFCaVNsL0xDbEFDdkFaUlYvKzN0TFVTZSs1ZDY0QQpWcUhDQlZObU5xM3E3aVY0TE1aSVpRc3N6K0FxaU1Sd0pOMVVKQTZ6V0tUc2Yzc3ByQ0J2dWxJWmZsVXVETVAyCnRCTCt6cXZEc0pDdWlhNEEvU2JNT29tVmM2WnNtTGkwMjdub3dGRld3MnRpSkM5d0xMRE14NnJoVHQ4a3VvVHYKQXJpUjB4WktiRU45L1Uzb011eUVKbHZyck9YS2ZuUDUwbk8ycGNaQnZCb3pUTStYZnRvQ1d5UnhKUmI5cFNTRApKQjlmUEFtLzNZcFpMMGRKY2sxR1h3SURBUUFCbzNNd2NUQWRCZ05WSFE0RUZnUVU5NHU4WXlMdmE2MTJnT1pyCm44QnlFQ2NucVFjd1FnWURWUjBqQkRzd09ZQVU5NHU4WXlMdmE2MTJnT1pybjhCeUVDY25xUWVoRnFRVU1CSXgKRURBT0JnTlZCQU1NQjNSbGMzUXRZMkdDQ1FDb2wxWXVDUUtBY2pBTUJnTlZIUk1FQlRBREFRSC9NQTBHQ1NxRwpTSWIzRFFFQkN3VUFBNElCQVFER1JRZ1RtdzdVNXRQRHA5Q2psOXlLRW9Vd2pYWWM2UlAwdm1GSHpubXJ3dUVLCjFrTkVJNzhBTUw1MEpuS29CY0ljVDNEeGQ3TGdIbTNCRE5mVVh2anArNnZqaXhJYXR2UWhsSFNVaWIyZjJsSTkKVEMxNzVyNCtROFkzelc1RlFXSDdLK08vY3pJTGh5ei93aHRDUlFkQ29lS1dXZkFiby8wd0VSejZzNkhkVFJzNwpHcWlGNWZtWGp6S0lOcTBjMHRyZ0xtalNKd1hwSnU0ZnNGOEcyZUh4b2pOKzdJQ1FuSkg5cGRIRVpUQUtOL2ppCnIvem04RlZtd1kvdTBndEZneWVQY1ZWbXBqRm03Y0ZOSkc4Y2ZYd0QzcEFwVjhVOGNocTZGeFBHTkVvWFZnclMKY1VRMklaU0RJd1FFY3FvSzFKSGdCUWw2RXBaUVpWMW1DRklrdFBwSQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t" +- it: should not set insecureTLSSkipVerify + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + asserts: + - isNull: + path: stringData.insecureTLSSkipVerify +- it: should set insecureTLSSkipVerify + template: s3-secret.yaml + set: + s3: + enabled: true + bucketName: "yourbucket" + endpoint: "https://s3.amazonaws.com" + insecureTLSSkipVerify: "true" + asserts: + - equal: + path: stringData.insecureTLSSkipVerify + value: "true" diff --git a/charts/rancher-backup/105.0.0+up6.0.0-rc.7/values.yaml b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/values.yaml new file mode 100644 index 0000000000..8be635fbd3 --- /dev/null +++ b/charts/rancher-backup/105.0.0+up6.0.0-rc.7/values.yaml @@ -0,0 +1,81 @@ +image: + repository: rancher/backup-restore-operator + tag: v6.0.0-rc.7 + +## Default s3 bucket for storing all backup files created by the backup-restore-operator +s3: + enabled: false + ## credentialSecretName if set, should be the name of the Secret containing AWS credentials. + ## To use IAM Role, don't set this field + credentialSecretName: "" + credentialSecretNamespace: "" + region: "" + bucketName: "" + folder: "" + endpoint: "" + endpointCA: "" + insecureTLSSkipVerify: false + +## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ +## If persistence is enabled, operator will create a PVC with mountPath /var/lib/backups +persistence: + enabled: false + + ## If defined, storageClassName: + ## If set to "-", storageClassName: "", which disables dynamic provisioning + ## If undefined (the default) or set to null, no storageClassName spec is + ## set, choosing the default provisioner. (gp2 on AWS, standard on + ## GKE, AWS & OpenStack). + ## Refer https://kubernetes.io/docs/concepts/storage/persistent-volumes/#class-1 + ## + storageClass: "-" + + ## If you want to disable dynamic provisioning by setting storageClass to "-" above, + ## and want to target a particular PV, provide name of the target volume + volumeName: "" + + ## Only certain StorageClasses allow resizing PVs; Refer https://kubernetes.io/blog/2018/07/12/resizing-persistent-volumes-using-kubernetes/ + size: 2Gi + +# Add log level flags to backup-restore +debug: false +trace: false + +# http[s] proxy server passed to backup client +# proxy: http://@:: + +# comma separated list of domains or ip addresses that will not use the proxy +noProxy: 127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.svc,.cluster.local + +global: + cattle: + systemDefaultRegistry: "" + psp: + enabled: false # PSP enablement should default to false + kubectl: + repository: rancher/kubectl + tag: v1.28.14 + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} + +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +affinity: {} + +serviceAccount: + annotations: {} + +priorityClassName: "" + +# Override imagePullPolicy for image +# options: Always, Never, IfNotPresent +# Defaults to Always +imagePullPolicy: "Always" + +## Optional array of imagePullSecrets containing private registry credentials +## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ +imagePullSecrets: [] diff --git a/index.yaml b/index.yaml index d461d01a7b..ee0785a171 100755 --- a/index.yaml +++ b/index.yaml @@ -6372,6 +6372,36 @@ entries: - assets/rancher-alerting-drivers/rancher-alerting-drivers-101.0.0.tgz version: 101.0.0 rancher-backup: + - annotations: + catalog.cattle.io/auto-install: rancher-backup-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/display-name: Rancher Backups + catalog.cattle.io/kube-version: '>= 1.28.0-0 < 1.32.0-0' + catalog.cattle.io/namespace: cattle-resources-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: resources.cattle.io.resourceset/v1 + catalog.cattle.io/rancher-version: '>= 2.10.0-0 < 2.11.0-0' + catalog.cattle.io/release-name: rancher-backup + catalog.cattle.io/scope: management + catalog.cattle.io/type: cluster-tool + catalog.cattle.io/ui-component: rancher-backup + catalog.cattle.io/upstream-version: 6.0.0-rc.7 + apiVersion: v2 + appVersion: 6.0.0-rc.7 + created: "2024-10-25T14:13:43.172713265-04:00" + description: Provides ability to back up and restore the Rancher application running + on any Kubernetes cluster + digest: e7c61c9eff90592a060138f1b49c0a67f1e5bdf80e899d912163eb9ba1dac53a + icon: https://charts.rancher.io/assets/logos/backup-restore.svg + keywords: + - applications + - infrastructure + kubeVersion: '>= 1.28.0-0' + name: rancher-backup + urls: + - assets/rancher-backup/rancher-backup-105.0.0+up6.0.0-rc.7.tgz + version: 105.0.0+up6.0.0-rc.7 - annotations: catalog.cattle.io/auto-install: rancher-backup-crd=match catalog.cattle.io/certified: rancher @@ -7080,6 +7110,21 @@ entries: - assets/rancher-backup/rancher-backup-1.0.200.tgz version: 1.0.200 rancher-backup-crd: + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-resources-system + catalog.cattle.io/release-name: rancher-backup-crd + apiVersion: v2 + appVersion: 6.0.0-rc.7 + created: "2024-10-25T14:13:47.01738967-04:00" + description: Installs the CRDs for rancher-backup. + digest: dc9399c118a63c778eb4f736740b7b3502909dc6a639cbcca75a03b7f1ea75f1 + name: rancher-backup-crd + type: application + urls: + - assets/rancher-backup-crd/rancher-backup-crd-105.0.0+up6.0.0-rc.7.tgz + version: 105.0.0+up6.0.0-rc.7 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" From 750db57f562d3f5c3358503b58f64fa5dcc9d112 Mon Sep 17 00:00:00 2001 From: Julia Bier Date: Fri, 25 Oct 2024 14:19:27 -0400 Subject: [PATCH 5/5] update release.yaml --- release.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/release.yaml b/release.yaml index 6470d8b744..7d38a08a4f 100644 --- a/release.yaml +++ b/release.yaml @@ -29,9 +29,9 @@ rancher-aks-operator-crd: rancher-alerting-drivers: - 105.0.0-rc.1 rancher-backup: - - 105.0.0+up6.0.0-rc.6 + - 105.0.0+up6.0.0-rc.7 rancher-backup-crd: - - 105.0.0+up6.0.0-rc.6 + - 105.0.0+up6.0.0-rc.7 rancher-csp-adapter: - 105.0.0+up5.0.0 rancher-eks-operator: