From c2f7f4f5b65f5ffc5388b22dca44a63b8c9f2c8c Mon Sep 17 00:00:00 2001 From: Michal Jura Date: Thu, 7 Nov 2024 14:39:51 +0100 Subject: [PATCH] make charts --- ...ncher-aks-operator-crd-104.4.0+up1.9.4.tgz | Bin 0 -> 1249 bytes .../rancher-aks-operator-104.4.0+up1.9.4.tgz | Bin 0 -> 2115 bytes ...ncher-eks-operator-crd-104.4.0+up1.9.4.tgz | Bin 0 -> 1217 bytes .../rancher-eks-operator-104.4.0+up1.9.4.tgz | Bin 0 -> 2106 bytes ...ncher-gke-operator-crd-104.4.0+up1.9.4.tgz | Bin 0 -> 1483 bytes .../rancher-gke-operator-104.4.0+up1.9.4.tgz | Bin 0 -> 2140 bytes .../104.4.0+up1.9.4/Chart.yaml | 12 + .../104.4.0+up1.9.4/templates/crds.yaml | 211 ++++++++++++++ .../104.4.0+up1.9.4/Chart.yaml | 20 ++ .../104.4.0+up1.9.4/templates/NOTES.txt | 4 + .../104.4.0+up1.9.4/templates/_helpers.tpl | 25 ++ .../templates/clusterrole.yaml | 15 + .../templates/clusterrolebinding.yaml | 13 + .../104.4.0+up1.9.4/templates/deployment.yaml | 68 +++++ .../templates/serviceaccount.yaml | 5 + .../104.4.0+up1.9.4/values.yaml | 23 ++ .../104.4.0+up1.9.4/Chart.yaml | 12 + .../104.4.0+up1.9.4/templates/crds.yaml | 229 +++++++++++++++ .../104.4.0+up1.9.4/Chart.yaml | 20 ++ .../104.4.0+up1.9.4/templates/NOTES.txt | 4 + .../104.4.0+up1.9.4/templates/_helpers.tpl | 25 ++ .../templates/clusterrole.yaml | 15 + .../templates/clusterrolebinding.yaml | 13 + .../104.4.0+up1.9.4/templates/deployment.yaml | 68 +++++ .../templates/serviceaccount.yaml | 5 + .../104.4.0+up1.9.4/values.yaml | 22 ++ .../104.4.0+up1.9.4/Chart.yaml | 12 + .../104.4.0+up1.9.4/templates/crds.yaml | 272 ++++++++++++++++++ .../104.4.0+up1.9.4/Chart.yaml | 20 ++ .../104.4.0+up1.9.4/templates/NOTES.txt | 4 + .../104.4.0+up1.9.4/templates/_helpers.tpl | 25 ++ .../templates/clusterrole.yaml | 15 + .../templates/clusterrolebinding.yaml | 13 + .../104.4.0+up1.9.4/templates/deployment.yaml | 69 +++++ .../templates/serviceaccount.yaml | 5 + .../104.4.0+up1.9.4/values.yaml | 23 ++ index.yaml | 72 ++--- 37 files changed, 1303 insertions(+), 36 deletions(-) create mode 100644 assets/rancher-aks-operator-crd/rancher-aks-operator-crd-104.4.0+up1.9.4.tgz create mode 100644 assets/rancher-aks-operator/rancher-aks-operator-104.4.0+up1.9.4.tgz create mode 100644 assets/rancher-eks-operator-crd/rancher-eks-operator-crd-104.4.0+up1.9.4.tgz create mode 100644 assets/rancher-eks-operator/rancher-eks-operator-104.4.0+up1.9.4.tgz create mode 100644 assets/rancher-gke-operator-crd/rancher-gke-operator-crd-104.4.0+up1.9.4.tgz create mode 100644 assets/rancher-gke-operator/rancher-gke-operator-104.4.0+up1.9.4.tgz create mode 100644 charts/rancher-aks-operator-crd/104.4.0+up1.9.4/Chart.yaml create mode 100644 charts/rancher-aks-operator-crd/104.4.0+up1.9.4/templates/crds.yaml create mode 100644 charts/rancher-aks-operator/104.4.0+up1.9.4/Chart.yaml create mode 100644 charts/rancher-aks-operator/104.4.0+up1.9.4/templates/NOTES.txt create mode 100644 charts/rancher-aks-operator/104.4.0+up1.9.4/templates/_helpers.tpl create mode 100644 charts/rancher-aks-operator/104.4.0+up1.9.4/templates/clusterrole.yaml create mode 100644 charts/rancher-aks-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-aks-operator/104.4.0+up1.9.4/templates/deployment.yaml create mode 100644 charts/rancher-aks-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml create mode 100644 charts/rancher-aks-operator/104.4.0+up1.9.4/values.yaml create mode 100644 charts/rancher-eks-operator-crd/104.4.0+up1.9.4/Chart.yaml create mode 100644 charts/rancher-eks-operator-crd/104.4.0+up1.9.4/templates/crds.yaml create mode 100644 charts/rancher-eks-operator/104.4.0+up1.9.4/Chart.yaml create mode 100644 charts/rancher-eks-operator/104.4.0+up1.9.4/templates/NOTES.txt create mode 100644 charts/rancher-eks-operator/104.4.0+up1.9.4/templates/_helpers.tpl create mode 100644 charts/rancher-eks-operator/104.4.0+up1.9.4/templates/clusterrole.yaml create mode 100644 charts/rancher-eks-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-eks-operator/104.4.0+up1.9.4/templates/deployment.yaml create mode 100644 charts/rancher-eks-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml create mode 100644 charts/rancher-eks-operator/104.4.0+up1.9.4/values.yaml create mode 100644 charts/rancher-gke-operator-crd/104.4.0+up1.9.4/Chart.yaml create mode 100644 charts/rancher-gke-operator-crd/104.4.0+up1.9.4/templates/crds.yaml create mode 100644 charts/rancher-gke-operator/104.4.0+up1.9.4/Chart.yaml create mode 100644 charts/rancher-gke-operator/104.4.0+up1.9.4/templates/NOTES.txt create mode 100644 charts/rancher-gke-operator/104.4.0+up1.9.4/templates/_helpers.tpl create mode 100644 charts/rancher-gke-operator/104.4.0+up1.9.4/templates/clusterrole.yaml create mode 100644 charts/rancher-gke-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-gke-operator/104.4.0+up1.9.4/templates/deployment.yaml create mode 100644 charts/rancher-gke-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml create mode 100644 charts/rancher-gke-operator/104.4.0+up1.9.4/values.yaml diff --git a/assets/rancher-aks-operator-crd/rancher-aks-operator-crd-104.4.0+up1.9.4.tgz b/assets/rancher-aks-operator-crd/rancher-aks-operator-crd-104.4.0+up1.9.4.tgz new file mode 100644 index 0000000000000000000000000000000000000000..53d793e8238d0689100a83d4d60ccce4a934aa15 GIT binary patch literal 1249 zcmV<71RnbziwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI=ca~d}g_A`HlCa*2{h>6|uhH;zmBu$x+q%(b6r1hbqlQh~D zHtF<#@7x_YE*u!!!ZXcyUpz><@6)b!KmBk3E2kLRFr&8f7=T@9%b<>jQwZEyKw*xa zYFU(2d8 z46JnwtevHPO9%-J#^oIe%mzE!9ZL+XuQaN@SmsLOu&GuGZC||N5b;&x5DNv82Z?=A zH@0a(j78&MM}1+mjW>#@D%L&|iv61mD@cIh|($4n9 z{B;Ywzx~Hx|DyKNrJD?23;_E(VDgc%`kbV%oZgbAHQ^^*X&y z_CxeF*K@7^*7|2Gya7f!mO;^zgkX35cY7yUZ>|2%PETLI)cZ8hi^db zYMiY5w9TV|u=#CE2p^Cz%<;3GS$A!J)o2v;#T6LBmJlSJ$G-Tm5%6c{1+E!uuX3gVDgUHi!Ap9K6dY2G38Uqu9 zeNoE!MmH}?mxzP5c>}Bq`YWnS{}F7yNi2kBEE<~crQJ!q=cFM7Sggz(_NQQ}X2EnfN>cYFgs5U`&eKm^{3>Fz_rP~R;uFg^eRcQN}FxbS&WgMt; zFkmHy@hql=&IcCEg0-YST$oi-`?lIG4$YFf1Pic`qq?lrh!;syu5ebf3#l{NB44{O z8=08vr1`i4uFni9ft|vUbLJtt)AqfzHkgApFwsWy;!kI{4co!6msfju_aLP0`(ka< zMcc3&KA1sU#=N>cZW`JWWDwbnC78zad@x^gs@7J(&F~rAD&S`1)Yhd=$1;u~ZxEpe z)9lEmLfdBvnNtULqROKqT3b$0?Yx<^#@o>gi=aFf4K@>c&ofwuge zD4Yv&ip161$JRsDgZXyM+tG!l*;s$Yx9110r<&?hIqtwN9iC%elp#AXheaO8iABD= zI3&}~B75{rwyez63r+IVuZui!(W>T!emt&sD)sHn2R#SIMCO!94RoW>L8S;jmZr=_58D6{^H6{{<0g=w_ zlW&@hbDQhH5zL4B{&qOz1Bu<1$Poia+V_R^3bcs2m+B7I z@EY}Kv22XuMq~AOuI_*nyHEz~PD`AuH0(CY%e4@H|MP7BD|@jQd$AY$p6uTM00960 LddWY)03-ka^u%%A literal 0 HcmV?d00001 diff --git a/assets/rancher-aks-operator/rancher-aks-operator-104.4.0+up1.9.4.tgz b/assets/rancher-aks-operator/rancher-aks-operator-104.4.0+up1.9.4.tgz new file mode 100644 index 0000000000000000000000000000000000000000..7afc9ecb38600516f6cec6bb31b49c0bfa61a93a GIT binary patch literal 2115 zcmV-J2)y?niwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH$#Z{xVp`&qwY;M{{ey{=@*c9J`xTOiGDd&TV~L9)Geaab&9 zYHYKnMIDE7Hud?x7Zhb#vXwZ^rAdo=zF4M)!hDkLJI5S3KAXJy-M)@Ko!=#L%?YQ_{CvRrV@JTBHj@pQk zz@(bpiZ&5Rf@usLqjT)EqD=E4`g7DIR2swK@83Wa^p1nj58-zZ1^viA9=1+R*$gRT z9Aj{UKHZYRSu3)l7^Fz^FRgDg)H7koudrUTc&=k$Q{plwgPN;! zB*ql5Db=v&Q7e&^)*G_-f^SRFdqEW5ExJaDjL^3#Xy3rrX~b2AG0a%X#yG>&cq|h? zt{9m2JeFnE-zfMt73a5Y=W-EA;?j~t|O&5>fye=xO5rBOHt20{4SJafXlv|&CIwEF)!lR46p z1%Ms?KRk*0oBn@rwDRB#g3{t+r;73>(KVcP8dpBfZq>iz8i_?D}u2*3T?Sgmo)Se$duwBxk1- z!-z>j&pSAPbCn=SHbhCz*Qf*-kr=0i=Q=omD;%v|j143@MT2BLU7|R3b3*NpbCF;- zRSEip61iQn>m3|;cIdhoQ96dj(o%dc$bcGweFuh#)DRd2MoB9!!vAahITsoUzOR;p zB4!=`#w)RkunRwZDulSyLTO=c&m)a^Wq z07}B@PiM^!rpeZ`X9f5E>MFODKY|+}C9oucQaBgaiK9Il0P z8>?@Wo=U|M0BGH;ov_3I zmxiI0#K)I|yYj!|la2hZ7asNcd;k9&FcoPMLz#YEDT$3Xj~+4}u-r_P7XK(*P%!<5 z%1+e`4NI6|w)%5TnT=}i&Ze8rB^K>QA6O>-q*b2TGU)K|Q&~u^8aeROAtBdjsC+d? zJuHUDXbxY)p%hg7a*fQOeY#L^^(i8`x$4gTe8J{rAFs|L1w&!PdUzDE{EiLyH@DxF1jwuW)2% zu8id#EY;RESYOGj_=^DQ84aeuU@*ga#u&#!5lTb?0K7u zwXng#RyTW1u&vR(Sll^rx$M-I*kFz41+GdBelhEVF`_c=L}7SRjp{r-rN0pB#yD50 zVIoCc9W1{+kT`I6BXDSSS{~MWx+h=3a=BQ*S1aji7cD_SDOg{yz;YSik89W%mdnE? zFPFKLmr4qL8^fPR=gM4aBrM{g15D>@&8%em?!$-6&zDyhfBRUys(KBJMYWC9WzJgZ zO&Zq^BtmymIlp)SiSpj4KL5_m2VhdFn@cU`LgE z6cXJ=#$a?_N6S{Ul5G;4Wo#&#WR`%xCyRF|EnYfotd|LKkl876gI1Nil)pty`eJa89U!6!6a) zCyXXVM~q;C8UwE`W5MAiGm{v)Xn1u;Pb9mX`D?C&toT@C4emr3Nqz&*cOo=UDIdBe z?x(og;H@ofmtHGne5ZoCq=`aG4^1I)A@J)BO2ga~3gf7arDJjIesD$zuDY`#m7mRU zn}%65&ZNYo*tiM8C^xxAPt{gE}muKGXfZ`S`&bQ13K|L1_l tM_sGbf1_I7O#korkgg>YdTHtQu!lYDVGnn~KLY>&|Nkw8^Kt+%006v!A29#` literal 0 HcmV?d00001 diff --git a/assets/rancher-eks-operator-crd/rancher-eks-operator-crd-104.4.0+up1.9.4.tgz b/assets/rancher-eks-operator-crd/rancher-eks-operator-crd-104.4.0+up1.9.4.tgz new file mode 100644 index 0000000000000000000000000000000000000000..66db479bea63c6e7cd21a0c4661c086395445a1a GIT binary patch literal 1217 zcmV;y1U~y8iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI=cQzN$z=Xw7M&%J)X2^$E|=Ith2JIuB8=0fjX@rsQbukA{9 zxLl|IduM-y3&}1CWXS=8UKlK|K9W}Ytn3gNIYH{+lsncTfw$C=lpGExK)ySNOdsqj zaU92|{eJN`j^ow8@#%4V(CeS|j(h#yaeQ@%_rB=H=tl~F}bqYap|TZFjZ?RVq< z1y^G2>-{(OzsJmJ@W_Xf65fdj?(hHJ$;rv-O8=joo*ljQ|2|~7=)o!c>e1x?ad-L? z=gl+gMN?&xL1T?a8G1;-L(U&7bRxtAb=Kv{AyvFbA&qhV=pSlBC6P6q;A16F8xV#!~AH`FQi z$x^3G8Z^-Qvyl*vkdbEirRV0aKNv|Fk7+S>)gURJ?g0kn(TFFtb^c(S zh8oEwb>WHMjLIOzi<%a1GYnUkrB=Bh8d-m}PcIa?>Z`xy4^k|JxG(9-OWrt_B5r@PW6z2)qWR1L5z;3~8(HK1G8B z9+S()A^GvfGcb^1^4pzL;>G!sLws4fyS*#VyHDc zVQyr3R8em|NM&qo0PH$#Z{xVp`&qwY;M{{ey{=>_agsZsTOiGDd&TV~L9)Geaab&9 zYHYKnMIDE7Hud?x7bIm{vXwZ^rAdo=zF4M)!|DO3e&W|Z!pjhHsk zEt|+!PXTcp$H%>%`;Fsx{Ws|yCa;p-NphI0i zxc?Ghd9DmILgkbO0Gt^n)iC1B7>SWkT~-J)HHT$W@|bCnOo zkRlvY4SSlj5?N@yA^Sn}Z6*3al*D(7u2CW*46O>Fb$1sM|8qA+gg6uv__0d8Fh43q|^35zcBA-wzk8Y)dtFjAJYkue3O z-R@ABQQ42Unk?k*HkiFf4pOD&NNEs0nA%dMN!*KiQT*Go@WQ;bVLlVI`u{1DCDM}x zfGz$%K1mMN{eSPMxAXtc0Yj5=L3fR$H@3h7D7gdJ_w*kzQ)`#gld>yZW1})icX7VciOoAGCEE+1V+j zFkq4}*xQ41l_5yhM@in*s0L$ZvxjYjaOF>h3)4&UT}J!a z3?g45oGx677`E8|=Ml;R zHASX)d@8W5{!0#z*6jb}I7xQ){~R!zb-#wGn4~~xU?3!#+XCNAtXlX8Q~0_&p9jHg z7D9#tkt1|`a_~9x*}-RBr3W1d=W~ZB1`z$|Q%Ij)EXs=3v|>4}&>}Yj==>jbJC7oO zl5qK_v*HKyY~wkwf(L)~mD|D}!Htj-Se8L0oDb|Sr*Ng7i}v)|<|EKYscx#_T0FPG z`bO!oR4gOls+1NLh>tKUr4Qz2qzLO21E=M>lHJSD)YXlou|-w_jAc)XI(R`Y*3W|c^;ZM)T&}`PHiPnql0+o|DOZKBF|E&(yuEevC-zyea0hJnvv4tAI=3u<8P?y zR87#Zj2ULDKi`yDtM=|}y6IA)Yd40#3h^hc%EHz``}?1&LUPf_fuHsXxkf|Pt10Tf z8y=$Be+~Omko)BtnL+z>!were>^0(zPFveb8_l^bYnDa!^lNs>FjHF2=-I1QBMWOQ_fYHn}6A1z4R{q`(TUx*V;~x?*?zN|6cEKBmN&A z?)tya0(JXmML{c5f4kiJJ0iW0SP!xvDv;aB8Ve~nqZE<=U{O){_OZJ`eD9jLegI&M z^;@}R)q-OR02YU|nq6bjf@~1lLJDBPpoO(=?+irFWtrVo4Mp$^C-d-c+_mAg8^7UrnoWzXAOtc5iWHrm-M zf^D7d+3e1V^LeMX#2Rb7bhs)v_{FRa#(=80lf?1Ka#WZ3DgA{|H^#Zj4HG%)<-rQu z1BnNJHv;=sr`2J-r+e}h%;&Qie6^6ScF__!O3~_q1?Kbgeq6(bFrV)?dATg5yi`)~ z+Z6shI9KLUBcY3j9x$J-G_#QHyAK~OKVM#5{O#lN)w0(xn=Q9-d6~0PdXvWW1BuX` zRL(CRK%%-gs?Wc3^8uKY>gH05sgO9tcf^@wzJcv;msXe>S$2`j+bgBaAB9A}ktrBm z*3pUut!$G7X9epEDU3j>GXaokRWwIJIDP+q-B{c1!RmtUH4Y+7tQnH)=&xpiog;EE zHwp^Lc%7B0lH~+{aMPOX?D>X%CbV-?w;%}AO^zA#Z`}fog-b#Wq=0|cIASz%9WjCt zYK(%qjE=)gW=1J=(eULRJ(28k7OuFC3iq+b3jB#MlEMaF=tXFtQrY)Q+)r__!5drJ zF1=RDgkA-8Ni&6%?;9tv6ZrKSrG9Cg!Z>PU=~x`QADj__uk)-()n_x@rePM1Gbu51 z8#h82l%~`ON-xxZaecpHi?Qe$duF;;!%EYChI&0Y+H^V(SlM?5*6hf;)gM%bDa5@v zZgT2ooVPC!G@`~!=Vi|YTk`)ZqB9@SA6WxztN)Y3_4+?aPImpjXMx5?U5nIzty*4B k|L^#at|b$CY3X*bgB|Q(2Y10g0{{U3|K(2%DgZD502T-qivR!s literal 0 HcmV?d00001 diff --git a/assets/rancher-gke-operator-crd/rancher-gke-operator-crd-104.4.0+up1.9.4.tgz b/assets/rancher-gke-operator-crd/rancher-gke-operator-crd-104.4.0+up1.9.4.tgz new file mode 100644 index 0000000000000000000000000000000000000000..fb6fdc5e89904c2d2be83478934520760daa4b2f GIT binary patch literal 1483 zcmV;+1vL5}iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI>{a~d}g_cNbDlh+n}*d%UwBgD;k+_+3=(&t554i%lGk#yLk z)9>EV39yatA8?Rq>wRI6bi1qF{jFAeXF$>!nsz+Lw$f<8DbuEgoeyVVTxSW1I6IW0 zD2m?odf9IjMccp8yUXaT+q>#sc6;5+tL|CUeS7ux>WoAOORhnwbzsh-gJo@R?q5P6 zrE=i7lD6L>gn|R1;tmDp1a`POr)V6Xa%6q7ij~}DGtL;wK6&Fzif?k4NJ!9Xpx7s2 zux*#tVUoL8**+0mrVqKZ8co8TZEsfnc+VwM_cnL6L4jbg?G@PU;zh)_K=ZF?ELXBm z78fnhdh@s2`MJ|;F|^ch?Xsbdx7Xyi)#GHCTBnlFXjN(`e!wZ0JhN%5Lgr#4A?kH{ zo#=;D2U(}`e2pr=6(n&X2*>Hpcz z{3q+dv*@3(Jhq*9j*kd#S&h{5i;YTkw*1LtV6u`Ibp3dHJq-MY8NX~wi`0O~5thx`nKJI~ zkx@HaN5dSKaVo&Pe6~f1HfYf-@Qa*FbuWM6D46Y&DF}-#LM&Ap`{Zt&{8)>S73wod z?Ue}@-5`q2FoB=~AxfhhjBdVOj-L&Cp&qP`ueA-dHq#^Juk!?{Q<@9qf`zuH36ZG~ zFcH`%KBd2yF6QhBrGJ#=O%dXj-XasF1cH3ABFw7EpGe)->E0)G13raG7J6>Mam5b58%NfV~F+lJ3n$qPtgSKFTmt%XYwsB8;*%NF7vgo!MS1=p8W9f_?I~SX(7{~ zX9DPN(+L`h4(&kb8SE(_Ka^voVu3@045i~B#z+miCilP-t&GddTxEK3JrF|C?BEMv zZ8#FQVESGtIzLueu4IjoD#^esKZA_%m^h#Y!QnWatkT_{xl%DaiGBQO&neoI3Ok)Q z?8Xnrl#*J!(F4K3<_G)%N7{UofYz05gZV+g1VxUh=&q=7(;TP>iZ)@oj82~=teD-L0Dv@1}eBzMXj2Oov!@4+lX zQFL8ok^@RYf9#Kx%FD@xP^f|dR9*jS#$p|~m4->6s>&x&0uOhJ;ZUVAry}0w<`ZF@ z^>PciaoHHRO03b6n{9)po+#x$a67+EZ0=ogN0DTQ^fn*!Z}@R?xL-W4-~GyyY0ndg z@w6g~imXSfTW;;4VND%(-g8O(lU0Ex#+EgOU!XHCPwY1Zshf?d(&f%5Em3yV>sa0@ zI@JSdgP3T?J->q!_v(r_ptQ>M&3em0{2zCd^Y#9rd#rP^1j6YQX{iGP?O-)h-*O~0 zEWfAt1&Fj15XV)ZR-SD%#406b@5n$@mQuBJs?PjL))PRC z&)(D?e;znCKdIt8`yL~a3eGkE&@U~7Fzp*DH>16#$ l$i^Bgn~}f%KH29_uk=c<^h*C*`X>MY|NqY9B(MN3000BP;m800 literal 0 HcmV?d00001 diff --git a/assets/rancher-gke-operator/rancher-gke-operator-104.4.0+up1.9.4.tgz b/assets/rancher-gke-operator/rancher-gke-operator-104.4.0+up1.9.4.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c343b0647ddff8f0e42f74a745bd8b89c5f37aee GIT binary patch literal 2140 zcmV-i2&4BOiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PGrnZ`-)Ff9q2`I5%XwRkD;g$(^tc$kOg^xLy(@-EGC8C}`?g z;!KM=l5*;~{_X=wS(a=$&T?I{VSfMErXJrf@%^MF$!UhtPsiws0wvKx_AfFbbuc3n z{^CnO7>42LU|>JPFkJtP2FKBhXmA!CM}z42^z=m-og76cFChFP+;>2!G?6dDU(IV> zx&IL$c`h{3Oynx|04ULfi!`7_YmNaEeNt-Svs`Jyc?@00#iufPH6fa2odhUK%|;B9 zdUq#U#*zf{70ZV42OSw1yOKx8ialbe}E`Bj?CA?&aF9_pehK( z7~G<-W=i9v6IrMjILpgVolgst6Q-44W4*j%c_QvqH?|a0mZ0*}sf-~VBju&iD5=Ot zELA}|#s>B@>LjwXdQ11C;M+>|qaX^mt1givQRo{JbicsPZHkHlW0;Vfq&UG`d!%4L zEd`h!d88=npHc8_Fz^yoRI)ZG~&>8=ygqNtk zSOVA)|HHG*_&+$=$NwjRl#3zZRp{3o%{KrS9AD#zlw99n%9NI~7{uJD?-LFUl@vSnbIIeV4i^{EY}LO04=yt9^tnVe<_(n z1wYj6z-F-1-+2|5O~UZ=2hR|^mP|;dXBV6(bx9^zsep;0n_$7k%%~H1#X6?7(F5Oq zr~hl56r5;O{mZL&Z*BwqN&lKNw#)yIj*r&-|MYBM|2+-77bRq5iq(lSrz=Caai_wj z>DqnkY(Jkv;97+9x(0y7!h7A!|L-!U>b67Vy_ z4*&m{Aumv>Ko^fM1$Om+(ecTe|DT;k(cb@`0_OAn*Dz(17!+z4F^+mx;H!x-3(YWw zultLI=gsFnBsgL@LeCWk9}`y{e3Vsr&;x(5u!w8~!B4J)bmhget>`Q(>TQK&xgJ69 zH>%%z6anN4>mR+9JeVgN-#w$a_czzME#nc~G0uS`2~^6tOm2$^+v?f$u3nk~1cu1P zUA5du;3hlY2|4D1Bnqe~xj_X*GfYbEvbWBJ!X`z}TDfUt`_Q+=M}xT2$%iqTLa5oX znvU6)?Qyl&EZ}H_RL9V}6t@+Bv%K{47X=)Up8Ig` zVJGZ}|CM7%!SV6!;I8`b^fYY8|D*8aDBQ>Yr+_iblNhS<>qc;Fjd|pd(14UW6O#SY zhM-{ljjAS96VxOjnwaj-4Q1B4y{$txS#q@FMjuGQzLTOXOyhHS_@QbfmxCPm`A{L1 zs8#i7igIX|Q`Cnq;gBM;Lf`91t9DaAbBa z-R2%CJb=w;)fswJIs6AwZ3n?_%Pq<&qj*lKD0BU92dw9QOaD38;s1>})8nVXJN$oe zauTiQ|Kq_v|33*d{ht(tTDkh``qgjA^e$sP$bVFU)NGbma7KxWA@Ts09fcbo+Z)8U zc53Su09tortF9#-8^2#3(rR}@L<77Sj6|^YLdcYaoCpS zy5#&?a7Je_{AF}0^tD8VHZM9LGBssq&$kyeujX^;;$R=b=XzLTFJNG?=zXXOVLn}% zdTFfh-@Uv3cztvA_xJUqdU(-bRbL0K-eQ}^?E{IZtyC_r9zdeHd1~(8dYS+T=i=^K zvMJ-3;u}Q?CvGC{?x$9m5=nBE^Vy9M`p=A`I}tHxSvJv%C9PzW1SJI-GR`zZ)f56C zk)mj?_;CLA?Yj4O-J~@YJ!ttaOpISEdquF?31$z=LEi}|IH65Zrh=Cf{LyY}i*w*^ z2off3+?xSYAntNZU^uf3T8vAD5|jY?QDR0^W=CuaGL#s2O&zU-*FqbzV`5)ihA=91DG`KRn*Zwde!~`H z*4O6D^o@muRR103b>!4$(0Kr7H)>e(BNy9#6bZ%<4#Kc4soine&A@A=q3162w!n`1 zzsl&uW%Nh(0K5AC=y<*VkD{}E{r@D;`cv1k^k3_i*USGcf28YZsh?ZBJ?vo*d)UJ^ S_*Vb`0RR6teng%CFaQ9J*(SLF literal 0 HcmV?d00001 diff --git a/charts/rancher-aks-operator-crd/104.4.0+up1.9.4/Chart.yaml b/charts/rancher-aks-operator-crd/104.4.0+up1.9.4/Chart.yaml new file mode 100644 index 0000000000..00a1c290ae --- /dev/null +++ b/charts/rancher-aks-operator-crd/104.4.0+up1.9.4/Chart.yaml @@ -0,0 +1,12 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-aks-operator-crd +apiVersion: v2 +appVersion: 1.9.4 +description: AKS Operator CustomResourceDefinitions +name: rancher-aks-operator-crd +version: 104.4.0+up1.9.4 diff --git a/charts/rancher-aks-operator-crd/104.4.0+up1.9.4/templates/crds.yaml b/charts/rancher-aks-operator-crd/104.4.0+up1.9.4/templates/crds.yaml new file mode 100644 index 0000000000..c4fcdfac05 --- /dev/null +++ b/charts/rancher-aks-operator-crd/104.4.0+up1.9.4/templates/crds.yaml @@ -0,0 +1,211 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + helm.sh/resource-policy: keep + name: aksclusterconfigs.aks.cattle.io +spec: + group: aks.cattle.io + names: + kind: AKSClusterConfig + plural: aksclusterconfigs + shortNames: + - akscc + singular: aksclusterconfig + preserveUnknownFields: false + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + authBaseUrl: + nullable: true + type: string + authorizedIpRanges: + items: + nullable: true + type: string + nullable: true + type: array + azureCredentialSecret: + nullable: true + type: string + baseUrl: + nullable: true + type: string + clusterName: + nullable: true + type: string + dnsPrefix: + nullable: true + type: string + dnsServiceIp: + nullable: true + type: string + dockerBridgeCidr: + nullable: true + type: string + httpApplicationRouting: + nullable: true + type: boolean + imported: + type: boolean + kubernetesVersion: + nullable: true + type: string + linuxAdminUsername: + nullable: true + type: string + loadBalancerSku: + nullable: true + type: string + logAnalyticsWorkspaceGroup: + nullable: true + type: string + logAnalyticsWorkspaceName: + nullable: true + type: string + managedIdentity: + nullable: true + type: boolean + monitoring: + nullable: true + type: boolean + networkPlugin: + nullable: true + type: string + networkPolicy: + nullable: true + type: string + nodePools: + items: + properties: + availabilityZones: + items: + nullable: true + type: string + nullable: true + type: array + count: + nullable: true + type: integer + enableAutoScaling: + nullable: true + type: boolean + maxCount: + nullable: true + type: integer + maxPods: + nullable: true + type: integer + maxSurge: + nullable: true + type: string + minCount: + nullable: true + type: integer + mode: + nullable: true + type: string + name: + nullable: true + type: string + nodeLabels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + nodeTaints: + items: + nullable: true + type: string + nullable: true + type: array + orchestratorVersion: + nullable: true + type: string + osDiskSizeGB: + nullable: true + type: integer + osDiskType: + nullable: true + type: string + osType: + nullable: true + type: string + vmSize: + nullable: true + type: string + vnetSubnetID: + nullable: true + type: string + type: object + nullable: true + type: array + nodeResourceGroup: + nullable: true + type: string + outboundType: + nullable: true + type: string + podCidr: + nullable: true + type: string + privateCluster: + nullable: true + type: boolean + privateDnsZone: + nullable: true + type: string + resourceGroup: + nullable: true + type: string + resourceLocation: + nullable: true + type: string + serviceCidr: + nullable: true + type: string + sshPublicKey: + nullable: true + type: string + subnet: + nullable: true + type: string + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + userAssignedIdentity: + nullable: true + type: string + virtualNetwork: + nullable: true + type: string + virtualNetworkResourceGroup: + nullable: true + type: string + type: object + status: + properties: + failureMessage: + nullable: true + type: string + phase: + nullable: true + type: string + rbacEnabled: + nullable: true + type: boolean + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-aks-operator/104.4.0+up1.9.4/Chart.yaml b/charts/rancher-aks-operator/104.4.0+up1.9.4/Chart.yaml new file mode 100644 index 0000000000..871e341ac7 --- /dev/null +++ b/charts/rancher-aks-operator/104.4.0+up1.9.4/Chart.yaml @@ -0,0 +1,20 @@ +annotations: + catalog.cattle.io/auto-install: rancher-aks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.26.0-0 < 1.31.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: aksclusterconfigs.aks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.10.0-0' + catalog.cattle.io/release-name: rancher-aks-operator + catalog.cattle.io/scope: management +apiVersion: v2 +appVersion: 1.9.4 +description: A Helm chart for provisioning AKS clusters +home: https://github.com/rancher/aks-operator +name: rancher-aks-operator +sources: +- https://github.com/rancher/aks-operator +version: 104.4.0+up1.9.4 diff --git a/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/NOTES.txt b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/NOTES.txt new file mode 100644 index 0000000000..5ba05b482c --- /dev/null +++ b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/NOTES.txt @@ -0,0 +1,4 @@ +You have deployed the Rancher AKS operator +Version: {{ .Chart.AppVersion }} +Description: This operator provisions AKS clusters +from AKSClusterConfig CRs. diff --git a/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/_helpers.tpl b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/_helpers.tpl new file mode 100644 index 0000000000..de3b332f6a --- /dev/null +++ b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/_helpers.tpl @@ -0,0 +1,25 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} + diff --git a/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/clusterrole.yaml b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/clusterrole.yaml new file mode 100644 index 0000000000..5e2ce97567 --- /dev/null +++ b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/clusterrole.yaml @@ -0,0 +1,15 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: aks-operator + namespace: cattle-system +rules: + - apiGroups: [''] + resources: ['secrets'] + verbs: ['get', 'list', 'create', 'watch', 'update'] + - apiGroups: ['aks.cattle.io'] + resources: ['aksclusterconfigs'] + verbs: ['get', 'list', 'update', 'watch'] + - apiGroups: ['aks.cattle.io'] + resources: ['aksclusterconfigs/status'] + verbs: ['update'] diff --git a/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml new file mode 100644 index 0000000000..7aa7e785a4 --- /dev/null +++ b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: aks-operator + namespace: cattle-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: aks-operator +subjects: +- kind: ServiceAccount + name: aks-operator + namespace: cattle-system diff --git a/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/deployment.yaml b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/deployment.yaml new file mode 100644 index 0000000000..e929a85cdc --- /dev/null +++ b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/deployment.yaml @@ -0,0 +1,68 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: aks-config-operator + namespace: cattle-system +spec: + replicas: 1 + selector: + matchLabels: + ke.cattle.io/operator: aks + template: + metadata: + labels: + ke.cattle.io/operator: aks + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + serviceAccountName: aks-operator + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + securityContext: + fsGroup: 1007 + runAsUser: 1007 + containers: + - name: aks-operator + image: '{{ template "system_default_registry" $ }}{{ $.Values.aksOperator.image.repository }}:{{ $.Values.aksOperator.image.tag }}' + imagePullPolicy: IfNotPresent + env: + - name: HTTP_PROXY + value: {{ .Values.httpProxy }} + - name: HTTPS_PROXY + value: {{ .Values.httpsProxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + privileged: false + capabilities: + drop: + - ALL +{{- if .Values.additionalTrustedCAs }} + # aks-operator mounts the additional CAs in two places: + volumeMounts: + # This directory is owned by the aks-operator user so c_rehash works here. + - mountPath: /etc/rancher/ssl/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + # This directory is root-owned so c_rehash doesn't work here, + # but the cert is here in case update-ca-certificates is called in the future or by the OS. + - mountPath: /etc/pki/trust/anchors/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + volumes: + - name: tls-ca-additional-volume + secret: + defaultMode: 0400 + secretName: tls-ca-additional + {{- end }} diff --git a/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml new file mode 100644 index 0000000000..9c40a152f5 --- /dev/null +++ b/charts/rancher-aks-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: cattle-system + name: aks-operator diff --git a/charts/rancher-aks-operator/104.4.0+up1.9.4/values.yaml b/charts/rancher-aks-operator/104.4.0+up1.9.4/values.yaml new file mode 100644 index 0000000000..e449885e49 --- /dev/null +++ b/charts/rancher-aks-operator/104.4.0+up1.9.4/values.yaml @@ -0,0 +1,23 @@ +global: + cattle: + systemDefaultRegistry: "" + +aksOperator: + image: + repository: rancher/aks-operator + tag: v1.9.4 + +httpProxy: "" +httpsProxy: "" +noProxy: "" +additionalTrustedCAs: false + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" diff --git a/charts/rancher-eks-operator-crd/104.4.0+up1.9.4/Chart.yaml b/charts/rancher-eks-operator-crd/104.4.0+up1.9.4/Chart.yaml new file mode 100644 index 0000000000..5997be2cfb --- /dev/null +++ b/charts/rancher-eks-operator-crd/104.4.0+up1.9.4/Chart.yaml @@ -0,0 +1,12 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-eks-operator-crd +apiVersion: v2 +appVersion: 1.9.4 +description: EKS Operator CustomResourceDefinitions +name: rancher-eks-operator-crd +version: 104.4.0+up1.9.4 diff --git a/charts/rancher-eks-operator-crd/104.4.0+up1.9.4/templates/crds.yaml b/charts/rancher-eks-operator-crd/104.4.0+up1.9.4/templates/crds.yaml new file mode 100644 index 0000000000..5f2e07b221 --- /dev/null +++ b/charts/rancher-eks-operator-crd/104.4.0+up1.9.4/templates/crds.yaml @@ -0,0 +1,229 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + helm.sh/resource-policy: keep + name: eksclusterconfigs.eks.cattle.io +spec: + group: eks.cattle.io + names: + kind: EKSClusterConfig + plural: eksclusterconfigs + shortNames: + - ekscc + singular: eksclusterconfig + preserveUnknownFields: false + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + amazonCredentialSecret: + nullable: true + type: string + displayName: + nullable: true + type: string + ebsCSIDriver: + nullable: true + type: boolean + imported: + type: boolean + kmsKey: + nullable: true + type: string + kubernetesVersion: + nullable: true + type: string + loggingTypes: + items: + nullable: true + type: string + nullable: true + type: array + nodeGroups: + items: + properties: + arm: + nullable: true + type: boolean + desiredSize: + nullable: true + type: integer + diskSize: + nullable: true + type: integer + ec2SshKey: + nullable: true + type: string + gpu: + nullable: true + type: boolean + imageId: + nullable: true + type: string + instanceType: + nullable: true + type: string + labels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + launchTemplate: + nullable: true + properties: + id: + nullable: true + type: string + name: + nullable: true + type: string + version: + nullable: true + type: integer + type: object + maxSize: + nullable: true + type: integer + minSize: + nullable: true + type: integer + nodeRole: + nullable: true + type: string + nodegroupName: + nullable: true + type: string + requestSpotInstances: + nullable: true + type: boolean + resourceTags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + spotInstanceTypes: + items: + nullable: true + type: string + nullable: true + type: array + subnets: + items: + nullable: true + type: string + nullable: true + type: array + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + userData: + nullable: true + type: string + version: + nullable: true + type: string + required: + - nodegroupName + type: object + nullable: true + type: array + privateAccess: + nullable: true + type: boolean + publicAccess: + nullable: true + type: boolean + publicAccessSources: + items: + nullable: true + type: string + nullable: true + type: array + region: + nullable: true + type: string + secretsEncryption: + nullable: true + type: boolean + securityGroups: + items: + nullable: true + type: string + nullable: true + type: array + serviceRole: + nullable: true + type: string + subnets: + items: + nullable: true + type: string + nullable: true + type: array + tags: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + type: object + status: + properties: + failureMessage: + nullable: true + type: string + generatedNodeRole: + nullable: true + type: string + managedLaunchTemplateID: + nullable: true + type: string + managedLaunchTemplateVersions: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + networkFieldsSource: + nullable: true + type: string + phase: + nullable: true + type: string + securityGroups: + items: + nullable: true + type: string + nullable: true + type: array + subnets: + items: + nullable: true + type: string + nullable: true + type: array + templateVersionsToDelete: + items: + nullable: true + type: string + nullable: true + type: array + virtualNetwork: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-eks-operator/104.4.0+up1.9.4/Chart.yaml b/charts/rancher-eks-operator/104.4.0+up1.9.4/Chart.yaml new file mode 100644 index 0000000000..d287229003 --- /dev/null +++ b/charts/rancher-eks-operator/104.4.0+up1.9.4/Chart.yaml @@ -0,0 +1,20 @@ +annotations: + catalog.cattle.io/auto-install: rancher-eks-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.26.0-0 < 1.31.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: eksclusterconfigs.eks.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.10.0-0' + catalog.cattle.io/release-name: rancher-eks-operator + catalog.cattle.io/scope: management +apiVersion: v2 +appVersion: 1.9.4 +description: A Helm chart for provisioning EKS clusters +home: https://github.com/rancher/eks-operator +name: rancher-eks-operator +sources: +- https://github.com/rancher/eks-operator +version: 104.4.0+up1.9.4 diff --git a/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/NOTES.txt b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/NOTES.txt new file mode 100644 index 0000000000..23a1b4a8bf --- /dev/null +++ b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/NOTES.txt @@ -0,0 +1,4 @@ +You have deployed the Rancher EKS operator +Version: {{ .Chart.AppVersion }} +Description: This operator provisions EKS clusters +from EKSClusterConfig CRs. diff --git a/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/_helpers.tpl b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/_helpers.tpl new file mode 100644 index 0000000000..de3b332f6a --- /dev/null +++ b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/_helpers.tpl @@ -0,0 +1,25 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} + diff --git a/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/clusterrole.yaml b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/clusterrole.yaml new file mode 100644 index 0000000000..d0d561b6ea --- /dev/null +++ b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/clusterrole.yaml @@ -0,0 +1,15 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: eks-operator + namespace: cattle-system +rules: + - apiGroups: [''] + resources: ['secrets'] + verbs: ['get', 'list', 'create', 'watch'] + - apiGroups: ['eks.cattle.io'] + resources: ['eksclusterconfigs'] + verbs: ['get', 'list', 'update', 'watch'] + - apiGroups: ['eks.cattle.io'] + resources: ['eksclusterconfigs/status'] + verbs: ['update'] diff --git a/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml new file mode 100644 index 0000000000..2b1846353e --- /dev/null +++ b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: eks-operator + namespace: cattle-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: eks-operator +subjects: +- kind: ServiceAccount + name: eks-operator + namespace: cattle-system diff --git a/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/deployment.yaml b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/deployment.yaml new file mode 100644 index 0000000000..27b1f58366 --- /dev/null +++ b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/deployment.yaml @@ -0,0 +1,68 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: eks-config-operator + namespace: cattle-system +spec: + replicas: 1 + selector: + matchLabels: + ke.cattle.io/operator: eks + template: + metadata: + labels: + ke.cattle.io/operator: eks + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + serviceAccountName: eks-operator + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + securityContext: + fsGroup: 1007 + runAsUser: 1007 + containers: + - name: eks-operator + image: '{{ template "system_default_registry" $ }}{{ $.Values.eksOperator.image.repository }}:{{ $.Values.eksOperator.image.tag }}' + imagePullPolicy: IfNotPresent + env: + - name: HTTP_PROXY + value: {{ .Values.httpProxy }} + - name: HTTPS_PROXY + value: {{ .Values.httpsProxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + privileged: false + capabilities: + drop: + - ALL +{{- if .Values.additionalTrustedCAs }} + # eks-operator mounts the additional CAs in two places: + volumeMounts: + # This directory is owned by the eks-operator user so c_rehash works here. + - mountPath: /etc/rancher/ssl/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + # This directory is root-owned so c_rehash doesn't work here, + # but the cert is here in case update-ca-certificates is called in the future or by the OS. + - mountPath: /etc/pki/trust/anchors/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + volumes: + - name: tls-ca-additional-volume + secret: + defaultMode: 0400 + secretName: tls-ca-additional + {{- end }} diff --git a/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml new file mode 100644 index 0000000000..934de07e0d --- /dev/null +++ b/charts/rancher-eks-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: cattle-system + name: eks-operator diff --git a/charts/rancher-eks-operator/104.4.0+up1.9.4/values.yaml b/charts/rancher-eks-operator/104.4.0+up1.9.4/values.yaml new file mode 100644 index 0000000000..869666bb5e --- /dev/null +++ b/charts/rancher-eks-operator/104.4.0+up1.9.4/values.yaml @@ -0,0 +1,22 @@ +global: + cattle: + systemDefaultRegistry: "" + +eksOperator: + image: + repository: rancher/eks-operator + tag: v1.9.4 + +httpProxy: "" +httpsProxy: "" +noProxy: "" +additionalTrustedCAs: false +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" diff --git a/charts/rancher-gke-operator-crd/104.4.0+up1.9.4/Chart.yaml b/charts/rancher-gke-operator-crd/104.4.0+up1.9.4/Chart.yaml new file mode 100644 index 0000000000..7dd04c8b62 --- /dev/null +++ b/charts/rancher-gke-operator-crd/104.4.0+up1.9.4/Chart.yaml @@ -0,0 +1,12 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/release-name: rancher-gke-operator-crd +apiVersion: v2 +appVersion: 1.9.4 +description: GKE Operator CustomResourceDefinitions +name: rancher-gke-operator-crd +version: 104.4.0+up1.9.4 diff --git a/charts/rancher-gke-operator-crd/104.4.0+up1.9.4/templates/crds.yaml b/charts/rancher-gke-operator-crd/104.4.0+up1.9.4/templates/crds.yaml new file mode 100644 index 0000000000..53fed0719c --- /dev/null +++ b/charts/rancher-gke-operator-crd/104.4.0+up1.9.4/templates/crds.yaml @@ -0,0 +1,272 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + helm.sh/resource-policy: keep + name: gkeclusterconfigs.gke.cattle.io +spec: + group: gke.cattle.io + names: + kind: GKEClusterConfig + plural: gkeclusterconfigs + shortNames: + - gkecc + singular: gkeclusterconfig + preserveUnknownFields: false + scope: Namespaced + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + autopilotConfig: + nullable: true + properties: + enabled: + type: boolean + type: object + clusterAddons: + nullable: true + properties: + horizontalPodAutoscaling: + type: boolean + httpLoadBalancing: + type: boolean + networkPolicyConfig: + type: boolean + type: object + clusterIpv4Cidr: + nullable: true + type: string + clusterName: + nullable: true + type: string + customerManagedEncryptionKey: + nullable: true + properties: + keyName: + nullable: true + type: string + ringName: + nullable: true + type: string + type: object + description: + nullable: true + type: string + enableKubernetesAlpha: + nullable: true + type: boolean + googleCredentialSecret: + nullable: true + type: string + imported: + type: boolean + ipAllocationPolicy: + nullable: true + properties: + clusterIpv4CidrBlock: + nullable: true + type: string + clusterSecondaryRangeName: + nullable: true + type: string + createSubnetwork: + type: boolean + nodeIpv4CidrBlock: + nullable: true + type: string + servicesIpv4CidrBlock: + nullable: true + type: string + servicesSecondaryRangeName: + nullable: true + type: string + subnetworkName: + nullable: true + type: string + useIpAliases: + type: boolean + type: object + kubernetesVersion: + nullable: true + type: string + labels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + locations: + items: + nullable: true + type: string + nullable: true + type: array + loggingService: + nullable: true + type: string + maintenanceWindow: + nullable: true + type: string + masterAuthorizedNetworks: + nullable: true + properties: + cidrBlocks: + items: + properties: + cidrBlock: + nullable: true + type: string + displayName: + nullable: true + type: string + type: object + nullable: true + type: array + enabled: + type: boolean + type: object + monitoringService: + nullable: true + type: string + network: + nullable: true + type: string + networkPolicyEnabled: + nullable: true + type: boolean + nodePools: + items: + properties: + autoscaling: + nullable: true + properties: + enabled: + type: boolean + maxNodeCount: + type: integer + minNodeCount: + type: integer + type: object + config: + nullable: true + properties: + bootDiskKmsKey: + nullable: true + type: string + diskSizeGb: + type: integer + diskType: + nullable: true + type: string + imageType: + nullable: true + type: string + labels: + additionalProperties: + nullable: true + type: string + nullable: true + type: object + localSsdCount: + type: integer + machineType: + nullable: true + type: string + oauthScopes: + items: + nullable: true + type: string + nullable: true + type: array + preemptible: + type: boolean + serviceAccount: + nullable: true + type: string + tags: + items: + nullable: true + type: string + nullable: true + type: array + taints: + items: + properties: + effect: + nullable: true + type: string + key: + nullable: true + type: string + value: + nullable: true + type: string + type: object + nullable: true + type: array + type: object + initialNodeCount: + nullable: true + type: integer + management: + nullable: true + properties: + autoRepair: + type: boolean + autoUpgrade: + type: boolean + type: object + maxPodsConstraint: + nullable: true + type: integer + name: + nullable: true + type: string + version: + nullable: true + type: string + type: object + nullable: true + type: array + privateClusterConfig: + nullable: true + properties: + enablePrivateEndpoint: + type: boolean + enablePrivateNodes: + type: boolean + masterIpv4CidrBlock: + nullable: true + type: string + type: object + projectID: + nullable: true + type: string + region: + nullable: true + type: string + subnetwork: + nullable: true + type: string + zone: + nullable: true + type: string + type: object + status: + properties: + failureMessage: + nullable: true + type: string + phase: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-gke-operator/104.4.0+up1.9.4/Chart.yaml b/charts/rancher-gke-operator/104.4.0+up1.9.4/Chart.yaml new file mode 100644 index 0000000000..dc89c1745d --- /dev/null +++ b/charts/rancher-gke-operator/104.4.0+up1.9.4/Chart.yaml @@ -0,0 +1,20 @@ +annotations: + catalog.cattle.io/auto-install: rancher-gke-operator-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/kube-version: '>= 1.26.0-0 < 1.31.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: gkeclusterconfigs.gke.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.10.0-0' + catalog.cattle.io/release-name: rancher-gke-operator + catalog.cattle.io/scope: management +apiVersion: v2 +appVersion: 1.9.4 +description: A Helm chart for provisioning GKE clusters +home: https://github.com/rancher/gke-operator +name: rancher-gke-operator +sources: +- https://github.com/rancher/gke-operator +version: 104.4.0+up1.9.4 diff --git a/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/NOTES.txt b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/NOTES.txt new file mode 100644 index 0000000000..238173d1bd --- /dev/null +++ b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/NOTES.txt @@ -0,0 +1,4 @@ +You have deployed the Rancher GKE operator +Version: {{ .Chart.AppVersion }} +Description: This operator provisions GKE clusters +from GKEClusterConfig CRs. diff --git a/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/_helpers.tpl b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/_helpers.tpl new file mode 100644 index 0000000000..de3b332f6a --- /dev/null +++ b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/_helpers.tpl @@ -0,0 +1,25 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} + diff --git a/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/clusterrole.yaml b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/clusterrole.yaml new file mode 100644 index 0000000000..7c352696ee --- /dev/null +++ b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/clusterrole.yaml @@ -0,0 +1,15 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: gke-operator + namespace: cattle-system +rules: + - apiGroups: [''] + resources: ['secrets'] + verbs: ['get', 'list', 'create', 'watch'] + - apiGroups: ['gke.cattle.io'] + resources: ['gkeclusterconfigs'] + verbs: ['get', 'list', 'update', 'watch'] + - apiGroups: ['gke.cattle.io'] + resources: ['gkeclusterconfigs/status'] + verbs: ['update'] diff --git a/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml new file mode 100644 index 0000000000..e2af390c71 --- /dev/null +++ b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/clusterrolebinding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: gke-operator + namespace: cattle-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: gke-operator +subjects: +- kind: ServiceAccount + name: gke-operator + namespace: cattle-system diff --git a/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/deployment.yaml b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/deployment.yaml new file mode 100644 index 0000000000..731fa1d4c2 --- /dev/null +++ b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/deployment.yaml @@ -0,0 +1,69 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: gke-config-operator + namespace: cattle-system +spec: + replicas: 1 + selector: + matchLabels: + ke.cattle.io/operator: gke + template: + metadata: + labels: + ke.cattle.io/operator: gke + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + serviceAccountName: gke-operator + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + securityContext: + fsGroup: 1007 + runAsUser: 1007 + containers: + - name: rancher-gke-operator + image: '{{ template "system_default_registry" $ }}{{ $.Values.gkeOperator.image.repository }}:{{ $.Values.gkeOperator.image.tag }}' + imagePullPolicy: IfNotPresent + args: ["-debug={{ .Values.gkeOperator.debug | default false }}"] + env: + - name: HTTP_PROXY + value: {{ .Values.httpProxy }} + - name: HTTPS_PROXY + value: {{ .Values.httpsProxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + privileged: false + capabilities: + drop: + - ALL +{{- if .Values.additionalTrustedCAs }} + # gke-operator mounts the additional CAs in two places: + volumeMounts: + # This directory is owned by the gke-operator user so c_rehash works here. + - mountPath: /etc/rancher/ssl/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + # This directory is root-owned so c_rehash doesn't work here, + # but the cert is here in case update-ca-certificates is called in the future or by the OS. + - mountPath: /etc/pki/trust/anchors/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + volumes: + - name: tls-ca-additional-volume + secret: + defaultMode: 0400 + secretName: tls-ca-additional + {{- end }} diff --git a/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml new file mode 100644 index 0000000000..ba52af6280 --- /dev/null +++ b/charts/rancher-gke-operator/104.4.0+up1.9.4/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: cattle-system + name: gke-operator diff --git a/charts/rancher-gke-operator/104.4.0+up1.9.4/values.yaml b/charts/rancher-gke-operator/104.4.0+up1.9.4/values.yaml new file mode 100644 index 0000000000..54971b6b6d --- /dev/null +++ b/charts/rancher-gke-operator/104.4.0+up1.9.4/values.yaml @@ -0,0 +1,23 @@ +global: + cattle: + systemDefaultRegistry: "" + +gkeOperator: + image: + repository: rancher/gke-operator + tag: v1.9.4 + debug: false + +httpProxy: "" +httpsProxy: "" +noProxy: "" +additionalTrustedCAs: false +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: "" diff --git a/index.yaml b/index.yaml index 37528880c9..9f60dd00b6 100755 --- a/index.yaml +++ b/index.yaml @@ -10021,26 +10021,26 @@ entries: catalog.cattle.io/auto-install: rancher-aks-operator-crd=match catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" - catalog.cattle.io/kube-version: '>= 1.23.0-0 < 1.32.0-0' + catalog.cattle.io/kube-version: '>= 1.26.0-0 < 1.31.0-0' catalog.cattle.io/namespace: cattle-system catalog.cattle.io/os: linux catalog.cattle.io/permits-os: linux,windows catalog.cattle.io/provides-gvr: aksclusterconfigs.aks.cattle.io/v1 - catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.11.0-0' + catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.10.0-0' catalog.cattle.io/release-name: rancher-aks-operator catalog.cattle.io/scope: management apiVersion: v2 - appVersion: 1.9.4-rc.2 - created: "2024-10-31T16:50:39.214334502+01:00" + appVersion: 1.9.4 + created: "2024-11-07T14:37:44.925367469+01:00" description: A Helm chart for provisioning AKS clusters - digest: e28f3ab183d8055711942269ee29518c4d9544107d6d24f502430f728a09d2cb + digest: d6fdfc40560fed71a58b0f4beb94b986e357cb61346d7211580920028c9bdb85 home: https://github.com/rancher/aks-operator name: rancher-aks-operator sources: - https://github.com/rancher/aks-operator urls: - - assets/rancher-aks-operator/rancher-aks-operator-104.4.0+up1.9.4-rc.2.tgz - version: 104.4.0+up1.9.4-rc.2 + - assets/rancher-aks-operator/rancher-aks-operator-104.4.0+up1.9.4.tgz + version: 104.4.0+up1.9.4 - annotations: catalog.cattle.io/auto-install: rancher-aks-operator-crd=match catalog.cattle.io/certified: rancher @@ -10671,14 +10671,14 @@ entries: catalog.cattle.io/permits-os: linux,windows catalog.cattle.io/release-name: rancher-aks-operator-crd apiVersion: v2 - appVersion: 1.9.4-rc.2 - created: "2024-10-31T16:50:42.106751532+01:00" + appVersion: 1.9.4 + created: "2024-11-07T14:37:48.192382614+01:00" description: AKS Operator CustomResourceDefinitions - digest: 9d0e16836ff4119067aacb6846a3d6fe4403d954ac5f9729e4b98f2bbacc6cb2 + digest: b69251416023d82d6c7b1c23b868224ba903cc494c6ce4c6dbef207a1ff868c5 name: rancher-aks-operator-crd urls: - - assets/rancher-aks-operator-crd/rancher-aks-operator-crd-104.4.0+up1.9.4-rc.2.tgz - version: 104.4.0+up1.9.4-rc.2 + - assets/rancher-aks-operator-crd/rancher-aks-operator-crd-104.4.0+up1.9.4.tgz + version: 104.4.0+up1.9.4 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" @@ -14385,26 +14385,26 @@ entries: catalog.cattle.io/auto-install: rancher-eks-operator-crd=match catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" - catalog.cattle.io/kube-version: '>= 1.23.0-0 < 1.32.0-0' + catalog.cattle.io/kube-version: '>= 1.26.0-0 < 1.31.0-0' catalog.cattle.io/namespace: cattle-system catalog.cattle.io/os: linux catalog.cattle.io/permits-os: linux,windows catalog.cattle.io/provides-gvr: eksclusterconfigs.eks.cattle.io/v1 - catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.11.0-0' + catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.10.0-0' catalog.cattle.io/release-name: rancher-eks-operator catalog.cattle.io/scope: management apiVersion: v2 - appVersion: 1.9.4-rc.2 - created: "2024-10-31T16:50:52.979602731+01:00" + appVersion: 1.9.4 + created: "2024-11-07T14:38:07.948988307+01:00" description: A Helm chart for provisioning EKS clusters - digest: 031495121257d2d77686965d37c8d5a02eb245521984d1277820964156647b46 + digest: ee7a7357883ee221ebfd30e1c481e84f1d6b5625bdf339b678109117e47d57d5 home: https://github.com/rancher/eks-operator name: rancher-eks-operator sources: - https://github.com/rancher/eks-operator urls: - - assets/rancher-eks-operator/rancher-eks-operator-104.4.0+up1.9.4-rc.2.tgz - version: 104.4.0+up1.9.4-rc.2 + - assets/rancher-eks-operator/rancher-eks-operator-104.4.0+up1.9.4.tgz + version: 104.4.0+up1.9.4 - annotations: catalog.cattle.io/auto-install: rancher-eks-operator-crd=match catalog.cattle.io/certified: rancher @@ -15012,14 +15012,14 @@ entries: catalog.cattle.io/permits-os: linux,windows catalog.cattle.io/release-name: rancher-eks-operator-crd apiVersion: v2 - appVersion: 1.9.4-rc.2 - created: "2024-10-31T16:50:55.629073466+01:00" + appVersion: 1.9.4 + created: "2024-11-07T14:38:10.720543903+01:00" description: EKS Operator CustomResourceDefinitions - digest: b4ead7fd577f3c1000d10bfb567ace29385e7cefc920067e391f8d17301eac4d + digest: 7fee92ded6fa56187ac6b3136ddd2758e01b7effe936bb1284fb4ce916af69a4 name: rancher-eks-operator-crd urls: - - assets/rancher-eks-operator-crd/rancher-eks-operator-crd-104.4.0+up1.9.4-rc.2.tgz - version: 104.4.0+up1.9.4-rc.2 + - assets/rancher-eks-operator-crd/rancher-eks-operator-crd-104.4.0+up1.9.4.tgz + version: 104.4.0+up1.9.4 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" @@ -16423,26 +16423,26 @@ entries: catalog.cattle.io/auto-install: rancher-gke-operator-crd=match catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" - catalog.cattle.io/kube-version: '>= 1.23.0-0 < 1.32.0-0' + catalog.cattle.io/kube-version: '>= 1.26.0-0 < 1.31.0-0' catalog.cattle.io/namespace: cattle-system catalog.cattle.io/os: linux catalog.cattle.io/permits-os: linux,windows catalog.cattle.io/provides-gvr: gkeclusterconfigs.gke.cattle.io/v1 - catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.11.0-0' + catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.10.0-0' catalog.cattle.io/release-name: rancher-gke-operator catalog.cattle.io/scope: management apiVersion: v2 - appVersion: 1.9.4-rc.1 - created: "2024-10-31T16:51:04.477778804+01:00" + appVersion: 1.9.4 + created: "2024-11-07T14:39:02.710831976+01:00" description: A Helm chart for provisioning GKE clusters - digest: 24aadff452f42183c6c54c194afaaf78e8531d28336886544a10ff1636326b53 + digest: 31e8654f3c22c11ba867acedcd42390965935bef4e02fb0a9e189f212c3f26b1 home: https://github.com/rancher/gke-operator name: rancher-gke-operator sources: - https://github.com/rancher/gke-operator urls: - - assets/rancher-gke-operator/rancher-gke-operator-104.4.0+up1.9.4-rc.1.tgz - version: 104.4.0+up1.9.4-rc.1 + - assets/rancher-gke-operator/rancher-gke-operator-104.4.0+up1.9.4.tgz + version: 104.4.0+up1.9.4 - annotations: catalog.cattle.io/auto-install: rancher-gke-operator-crd=match catalog.cattle.io/certified: rancher @@ -16930,14 +16930,14 @@ entries: catalog.cattle.io/permits-os: linux,windows catalog.cattle.io/release-name: rancher-gke-operator-crd apiVersion: v2 - appVersion: 1.9.4-rc.1 - created: "2024-10-31T16:51:07.224161758+01:00" + appVersion: 1.9.4 + created: "2024-11-07T14:39:05.629476477+01:00" description: GKE Operator CustomResourceDefinitions - digest: 485ec4a9ce04d23886f52595df4b17f867d7cf261ef9d9f16e4f8916632a196d + digest: c66c44258c84b9616dc87ab31fa8c3de72f70a7309483b4b3cdc61e9fb1ffdd4 name: rancher-gke-operator-crd urls: - - assets/rancher-gke-operator-crd/rancher-gke-operator-crd-104.4.0+up1.9.4-rc.1.tgz - version: 104.4.0+up1.9.4-rc.1 + - assets/rancher-gke-operator-crd/rancher-gke-operator-crd-104.4.0+up1.9.4.tgz + version: 104.4.0+up1.9.4 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true"