From c52ef5ccbf471e1f9a981269f788ab08e241c30d Mon Sep 17 00:00:00 2001 From: Michal Jura Date: Mon, 21 Aug 2023 16:46:46 +0200 Subject: [PATCH] make charts --- ...r-gke-operator-crd-102.0.2+up1.1.6-rc2.tgz | Bin 0 -> 1415 bytes ...ncher-gke-operator-102.0.2+up1.1.6-rc2.tgz | Bin 0 -> 2039 bytes .../102.0.2+up1.1.6-rc2/Chart.yaml | 12 + .../102.0.2+up1.1.6-rc2/templates/crds.yaml | 250 ++++++++++++++++++ .../102.0.2+up1.1.6-rc2/Chart.yaml | 20 ++ .../102.0.2+up1.1.6-rc2/templates/NOTES.txt | 4 + .../templates/_helpers.tpl | 25 ++ .../templates/clusterrole.yaml | 15 ++ .../templates/clusterrolebinding.yaml | 13 + .../templates/deployment.yaml | 61 +++++ .../templates/serviceaccount.yaml | 5 + .../102.0.2+up1.1.6-rc2/values.yaml | 22 ++ 12 files changed, 427 insertions(+) create mode 100644 assets/rancher-gke-operator-crd/rancher-gke-operator-crd-102.0.2+up1.1.6-rc2.tgz create mode 100644 assets/rancher-gke-operator/rancher-gke-operator-102.0.2+up1.1.6-rc2.tgz create mode 100644 charts/rancher-gke-operator-crd/102.0.2+up1.1.6-rc2/Chart.yaml create mode 100644 charts/rancher-gke-operator-crd/102.0.2+up1.1.6-rc2/templates/crds.yaml create mode 100644 charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/Chart.yaml create mode 100644 charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/NOTES.txt create mode 100644 charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/_helpers.tpl create mode 100644 charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/clusterrole.yaml create mode 100644 charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/clusterrolebinding.yaml create mode 100644 charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/deployment.yaml create mode 100644 charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/serviceaccount.yaml create mode 100644 charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/values.yaml diff --git a/assets/rancher-gke-operator-crd/rancher-gke-operator-crd-102.0.2+up1.1.6-rc2.tgz b/assets/rancher-gke-operator-crd/rancher-gke-operator-crd-102.0.2+up1.1.6-rc2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..b99c37dbae17305839679f920ec44abfa72480c4 GIT binary patch literal 1415 zcmV;21$g=&iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PI@dbK z5=BuoxW3N*Mp1P5HyT_=7yaw&VKf*FuliRPQUCklV0b~I#+qwLY8{x1sIjiY!~H`9 zq*M+ZSJI9;givrGRNSNBoWLGemlTcTbB=68Ho20!ZNV8sIU?_zN%39o76}Pj4HQQt zTs0a?tx65W4>;$NXMXKe=w0o! zL|472clEziKj}Ml{0r;fVWI^%w3pN{+lUCt>%Tu73=ZpmI2iWd>i-^ZN*CVn-)Ez=XZNy8Y zBDD?;RdUW_+l!a@RKXpqk$Sw?s8na$_Z9=lMqjY?=g!O2`F-w2^-#(*KyS}v`F z9D6SmUFN58g_?@v@9CN%Rg!^Oe+C(2ehRjv&>%RRrn6109$Dy$;aU9SX`fTHXH|B- zXxLpGPN^lec&Bd!2b-Vp4fuGuBcN@I(;`0zn4!qA7#PdiA`p|(Lay{&so!eZo$Hh> zJLMR~9VUO5tzZnSUzi%lT*lLo`E3R-0WKX%kQ9H*UL4y6&l;=LWo;0$`%pw}H(7Mc zI0a=>7|m+v0|mufY7sz?3K|H)xYYvI#eCDg(vniCt*khO$*vp9X(UJ!a!ZutPMOox zN8$6gF=S|pZi`&fpe6K={fSa}oLpE6Rb>EG?=CfSu}-;_rb&>h&L>C$kN1kOm7y#h2YTSKd?HCpmo)}pH!x63L2h976m{o}EI^*hf-l01PJ&#SVi*?E$> zZO;)F*0k}}XD-P@vT2mW)Uvkf2#GsjIq>K0R~ba^mJTZLEJb*g9;JzaxngP3T? zJzir1brAo{-Q|4$+w_cem^KK`=SWLyD99_kM(TUc%Mx=2G3Qgi0+E&`=4lP6#docy zSf$47;{k}u)}oe8)eM|~gcuWSsHjfL`=0SLYT!8o;6szEn8;&&(Xj#6nAR#IlEC9c zF*{b$I^+4_#37L-FL|#}QIh_vqNz`NN=m(Y^x#7qz5<8OK4G;yJqT|blc4BUGOY?D zUX@+XpnO3eHOJe|P0lb(EeV=7%3rDc zVQyr3R8em|NM&qo0PGt5Z`;N-Kl876kTH1cLW+_VIUtq+nG>`_TidX+Zb1O*7WvH1^x__21ZGshB z$Y-Ae!Y~ZSqmla?hGF~fU^EJ!4MwBWa6CR84hGM{!HePG^cjSoh5H`J$uRva{MEeL z%KeW3OH*Z-5h|s~1K`Xssb&FZ#z+i=>a*M^U!-K1lo50t7oY3+)q)wGbQ0jGjhG6I zce^{$5)sFkM$j`l$6hDOJfEPyL`_1a5gh;Z6%2x57=(TZf3c4*?c;Ih)|4%fGR852 zV$r7+8C-NCD~dphH2>83HbcD-hWs7Y^Ba-I>V~?pwOWc8$)7EC1hYAEnUg`yRXPA$V-%!E-@yf zsNbInljM_ttHoCJena4UbRm^%jud(RgQ@MTItYhB7!3cMXO%)<+CP75=#2kMCUd0E zmH_s||L}A$ZpZ)8czB5aPXRNjCQO#0-$=Ai07YZOMz131^*nDj$BXiu zSX{ASvvQNhOp!3kVs<*3MKWv_!Lsr%&wA;lR-X#;&S$HCQ&l~)I2JapF!@f~s1cvN zrU<4?5_(5RaIRtm$tEbNh&3t(MkHpbi(W@ZaD~$<#MoS-Q#436+Qo`fKPT%4xrni! zsu+DjiQIDRdq+o}UAlHFN=LBXSc=~XGN7hl-+^HwH3UY1QPOIR@JEe5x&= z($@G-UWw&0FZ}qyvji`-P+FMPnPf!gY=NZ;7+bnAW>T%JI)Rt9F`bQm`Sg{0${W8-qe%-yF}1#ZPsf9kga1DTtk?aoU?~<65E_^YiDs4ItA#ZSPcVY7`kRgC zt=B%pI29>EuP6>a#zl4TQJ3XG5B$x>A&MykKNKZoQC@8Oiq5iPw=L5mHB;#Qf%?5i z5kN_}`=?jQgK2#0*|Um!|13JUZ9IY-AtkUlhElmAsk?f@wR$eo({o#kzyzhbDVJ-x z+$QQ9rRP$yn1HKXT2vsOV4TY$k()#j)+u_<%5@{Vm%gh*YQzhje3+xHiRvAz?U-HJ z9+i9T0#2vMO$5DjbzSne%UeH>p!fEtoXK9>GM!>jS^N|-H0!6TV{TCT(uey1dtp!f zFC9ZGiH~mw_tk&nacllJ3||Zn{oj+oT%>UXW%+fbBsS(edct_Xa+4@6{^LSWFn>wq zq-ueN#mq3<{S_0LR=0QO&`swO-MG;QmWi*m$}`&o9Up%v8_Dey2Yx&zAM zZh400_&FR)LGCZt$PC)28)kUouv^3%leR8Sw}x|jc;;FB`FZxqFq7Y6UGnKf_`8;?Vy+2|U=_Zv~3K73ZNN3_LszD2Z1%wL7OKFz^7j9Yrxdb~lLMxdCpm z0MNJ_tGbri-1`0Yke0h^B3h6QLVHL7Yz4H?n)I$gq+I6lUENRsKSL_g7*hi;;dTpL zCs(`%qu#TH?8f*R+O%vtwb_)yHKxXQ$ku2W_lZ|;T|1?#BkU258d3JVE5ur8NpNeF zT@mb>a8-d%pYyt??;``xSEyrCw-?lPy&woc>vfkfy|D(4pu zAW_~MbsYDuTckRhqsD=Sg+0jRX5!UOuzN%b=0-s#8OK_jSt^+?@O!r{s>x_6yODS- zv~%NLF?uwg8_Brz_ zse{b@+@XTPo<@@2!1D_g8mN>{3KsWM)X3tCRIVa0I>)`*Yo&}|n4qp{tdP=U<1}^( zKW|Z*i5lo-1Ymmo}YlWPQ}x8}dNzTdFf zT=b1SGkt4erRn!!-hv$6cG(ATE_&= 1.20.0-0 < 1.28.0-0' + catalog.cattle.io/namespace: cattle-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: gkeclusterconfigs.gke.cattle.io/v1 + catalog.cattle.io/rancher-version: '>= 2.7.0-0 < 2.8.0-0' + catalog.cattle.io/release-name: rancher-gke-operator + catalog.cattle.io/scope: management +apiVersion: v2 +appVersion: 1.1.6-rc2 +description: A Helm chart for provisioning GKE clusters +home: https://github.com/rancher/gke-operator +name: rancher-gke-operator +sources: +- https://github.com/rancher/gke-operator +version: 102.0.2+up1.1.6-rc2 diff --git a/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/NOTES.txt b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/NOTES.txt new file mode 100644 index 00000000000..238173d1bd9 --- /dev/null +++ b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/NOTES.txt @@ -0,0 +1,4 @@ +You have deployed the Rancher GKE operator +Version: {{ .Chart.AppVersion }} +Description: This operator provisions GKE clusters +from GKEClusterConfig CRs. diff --git a/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/_helpers.tpl b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/_helpers.tpl new file mode 100644 index 00000000000..de3b332f6a9 --- /dev/null +++ b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/_helpers.tpl @@ -0,0 +1,25 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} + diff --git a/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/clusterrole.yaml b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/clusterrole.yaml new file mode 100644 index 00000000000..7c352696ee3 --- /dev/null +++ b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/clusterrole.yaml @@ -0,0 +1,15 @@ +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: gke-operator + namespace: cattle-system +rules: + - apiGroups: [''] + resources: ['secrets'] + verbs: ['get', 'list', 'create', 'watch'] + - apiGroups: ['gke.cattle.io'] + resources: ['gkeclusterconfigs'] + verbs: ['get', 'list', 'update', 'watch'] + - apiGroups: ['gke.cattle.io'] + resources: ['gkeclusterconfigs/status'] + verbs: ['update'] diff --git a/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/clusterrolebinding.yaml b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/clusterrolebinding.yaml new file mode 100644 index 00000000000..e2af390c71c --- /dev/null +++ b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/clusterrolebinding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: gke-operator + namespace: cattle-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: gke-operator +subjects: +- kind: ServiceAccount + name: gke-operator + namespace: cattle-system diff --git a/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/deployment.yaml b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/deployment.yaml new file mode 100644 index 00000000000..dbf549903a5 --- /dev/null +++ b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/deployment.yaml @@ -0,0 +1,61 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: gke-config-operator + namespace: cattle-system +spec: + replicas: 1 + selector: + matchLabels: + ke.cattle.io/operator: gke + template: + metadata: + labels: + ke.cattle.io/operator: gke + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + serviceAccountName: gke-operator + {{- if .Values.priorityClassName }} + priorityClassName: "{{.Values.priorityClassName}}" + {{- end }} + securityContext: + fsGroup: 1007 + runAsUser: 1007 + containers: + - name: rancher-gke-operator + image: {{ template "system_default_registry" . }}{{ .Values.gkeOperator.image.repository }}:{{ .Values.gkeOperator.image.tag }} + imagePullPolicy: IfNotPresent + env: + - name: HTTP_PROXY + value: {{ .Values.httpProxy }} + - name: HTTPS_PROXY + value: {{ .Values.httpsProxy }} + - name: NO_PROXY + value: {{ .Values.noProxy }} +{{- if .Values.additionalTrustedCAs }} + # gke-operator mounts the additional CAs in two places: + volumeMounts: + # This directory is owned by the gke-operator user so c_rehash works here. + - mountPath: /etc/rancher/ssl/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + # This directory is root-owned so c_rehash doesn't work here, + # but the cert is here in case update-ca-certificates is called in the future or by the OS. + - mountPath: /etc/pki/trust/anchors/ca-additional.pem + name: tls-ca-additional-volume + subPath: ca-additional.pem + readOnly: true + volumes: + - name: tls-ca-additional-volume + secret: + defaultMode: 0400 + secretName: tls-ca-additional + {{- end }} diff --git a/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/serviceaccount.yaml b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/serviceaccount.yaml new file mode 100644 index 00000000000..ba52af62808 --- /dev/null +++ b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: cattle-system + name: gke-operator diff --git a/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/values.yaml b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/values.yaml new file mode 100644 index 00000000000..e11e2b76194 --- /dev/null +++ b/charts/rancher-gke-operator/102.0.2+up1.1.6-rc2/values.yaml @@ -0,0 +1,22 @@ +global: + cattle: + systemDefaultRegistry: "" + +gkeOperator: + image: + repository: rancher/gke-operator + tag: v1.1.6-rc2 + +httpProxy: "" +httpsProxy: "" +noProxy: "" +additionalTrustedCAs: false +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +## PriorityClassName assigned to deployment. +priorityClassName: ""