Skip to content

Commit 6c4378a

Browse files
authored
Merge pull request #84 from embik/include-new-charts-in-tests
Fix sharded charts to allow them to render successfully
2 parents 6c14e54 + c6ab7a3 commit 6c4378a

File tree

13 files changed

+67
-137
lines changed

13 files changed

+67
-137
lines changed

.gitignore

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
*.kubeconfig
22

33
# output of hack/ci/validate-helm-resources.sh
4-
kcp-templated.yaml
4+
*-templated.yaml

charts/cache/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ name: cache
33
description: A cache server for prototype of a multi-tenant Kubernetes control plane for workloads on many clusters
44

55
# version information
6-
version: 0.0.1
7-
appVersion: "0.21.0"
6+
version: 0.0.2
7+
appVersion: "0.22.0"
88

99
# optional metadata
1010
type: application

charts/cache/templates/_helpers.tpl

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,14 @@ v{{- .Chart.AppVersion -}}
4242
{{- printf "%s-cache" $trimmedName | trunc 63 | trimSuffix "-" -}}
4343
{{- end -}}
4444

45+
{{- define "cache.version" -}}
46+
{{- if .Values.cache.tag -}}
47+
{{- .Values.cache.tag -}}
48+
{{- else -}}
49+
v{{- .Chart.AppVersion -}}
50+
{{- end -}}
51+
{{- end -}}
52+
4553
{{- define "frontproxy.fullname" -}}
4654
{{- $trimmedName := printf "%s" (include "kcp.fullname" .) | trunc 52 | trimSuffix "-" -}}
4755
{{- printf "%s-front-proxy" $trimmedName | trunc 63 | trimSuffix "-" -}}

charts/cache/templates/cache-deployment.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ spec:
4949
{{- end }}
5050
containers:
5151
- name: cache
52-
image: {{ .Values.cache.image }}:{{- include "kcp.version" . }}
52+
image: {{ .Values.cache.image }}:{{- include "cache.version" . }}
5353
imagePullPolicy: {{ .Values.cache.pullPolicy }}
5454
ports:
5555
- containerPort: 8012

charts/cache/values.yaml

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
externalHostname: ""
22
cache:
3-
enabled: false
4-
image: {{ .Values.cache.image }}:{{- include "kcp.version" . }}
3+
enabled: true
4+
image: ghcr.io/kcp-dev/kcp
5+
# set this to override the image tag used for kcp (determined by chart appVersion by default).
6+
tag: ""
57
pullPolicy: Always
68
service:
79
annotations: {}
@@ -21,3 +23,15 @@ cache:
2123
securityContext:
2224
seccompProfile:
2325
type: RuntimeDefault
26+
27+
certificates:
28+
name: certs
29+
kcp:
30+
pki: true
31+
certs: false
32+
etcd:
33+
pki: true
34+
certs: false
35+
cache:
36+
pki: true
37+
certs: false

charts/certificates/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ name: certificates
33
description: A prototype of a multi-tenant Kubernetes control plane for workloads on many clusters
44

55
# version information
6-
version: 0.0.1
7-
appVersion: "0.21.0"
6+
version: 0.0.2
7+
appVersion: "0.22.0"
88

99
# optional metadata
1010
type: application

charts/certificates/values.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ fullnameOverride: alpha
22
externalHostname: "kcp.dev.local"
33

44
certificates:
5+
name: certs
56
kcp:
67
pki: true
78
certs: true

charts/proxy/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ name: proxy
33
description: A prototype of a multi-tenant Kubernetes control plane for workloads on many clusters
44

55
# version information
6-
version: 0.0.1
7-
appVersion: "0.21.0"
6+
version: 0.0.2
7+
appVersion: "0.22.0"
88

99
# optional metadata
1010
type: application

charts/proxy/templates/front-proxy-deployment.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ spec:
7474
{{- end }}
7575
containers:
7676
- name: kcp-front-proxy
77-
image: "{{ .Values.kcpFrontProxy.image }}:{{- include "kcp.version" . }}"
77+
image: "{{ .Values.kcpFrontProxy.image }}:{{- include "frontproxy.version" . }}"
7878
imagePullPolicy: {{ .Values.kcpFrontProxy.pullPolicy }}
7979
command: ["/kcp-front-proxy"]
8080
args:

charts/proxy/values.yaml

Lines changed: 1 addition & 108 deletions
Original file line numberDiff line numberDiff line change
@@ -1,68 +1,4 @@
11
externalHostname: ""
2-
etcd:
3-
enabled: true
4-
image: quay.io/coreos/etcd
5-
tag: v3.5.4
6-
resources:
7-
requests:
8-
cpu: 500m
9-
memory: 2Gi
10-
limits:
11-
# cpu: 1
12-
memory: 20Gi
13-
volumeSize: 8Gi
14-
profiling:
15-
enabled: false
16-
kcp:
17-
enabled: true
18-
image: ghcr.io/kcp-dev/kcp
19-
# set this to override the image tag used for kcp (determined by chart appVersion by default).
20-
tag: ""
21-
pullPolicy: IfNotPresent
22-
v: "3"
23-
logicalClusterAdminFlag: true
24-
externalLogicalClusterAdminFlag: true
25-
# enabled "batteries" (see kcp start --help for available batteries).
26-
batteries:
27-
- workspace-types
28-
resources:
29-
requests:
30-
memory: 512Mi
31-
cpu: 100m
32-
limits:
33-
# cpu: 1
34-
memory: 20Gi
35-
volumeClassName: ""
36-
etcd:
37-
# set this if you are using external or embedded etcds.
38-
serverAddress: ""
39-
clientCertificate:
40-
# set this to a cert-manager Issuer that knows how to
41-
# issue client certificates for your external etcd if
42-
# you are not using the etcd provided by this chart.
43-
issuer: ""
44-
commonName: root
45-
volumeSize: 1Gi
46-
extraFlags: []
47-
profiling:
48-
enabled: false
49-
port: 6060
50-
tokenAuth:
51-
enabled: false
52-
fileName: auth-token.csv
53-
config: |
54-
user-1-token,user-1,1111-1111-1111-1111,"team-1"
55-
admin-token,admin,5555-5555-5555-5555,"system:kcp:admin"
56-
system-token,system,6666-6666-6666-6666,"system:masters"
57-
hostAliases:
58-
enabled: false
59-
homeWorkspaces:
60-
enabled: false
61-
securityContext:
62-
# this matches the group id as set in the kcp Dockerfile.
63-
fsGroup: 65532
64-
seccompProfile:
65-
type: RuntimeDefault
662
kcpFrontProxy:
673
enabled: true
684
image: ghcr.io/kcp-dev/kcp
@@ -140,32 +76,6 @@ kcpFrontProxy:
14076
# - name: example-vw-serving-cert
14177
# mountPath: /etc/example-vw-serving-cert
14278
extraFlags: []
143-
cache:
144-
enabled: false
145-
image: ghcr.io/kcp-dev/kcp
146-
pullPolicy: Always
147-
service:
148-
annotations: {}
149-
type: ClusterIP
150-
profiling:
151-
enabled: false
152-
port: 6060
153-
resources:
154-
requests:
155-
cpu: 100m
156-
memory: 128Mi
157-
limits:
158-
# cpu: 1
159-
memory: 1Gi
160-
hostAliases:
161-
enabled: false
162-
securityContext:
163-
seccompProfile:
164-
type: RuntimeDefault
165-
externalCache:
166-
enabled: false
167-
cacheInternalHostname: ""
168-
16979
oidc:
17080
enabled: false
17181
caSecretName: ""
@@ -176,25 +86,8 @@ oidc:
17686
# certs in the tls.crt chain. As you cannot say "use this Secret, but the
17787
# second cert in the tls.crt key", it's easier to mount the CA cert secret.
17888
caSecretKeyName: "tls.crt"
179-
audit:
180-
enabled: false
181-
volumeSize: 1Gi
182-
volumeClassName: ""
183-
policy:
184-
dir: /etc/kcp/audit
185-
fileName: audit-policy.yml
186-
config: |
187-
# Log all requests at the Metadata level.
188-
apiVersion: audit.k8s.io/v1
189-
kind: Policy
190-
rules:
191-
- level: Metadata
192-
log:
193-
maxAge: "10"
194-
maxSize: "250"
195-
maxBackup: "1"
196-
dir: /var/audit
19789
certificates:
90+
name: certs
19891
kcp:
19992
pki: true
20093
certs: true

0 commit comments

Comments
 (0)