From 88e848c8650bced569347683ed77ccd0cc95bf5b Mon Sep 17 00:00:00 2001 From: Michal Jura Date: Tue, 24 Sep 2024 10:58:58 +0200 Subject: [PATCH] make charts --- ...ncher-eks-operator-crd-104.3.0+up1.9.2.tgz | Bin 0 -> 1217 bytes .../rancher-eks-operator-104.3.0+up1.9.2.tgz | Bin 0 -> 2109 bytes .../104.3.0+up1.9.2/Chart.yaml | 12 + .../104.3.0+up1.9.2/templates/crds.yaml | 229 ++++++++++++++++++ .../104.3.0+up1.9.2/Chart.yaml | 20 ++ .../104.3.0+up1.9.2/templates/NOTES.txt | 4 + .../104.3.0+up1.9.2/templates/_helpers.tpl | 25 ++ .../templates/clusterrole.yaml | 15 ++ .../templates/clusterrolebinding.yaml | 13 + .../104.3.0+up1.9.2/templates/deployment.yaml | 68 ++++++ .../templates/serviceaccount.yaml | 5 + .../104.3.0+up1.9.2/values.yaml | 22 ++ index.yaml | 40 +++ 13 files changed, 453 insertions(+) create mode 100644 assets/rancher-eks-operator-crd/rancher-eks-operator-crd-104.3.0+up1.9.2.tgz create mode 100644 assets/rancher-eks-operator/rancher-eks-operator-104.3.0+up1.9.2.tgz create mode 100644 charts/rancher-eks-operator-crd/104.3.0+up1.9.2/Chart.yaml create mode 100644 charts/rancher-eks-operator-crd/104.3.0+up1.9.2/templates/crds.yaml create mode 100644 charts/rancher-eks-operator/104.3.0+up1.9.2/Chart.yaml create mode 100644 charts/rancher-eks-operator/104.3.0+up1.9.2/templates/NOTES.txt create mode 100644 charts/rancher-eks-operator/104.3.0+up1.9.2/templates/_helpers.tpl create mode 100644 charts/rancher-eks-operator/104.3.0+up1.9.2/templates/clusterrole.yaml create mode 100644 charts/rancher-eks-operator/104.3.0+up1.9.2/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-eks-operator/104.3.0+up1.9.2/templates/deployment.yaml create mode 100644 charts/rancher-eks-operator/104.3.0+up1.9.2/templates/serviceaccount.yaml create mode 100644 charts/rancher-eks-operator/104.3.0+up1.9.2/values.yaml diff --git a/assets/rancher-eks-operator-crd/rancher-eks-operator-crd-104.3.0+up1.9.2.tgz b/assets/rancher-eks-operator-crd/rancher-eks-operator-crd-104.3.0+up1.9.2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..d4291334984f6aaf180b5ebb047e58cae3a5d865 GIT binary patch literal 1217 zcmV;y1U~y8iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI=cQ{%=D=h=V7&b@xW2~IAMHg7k9b{JZEbD_K|YvF9O-rY*; zK(5pOz2hH&kk}*;lLH35Fs#=4NV4>?c0*v~1gV8nZdr!}-cn0abU2&<`Su(VeXy&9 zVHh6wdimcl3|Ie#$DhN4PVczi>-GD+{?S3$IS#ws0}<|wyoIFffeyl*u~vh7BLc=) z4_;ZrgFpxg9<+_y61>;gR`yULd3CKY8i=x1Dz{Bk6rmZ2Po7fzRJp}Kg6u%zKopBD zp0mfKaG??fQ9dq)DSMlIL$)bNJi%*aRG!md1Lo`wA?&q3x5NLX zuE5&Y`>*YPkBQUZkq;$Byb}>T-v6DWqod=M{_pp@{g3|Nhb$L8IEA+!P4*wRr$2Gl zJhM(PRVEtL)_9PhhX_1m{INnOLQGI6ZJr!b`CQ9ct>kpJOg44-_9bOuq{J(HJv|={3wy)dUaoRFCD0XMxt1rE{KdVYR=!Ub zI%VQi1Fb(B2;m4BX@-BAsj)Za7lk_Ffw%_E7zn}AIvj|L1^GpR5M|frNUbsjvrYje zCzwFtf)LiB`SSJb>htKqat4|;t5*we3t6P;UaI$H0ttM#W=I&J@e1?^C81y4C4@<} zhOx$h$e4Xi?dMr^>`9q;MHwk}8s=H#O`63q4@YMwq-IFZv^%y|BbXJfN}MH+(Yn#c zo|-0nj`Jo1oTg(WgC2R&nGG7(Hjb5vFXwK(B!o~NlZxeyfR93M=`Ik#d_`w$guiAz z{}f;AYrYVmq*}2>m|{aU6cQmT!f2$vS5*F!k(BWm=VMm|lH%zeU{H2PJgKbnC*#!A zNG7pMU--?a1Y$g^Xz?b)P=-AiiCL4qERu#X>Y6ea0-`AYLWBOgp(VEVXbYd76q_CY zh0@o=mKr&^EXUBD^09z+dXhrqRbvp zvMtPCq18}#oa82@goFJ+{Y@_@c0$|K%x_{=l`l5tZuSXW`R9+G735v3+i&px6! zQZw-QMM~s~n%Lny>e8`R@`VkLa^`&lM?u24;iE9;Hy(UyB+ZLU-6oUFC{t2?{^aB9 z56Uki&6KQ}Wp+q%-6!I;#a~VT+YLr0dAH$-Wr3x z8LC?;Dc zVQyr3R8em|NM&qo0PH$#Z{xVp`&qwY;M{{ey{=@*agsZsTOiGDd&TV~L9)Geaab&9 zYHYElMIDE7Hud?x7o=ocvgJ6QQ>IOD z$0qXCQ$QGo;Yq*me#09Q8yP@|RezZ$*}BxG;F!29$e`vb z8;TJHIHnr*G-@TX(0W7mUhr)tdM}8g?V@Xx$OwI_g7yt;okm>c7{i2RY=jfcjK^~E z;MK*$W-`_x`3Gz~9IZKVn zDeiVh!lcC@;A*mvyW3#)9yv%Anj^)Y|6poMl}2GdI10kw7I`VmOB?1hL973tGFc!! zSpeAK|HIR$x9^m?_WQM>fFiKi!5&mD}&xO!P@cnW* za3SmDH(rJ1qAvXO$+HBnv`|`@yK~8iF4zPs5iqfI6U?Q$v*H9^zK-d1^tkW?iRLcHHxsKCo?;ANcjt4@ zo6USka40f_PMI8hPRi`yv#!#E4*2uALli>@ek@bSGQC)o6|HH-a$2rMW`@xDKk9ZK zMF1t?@=s^Q4`#{6vu6eO{#sUU3x5Q+LP}ss0+n!OV0Sr%EA?Eor`I+gfdNW&TMgIZ zxeeC0N{^*t2?1Ayw5UKl#iWpBFgK|ptW)%ymg`D(FMXGb)QFcd`7lPC7u73PTQR$| zJ+9{30UQpIn;1G5>ZV%X4lnFHhR(a63nn}3nrUT&ssyOyp_xOiD&_{Impgb!Z5};fJYa=Ml@|YSE+`m( zLsh40f`%o`FkAhVO_{Z7Z)?*{7ZP2&(Fc}`KWSCuwhlTx{8SZ^i$)IobV$fG8meAR zQ4iek2+iSZIFy3iFW1Nn+NWD)co*(JkFv9WZu)~6?T zsSmgRfyfe(jUM3!cG-Wwf3jx(y(rq(f6oFBw)PE2@rUv}w77wX`vE2K8i#h~!ffv0 z!UNd!R;{jwioxHJ8`lUfr`({P3XW%-t0FW1vcr1mUHbRI4*RdQogUu}-eLd!{?SJK zKRVs_f1d^F_RsR1R;K=Tx%FEjeHpPHWIvQ6x05yIQgB8wL>|DRqA1(P?gsI_YvPsz z0AsA*$}OuF9FqsIIHc9=8jBWWgU}9A01E~!taW>5ATlnCWLq^9z%P)AEWymcH?Ua( z*U6Qy!KjaHBHJ;3fpuE8oSM%o<{F*jExa`f#$D{yOV?KJ>IgfSqlTBgXmha^);QQ` zXRiphb-HJ>trO?-PHl-b)_CD?Rc7#uSsjcaRdFW@!_(!cF0wQF3!!d|bCnq;GSth1 z<+lft63V*~IJ7#g4(mPLldoVtpUvQ_g>{?cCHI2m*DRVFH6Yw?Jdzf=~k~;GZ?7j8fMT zBS=wW;MHYx99}V##?VE>mv{6;vdfvj;yTFP#~LdrPlS==H}L#Yga#@VgK~-cDK0j6 zV@unm*Gd_`R6$+RL?LB|#!2i1e!WI%P#C8$j@no{7RT-fXM|AJc~+$Avl(vFFpI{S zl$f}UOA&^JDKvu83-w>#+^^VtEV{;?nXc8a()6F9-jW<`I-LisTy_T5?5K3BKd1y_ z2>W5!;I_N+xP#T1sWf9EmHrr nYI!~V-|`_{OD6Qv((Pdnd)UJsw!uFG00960h(5&-05AXm%IgoE literal 0 HcmV?d00001 diff --git a/charts/rancher-eks-operator-crd/104.3.0+up1.9.2/Chart.yaml b/charts/rancher-eks-operator-crd/104.3.0+up1.9.2/Chart.yaml new file mode 100644 index 0000000000..5bbe27e609 --- /dev/null +++ b/charts/rancher-eks-operator-crd/104.3.0+up1.9.2/Chart.yaml @@ -0,0 +1,12 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-eks-operator-crd +apiVersion: v2 +appVersion: 1.9.2 +description: EKS Operator CustomResourceDefinitions +name: rancher-eks-operator-crd +version: 104.3.0+up1.9.2 diff --git a/charts/rancher-eks-operator-crd/104.3.0+up1.9.2/templates/crds.yaml b/charts/rancher-eks-operator-crd/104.3.0+up1.9.2/templates/crds.yaml new file mode 100644 index 0000000000..5f2e07b221 --- /dev/null +++ b/charts/rancher-eks-operator-crd/104.3.0+up1.9.2/templates/crds.yaml @@ -0,0 +1,229 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + helm.sh/resource-policy: keep + name: eksclusterconfigs.eks.cattle.io +spec: + group: eks.cattle.io + names: + kind: EKSClusterConfig + plural: eksclusterconfigs + shortNames: + - ekscc + singular: eksclusterconfig + preserveUnknownFields: false + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + amazonCredentialSecret: + nullable: true + type: string + displayName: + nullable: true + type: string + ebsCSIDriver: + nullable: true + type: boolean + imported: + type: boolean + kmsKey: + nullable: true + type: string + kubernetesVersion: + nullable: true + type: string + loggingTypes: + items: + nullable: true + type: string + nullable: true + type: array + nodeGroups: + items: + properties: + arm: + nullable: true + type: boolean + desiredSize: + nullable: true + type: integer + diskSize: + nullable: true + type: integer + ec2SshKey: + nullable: true + type: string + gpu: + nullable: true + type: boolean + imageId: + nullable: true + type: string + instanceType: + nullable: true + type: string + labels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + launchTemplate: + nullable: true + properties: + id: + nullable: true + type: string + name: + nullable: true + type: string + version: + nullable: true + type: integer + type: object + maxSize: + nullable: true + type: integer + minSize: + nullable: true + type: integer + nodeRole: + nullable: true + type: string + nodegroupName: + nullable: true + type: string + requestSpotInstances: + nullable: true + type: boolean + resourceTags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + spotInstanceTypes: + items: + nullable: true + type: string + nullable: true + type: array + subnets: + items: + nullable: true + type: string + nullable: true + type: array + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + userData: + nullable: true + type: string + version: + nullable: true + type: string + required: + - nodegroupName + type: object + nullable: true + type: array + privateAccess: + nullable: true + type: boolean + publicAccess: + nullable: true + type: boolean + publicAccessSources: + items: + nullable: true + type: string + nullable: true + type: array + region: + nullable: true + type: string + secretsEncryption: + nullable: true + type: boolean + securityGroups: + items: + nullable: true + type: string + nullable: true + type: array + serviceRole: + nullable: true + type: string + subnets: + items: + nullable: true + type: string + nullable: true + type: array + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + type: object + status: + properties: + failureMessage: + nullable: true + type: string + generatedNodeRole: + nullable: true + type: string + managedLaunchTemplateID: + nullable: true + type: string + managedLaunchTemplateVersions: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + networkFieldsSource: + nullable: true + type: string + phase: + nullable: true + type: string + securityGroups: + items: + nullable: true + type: string + nullable: true + type: array + subnets: + items: + nullable: true + type: string + nullable: true + type: array + templateVersionsToDelete: + items: + nullable: true + type: string + nullable: true + type: array + virtualNetwork: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-eks-operator/104.3.0+up1.9.2/Chart.yaml b/charts/rancher-eks-operator/104.3.0+up1.9.2/Chart.yaml new file mode 100644 index 0000000000..0416496a3d --- /dev/null +++ b/charts/rancher-eks-operator/104.3.0+up1.9.2/Chart.yaml @@ -0,0 +1,20 @@ +annotations: + catalog.cattle.io/auto-install: rancher-eks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.23.0-0 < 1.32.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: eksclusterconfigs.eks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.11.0-0' + catalog.cattle.io/release-name: rancher-eks-operator + catalog.cattle.io/scope: management +apiVersion: v2 +appVersion: 1.9.2 +description: A Helm chart for provisioning EKS clusters +home: https://github.com/rancher/eks-operator +name: rancher-eks-operator +sources: +- https://github.com/rancher/eks-operator +version: 104.3.0+up1.9.2 diff --git a/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/NOTES.txt b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/NOTES.txt new file mode 100644 index 0000000000..23a1b4a8bf --- /dev/null +++ b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/NOTES.txt @@ -0,0 +1,4 @@ +You have deployed the Rancher EKS operator +Version: {{ .Chart.AppVersion }} +Description: This operator provisions EKS clusters +from EKSClusterConfig CRs. diff --git a/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/_helpers.tpl b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/_helpers.tpl new file mode 100644 index 0000000000..de3b332f6a --- /dev/null +++ b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/_helpers.tpl @@ -0,0 +1,25 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} + diff --git a/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/clusterrole.yaml b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/clusterrole.yaml new file mode 100644 index 0000000000..d0d561b6ea --- /dev/null +++ b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/clusterrole.yaml @@ -0,0 +1,15 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: eks-operator + namespace: cattle-system +rules: + - apiGroups: [''] + resources: ['secrets'] + verbs: ['get', 'list', 'create', 'watch'] + - apiGroups: ['eks.cattle.io'] + resources: ['eksclusterconfigs'] + verbs: ['get', 'list', 'update', 'watch'] + - apiGroups: ['eks.cattle.io'] + resources: ['eksclusterconfigs/status'] + verbs: ['update'] diff --git a/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/clusterrolebinding.yaml b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/clusterrolebinding.yaml new file mode 100644 index 0000000000..2b1846353e --- /dev/null +++ b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/clusterrolebinding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: eks-operator + namespace: cattle-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: eks-operator +subjects: +- kind: ServiceAccount + name: eks-operator + namespace: cattle-system diff --git a/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/deployment.yaml b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/deployment.yaml new file mode 100644 index 0000000000..27b1f58366 --- /dev/null +++ b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/deployment.yaml @@ -0,0 +1,68 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: eks-config-operator + namespace: cattle-system +spec: + replicas: 1 + selector: + matchLabels: + ke.cattle.io/operator: eks + template: + metadata: + labels: + ke.cattle.io/operator: eks + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + serviceAccountName: eks-operator + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + securityContext: + fsGroup: 1007 + runAsUser: 1007 + containers: + - name: eks-operator + image: '{{ template "system_default_registry" $ }}{{ $.Values.eksOperator.image.repository }}:{{ $.Values.eksOperator.image.tag }}' + imagePullPolicy: IfNotPresent + env: + - name: HTTP_PROXY + value: {{ .Values.httpProxy }} + - name: HTTPS_PROXY + value: {{ .Values.httpsProxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + privileged: false + capabilities: + drop: + - ALL +{{- if .Values.additionalTrustedCAs }} + # eks-operator mounts the additional CAs in two places: + volumeMounts: + # This directory is owned by the eks-operator user so c_rehash works here. + - mountPath: /etc/rancher/ssl/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + # This directory is root-owned so c_rehash doesn't work here, + # but the cert is here in case update-ca-certificates is called in the future or by the OS. + - mountPath: /etc/pki/trust/anchors/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + volumes: + - name: tls-ca-additional-volume + secret: + defaultMode: 0400 + secretName: tls-ca-additional + {{- end }} diff --git a/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/serviceaccount.yaml b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/serviceaccount.yaml new file mode 100644 index 0000000000..934de07e0d --- /dev/null +++ b/charts/rancher-eks-operator/104.3.0+up1.9.2/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: cattle-system + name: eks-operator diff --git a/charts/rancher-eks-operator/104.3.0+up1.9.2/values.yaml b/charts/rancher-eks-operator/104.3.0+up1.9.2/values.yaml new file mode 100644 index 0000000000..d3ebe34e19 --- /dev/null +++ b/charts/rancher-eks-operator/104.3.0+up1.9.2/values.yaml @@ -0,0 +1,22 @@ +global: + cattle: + systemDefaultRegistry: "" + +eksOperator: + image: + repository: rancher/eks-operator + tag: v1.9.2 + +httpProxy: "" +httpsProxy: "" +noProxy: "" +additionalTrustedCAs: false +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" diff --git a/index.yaml b/index.yaml index 3420001b51..06fe503960 100755 --- a/index.yaml +++ b/index.yaml @@ -13057,6 +13057,30 @@ entries: - assets/rancher-csp-adapter/rancher-csp-adapter-1.0.0.tgz version: 1.0.0 rancher-eks-operator: + - annotations: + catalog.cattle.io/auto-install: rancher-eks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.23.0-0 < 1.32.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: eksclusterconfigs.eks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.11.0-0' + catalog.cattle.io/release-name: rancher-eks-operator + catalog.cattle.io/scope: management + apiVersion: v2 + appVersion: 1.9.2 + created: "2024-09-24T10:58:34.921216134+02:00" + description: A Helm chart for provisioning EKS clusters + digest: 55a0272bcd9436cc7802aafddb0c762cef7e22cedda9e000e30e6c08e69f96e9 + home: https://github.com/rancher/eks-operator + name: rancher-eks-operator + sources: + - https://github.com/rancher/eks-operator + urls: + - assets/rancher-eks-operator/rancher-eks-operator-104.3.0+up1.9.2.tgz + version: 104.3.0+up1.9.2 - annotations: catalog.cattle.io/auto-install: rancher-eks-operator-crd=match catalog.cattle.io/certified: rancher @@ -13608,6 +13632,22 @@ entries: - assets/rancher-eks-operator/rancher-eks-operator-100.0.0+up1.1.1.tgz version: 100.0.0+up1.1.1 rancher-eks-operator-crd: + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-eks-operator-crd + apiVersion: v2 + appVersion: 1.9.2 + created: "2024-09-24T10:58:37.898647731+02:00" + description: EKS Operator CustomResourceDefinitions + digest: 2dd57769e6efa70c2d7d800aa49e59c113b562afa80504e37b4d38b922194397 + name: rancher-eks-operator-crd + urls: + - assets/rancher-eks-operator-crd/rancher-eks-operator-crd-104.3.0+up1.9.2.tgz + version: 104.3.0+up1.9.2 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true"