diff --git a/.github/workflows/cd-pipeline.yml b/.github/workflows/cd-pipeline.yml index 22c59dcfbdbe11..0ed9ab6ac56e87 100644 --- a/.github/workflows/cd-pipeline.yml +++ b/.github/workflows/cd-pipeline.yml @@ -75,34 +75,12 @@ jobs: name: Checkout Repository with: path: charts - - id: get-asset-vib-config - name: Get asset-specific configuration for VIB action - run: | - config_file="charts/.vib/${{ needs.get-chart.outputs.chart }}/vib-action.config" - - # Supported configuration customizations and default values - verification_mode="PARALLEL" - - if [[ -f $config_file ]]; then - verification_mode="$(cat $config_file | grep 'verification-mode' | cut -d'=' -f2)" - fi - runtime_parameters_file="" - if [[ -f "charts/.vib/${{ needs.get-chart.outputs.chart }}/runtime-parameters.yaml" ]]; then - # The path is relative to the .vib folder - runtime_parameters_file="${{ needs.get-chart.outputs.chart }}/runtime-parameters.yaml" - fi - echo "verification_mode=${verification_mode}" >> $GITHUB_OUTPUT - echo "runtime_parameters_file=${runtime_parameters_file}" >> $GITHUB_OUTPUT - uses: vmware-labs/vmware-image-builder-action@v0 - name: Verify and publish ${{ needs.get-chart.outputs.chart }} + name: Publish ${{ needs.get-chart.outputs.chart }} with: pipeline: ${{ needs.get-chart.outputs.chart }}/vib-publish.json config: charts/.vib/ - verification-mode: ${{ steps.get-asset-vib-config.outputs.verification_mode }} - runtime-parameters-file: ${{ steps.get-asset-vib-config.outputs.runtime_parameters_file }} env: - VIB_ENV_TARGET_PLATFORM: ${{ secrets.VIB_ENV_TARGET_PLATFORM }} - VIB_ENV_ALTERNATIVE_TARGET_PLATFORM: ${{ secrets.VIB_ENV_ALTERNATIVE_TARGET_PLATFORM }} VIB_ENV_S3_URL: s3://${{ secrets.AWS_S3_BUCKET }}/bitnami VIB_ENV_S3_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} VIB_ENV_S3_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} @@ -179,7 +157,7 @@ jobs: name: Notify unsuccessful CD run steps: - name: Notify in Slack channel - if: ${{ needs.vib-publish.result != 'success' || needs.update-index.result != 'success' }} + if: ${{ needs.update-index.result != 'success' }} uses: slackapi/slack-github-action@v1.23.0 with: channel-id: ${{ secrets.CD_SLACK_CHANNEL_ID }} diff --git a/.github/workflows/ci-pipeline.yml b/.github/workflows/ci-pipeline.yml index 7d633979d97acb..8633123c5b9309 100644 --- a/.github/workflows/ci-pipeline.yml +++ b/.github/workflows/ci-pipeline.yml @@ -27,7 +27,6 @@ jobs: name: Get modified charts permissions: contents: read - if: ${{ github.event.pull_request.state != 'closed' }} outputs: chart: ${{ steps.get-chart.outputs.chart }} result: ${{ steps.get-chart.outputs.result }} @@ -50,7 +49,11 @@ jobs: num_version_bumps="$(filterdiff -s -i "*Chart.yaml" $TEMP_FILE | grep -c "+version" || true)" non_readme_files=$(echo "$files_changed" | grep -vc "\.md" || true) - if [[ "$non_readme_files" -le "0" ]]; then + if [[ $(curl -Lks ${{ github.event.pull_request.url }} | jq '.state | index("closed")') != *null* ]]; then + # The PR for which this workflow run was launched is now closed -> SKIP + echo "error=The PR for which this workflow run was launched is now closed. The tests will be skipped." >> $GITHUB_OUTPUT + echo "result=skip" >> $GITHUB_OUTPUT + elif [[ "$non_readme_files" -le "0" ]]; then # The only changes are .md files -> SKIP echo "result=skip" >> $GITHUB_OUTPUT elif [[ "$num_charts_changed" -ne "$num_version_bumps" ]]; then diff --git a/.github/workflows/retry-failed-releases.yml b/.github/workflows/retry-failed-releases.yml new file mode 100644 index 00000000000000..87042c466d72c8 --- /dev/null +++ b/.github/workflows/retry-failed-releases.yml @@ -0,0 +1,30 @@ +# Copyright VMware, Inc. +# SPDX-License-Identifier: APACHE-2.0 + +name: '[CI/CD] Retry release PRs' +on: + schedule: + # Every 2 hours + - cron: '0 */2 * * *' +# Remove all permissions by default +permissions: {} +jobs: + retry-failed-pr-releases: + runs-on: ubuntu-latest + permissions: + actions: write + steps: + - name: Retry "CI Pipeline" failed runs in releases PRs + env: + WORKFLOW_ID: "35553382" + TEMP_FILE: "${{runner.temp}}/failed_runs.json" + ACTIONS_API_ENDPOINT: "${{ github.api_url }}/repos/${{ github.repository }}/actions" + run: | + # Obtain "CI Pipeline" failed runs and filter those from release PRs with less than 3 attempts + curl -H 'Authorization: Bearer ${{ secrets.GITHUB_TOKEN }}' -X GET -Lkso ${{ env.TEMP_FILE }} ${{ env.ACTIONS_API_ENDPOINT }}/workflows/${{ env.WORKFLOW_ID }}/runs?status=failure + readarray -t failed_runs_ids < <(jq '.workflow_runs[] | select((.run_attempt < 3) and (.display_title | contains("Release")) and (.head_commit.author.email=="bitnami-bot@vmware.com")).id' ${{ env.TEMP_FILE }}) + + for run_id in "${failed_runs_ids[@]:0:15}"; do + echo "Retrying workflow $(jq --argjson id $run_id '.workflow_runs[] | select(.id==$id) | .html_url' ${{ env.TEMP_FILE }})" + curl -H 'Authorization: Bearer ${{ secrets.GITHUB_TOKEN }}' -X POST -Lks ${{ env.ACTIONS_API_ENDPOINT }}/workflows/runs/${run_id}/rerun + done diff --git a/.github/workflows/vib-files-validator.yml b/.github/workflows/vib-files-validator.yml deleted file mode 100644 index fb6733e7d48305..00000000000000 --- a/.github/workflows/vib-files-validator.yml +++ /dev/null @@ -1,41 +0,0 @@ -# Copyright VMware, Inc. -# SPDX-License-Identifier: APACHE-2.0 - -name: '[CI/CD] Validate VIB pipeline files' -on: - pull_request: - branches: - - main - paths: - - '.vib/*/vib-publish.json' - - '.vib/*/vib-verify.json' -# Remove all permissions by default -permissions: {} -jobs: - validate-vib-files: - runs-on: ubuntu-latest - permissions: - contents: read - steps: - - name: Checkout project - uses: actions/checkout@v3 - - name: Get changed VIB pipeline files - id: changed-files - uses: tj-actions/changed-files@v37 - with: - dir_names: "true" - dir_names_max_depth: "2" - files: | - .vib/** - - name: Validate VIB pipeline files - if: ${{ steps.changed-files.outputs.any_changed == 'true' }} - shell: bash - run: | - exit_code=0 - for dir in ${{ steps.changed-files.outputs.all_changed_files }}; do - diff <(jq .phases.verify < "${dir}/vib-publish.json") <(jq .phases.verify < "${dir}/vib-verify.json") || exit_code=$? - done - if [[ $exit_code -ne 0 ]]; then - echo "::error:: Please ensure the VIB's verify phase is aligned both in vib-verify and vib-publish pipeline files" - exit "$exit_code" - fi diff --git a/.vib/airflow/vib-publish.json b/.vib/airflow/vib-publish.json index f222f838cd9720..b5e9e8eb90f4ab 100644 --- a/.vib/airflow/vib-publish.json +++ b/.vib/airflow/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/airflow" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-airflow-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "airflow/goss/goss.yaml", - "remote": { - "pod": { - "workload": "deploy-airflow-web" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/airflow/cypress" - }, - "endpoint": "lb-airflow-http", - "app_protocol": "HTTP", - "env": { - "username": "user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/airflow/vib-verify.json b/.vib/airflow/vib-verify.json index 4a02add1f34ced..984116e0b575b2 100644 --- a/.vib/airflow/vib-verify.json +++ b/.vib/airflow/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-airflow-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/apache/vib-publish.json b/.vib/apache/vib-publish.json index c5a9aab7fd31b6..fc580b1c7b0fa0 100644 --- a/.vib/apache/vib-publish.json +++ b/.vib/apache/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/apache" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-apache-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "apache/goss/goss.yaml", - "vars_file": "apache/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-apache" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/apache/cypress" - }, - "endpoint": "lb-apache-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/apache/vib-verify.json b/.vib/apache/vib-verify.json index b2c5943c7f234b..ed80aa7acc24f2 100644 --- a/.vib/apache/vib-verify.json +++ b/.vib/apache/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-apache-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/apisix/vib-publish.json b/.vib/apisix/vib-publish.json index fb7bc2752f038f..545be21ec83eca 100644 --- a/.vib/apisix/vib-publish.json +++ b/.vib/apisix/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/apisix" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-apisix-data-plane-http" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "apisix/goss/goss.yaml", - "vars_file": "apisix/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-apisix-data-plane" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/apisix/cypress" - }, - "endpoint": "lb-apisix-dashboard-http", - "app_protocol": "HTTP", - "env": { - "username": "vib-user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/apisix/vib-verify.json b/.vib/apisix/vib-verify.json index 69aa36e57c3f17..f6e58c7202b1fd 100644 --- a/.vib/apisix/vib-verify.json +++ b/.vib/apisix/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-apisix-data-plane-http" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/appsmith/vib-publish.json b/.vib/appsmith/vib-publish.json index 6e7eb292912194..9f1d38deef0a6d 100644 --- a/.vib/appsmith/vib-publish.json +++ b/.vib/appsmith/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/appsmith" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "L4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-appsmith-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "appsmith/goss/goss.yaml", - "vars_file": "appsmith/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-appsmith" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/appsmith/cypress" - }, - "endpoint": "lb-appsmith-http", - "app_protocol": "HTTP", - "env": { - "email": "user@example.com", - "password": "bitnami!1234" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/appsmith/vib-verify.json b/.vib/appsmith/vib-verify.json index 148b278e278468..f136a2d8fc777f 100644 --- a/.vib/appsmith/vib-verify.json +++ b/.vib/appsmith/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-appsmith-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/argo-cd/vib-publish.json b/.vib/argo-cd/vib-publish.json index 62f459544e3bf1..4bac4c8fd3700b 100644 --- a/.vib/argo-cd/vib-publish.json +++ b/.vib/argo-cd/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/argo-cd" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-argo-cd-server-https", - "app_protocol": "HTTPS" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "argo-cd/goss/goss.yaml", - "vars_file": "argo-cd/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-argo-cd-server" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/argo-cd/cypress" - }, - "endpoint": "lb-argo-cd-server-https", - "app_protocol": "HTTPS", - "env": { - "username": "admin", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/argo-cd/vib-verify.json b/.vib/argo-cd/vib-verify.json index a547816fb0be55..b7a339d78d4ab9 100644 --- a/.vib/argo-cd/vib-verify.json +++ b/.vib/argo-cd/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-argo-cd-server-https", - "app_protocol": "HTTPS" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/argo-workflows/vib-publish.json b/.vib/argo-workflows/vib-publish.json index cde36ddf3eea37..d9801ac0281159 100644 --- a/.vib/argo-workflows/vib-publish.json +++ b/.vib/argo-workflows/vib-publish.json @@ -16,39 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/argo-workflows" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-argo-workflows-server-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/argo-workflows/cypress" - }, - "endpoint": "lb-argo-workflows-server-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/argo-workflows/vib-verify.json b/.vib/argo-workflows/vib-verify.json index bbb08724573cfd..e2d165219525ef 100644 --- a/.vib/argo-workflows/vib-verify.json +++ b/.vib/argo-workflows/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-argo-workflows-server-http", - "app_protocol": "HTTP" - } - }, { "action_id": "cypress", "params": { diff --git a/.vib/aspnet-core/vib-publish.json b/.vib/aspnet-core/vib-publish.json index 86dc8a1fdd22cd..380c782d9276db 100644 --- a/.vib/aspnet-core/vib-publish.json +++ b/.vib/aspnet-core/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/aspnet-core" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-aspnet-core-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "aspnet-core/goss/goss.yaml", - "vars_file": "aspnet-core/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-aspnet-core" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/aspnet-core/cypress" - }, - "endpoint": "lb-aspnet-core-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/aspnet-core/vib-verify.json b/.vib/aspnet-core/vib-verify.json index 75a8262a3ce3d8..5b11b30c6ed072 100644 --- a/.vib/aspnet-core/vib-verify.json +++ b/.vib/aspnet-core/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-aspnet-core-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/cassandra/vib-publish.json b/.vib/cassandra/vib-publish.json index fa49eeee60e90e..089eaeff88ae39 100644 --- a/.vib/cassandra/vib-publish.json +++ b/.vib/cassandra/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/cassandra" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-cassandra-cql" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "cassandra/goss/goss.yaml", - "vars_file": "cassandra/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-cassandra" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/cassandra/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "cassandra", - "username": "test_cassandra", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/cassandra/vib-verify.json b/.vib/cassandra/vib-verify.json index ca22b8cb7174b2..510a23d2a52cb9 100644 --- a/.vib/cassandra/vib-verify.json +++ b/.vib/cassandra/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-cassandra-cql" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/cert-manager/vib-publish.json b/.vib/cert-manager/vib-publish.json index 30f45f934806df..15c23a947b5dfd 100644 --- a/.vib/cert-manager/vib-publish.json +++ b/.vib/cert-manager/vib-publish.json @@ -16,49 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/cert-manager" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/cert-manager/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}" - } - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "cert-manager/goss/goss.yaml", - "vars_file": "cert-manager/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-cert-manager-controller" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/clickhouse/vib-publish.json b/.vib/clickhouse/vib-publish.json index 6562ea5fc180f2..dc2615698c6802 100644 --- a/.vib/clickhouse/vib-publish.json +++ b/.vib/clickhouse/vib-publish.json @@ -16,70 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/clickhouse" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-clickhouse-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "clickhouse/goss/goss.yaml", - "vars_file": "clickhouse/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-clickhouse-shard0" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/clickhouse/cypress" - }, - "endpoint": "lb-clickhouse-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/clickhouse/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "clickhouse", - "shards": "2", - "username": "test_user", - "password": "bitnami1234" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/clickhouse/vib-verify.json b/.vib/clickhouse/vib-verify.json index 5c65213711e253..17f96a856aae30 100644 --- a/.vib/clickhouse/vib-verify.json +++ b/.vib/clickhouse/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-clickhouse-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/concourse/goss/web/goss.yaml b/.vib/concourse/goss/web/goss.yaml index 2f78951f84cbf9..f238c2ebcd019d 100644 --- a/.vib/concourse/goss/web/goss.yaml +++ b/.vib/concourse/goss/web/goss.yaml @@ -8,12 +8,14 @@ command: {{- $pipeline := printf "pipe_%s" (randAlphaNum 5 | toLower) }} {{- $example_pipeline := "ICBqb2JzOgogIC0gbmFtZTogam9iCiAgICBwdWJsaWM6IHRydWUKICAgIHBsYW46CiAgICAtIHRhc2s6IHNpbXBsZS10YXNrCiAgICAgIGNvbmZpZzoKICAgICAgICBwbGF0Zm9ybTogbGludXgKICAgICAgICBpbWFnZV9yZXNvdXJjZToKICAgICAgICAgIHR5cGU6IHJlZ2lzdHJ5LWltYWdlCiAgICAgICAgICBzb3VyY2U6IHsgcmVwb3NpdG9yeTogYml0bmFtaS9iaXRuYW1pLXNoZWxsIH0KICAgICAgICBydW46CiAgICAgICAgICBwYXRoOiBlY2hvCiAgICAgICAgICBhcmdzOiBbIkhlbGxvIHdvcmxkISJd" }} {{- $port := .Vars.service.web.ports.http }} + {{ if not ( has "air-gapped" .Vars.target_platform_properties ) }} create-pipeline-trigger-job: exec: fly -t {{ $target }} login -c http://concourse-web:{{ $port }} -u {{ $user }} -p '{{ $pwd }}' && (echo '{{ $example_pipeline }}' | base64 -d) > /tmp/pipeline.yaml && fly -t {{ $target }} set-pipeline -p {{ $pipeline }} -c /tmp/pipeline.yaml -n && fly -t {{ $target }} unpause-pipeline -p {{ $pipeline }} && fly -t {{ $target }} trigger-job -j {{ $pipeline }}/job && sleep 35 && fly -t {{ $target }} jobs -p {{ $pipeline }} exit-status: 0 stdout: - "succeeded" timeout: 40000 + {{ end }} check-db-config: exec: $(echo $CONCOURSE_POSTGRES_DATABASE | grep -q {{ .Vars.postgresql.auth.database }}) && $(echo $CONCOURSE_POSTGRES_USER | grep -q {{ .Vars.postgresql.auth.username }}) && $(echo $CONCOURSE_POSTGRES_PASSWORD | grep -q {{ .Vars.postgresql.auth.password }}) exit-status: 0 diff --git a/.vib/concourse/vib-publish.json b/.vib/concourse/vib-publish.json index 30ec53297ded8c..1255d426ebdfe7 100644 --- a/.vib/concourse/vib-publish.json +++ b/.vib/concourse/vib-publish.json @@ -16,69 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/concourse" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-concourse-web-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "concourse/goss/web/goss.yaml", - "vars_file": "concourse/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-concourse-web" - } - } - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "concourse/goss/worker/goss.yaml", - "vars_file": "concourse/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-concourse-worker" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/concourse/cypress" - }, - "endpoint": "lb-concourse-web-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/concourse/vib-verify.json b/.vib/concourse/vib-verify.json index e917d89cf15680..c364e207c31a10 100644 --- a/.vib/concourse/vib-verify.json +++ b/.vib/concourse/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-concourse-web-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/consul/vib-publish.json b/.vib/consul/vib-publish.json index 9611f2e1e56765..d3e377043e2884 100644 --- a/.vib/consul/vib-publish.json +++ b/.vib/consul/vib-publish.json @@ -16,71 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/consul" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-consul-ui-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/consul/cypress" - }, - "endpoint": "lb-consul-ui-http", - "app_protocol": "HTTP", - "env": { - "username": "user", - "password": "ComplicatedPassword123!4" - } - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "consul/goss/goss.yaml", - "vars_file": "consul/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-consul" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/consul/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "consul" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/consul/vib-verify.json b/.vib/consul/vib-verify.json index 62ce49d0bca0cd..f57eac1e35f9d3 100644 --- a/.vib/consul/vib-verify.json +++ b/.vib/consul/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-consul-ui-http", - "app_protocol": "HTTP" - } - }, { "action_id": "cypress", "params": { diff --git a/.vib/contour/vib-publish.json b/.vib/contour/vib-publish.json index 5ec01daa432965..8bbed5447ec0e4 100644 --- a/.vib/contour/vib-publish.json +++ b/.vib/contour/vib-publish.json @@ -16,56 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/contour" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-contour-envoy-http" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "contour/goss/goss.yaml", - "vars_file": "contour/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-contour-contour" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/contour/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "ingress-name": "contour-vib-test" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/contour/vib-verify.json b/.vib/contour/vib-verify.json index fc1f05ed07a874..f2092d5d1dbeeb 100644 --- a/.vib/contour/vib-verify.json +++ b/.vib/contour/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-contour-envoy-http" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/deepspeed/vib-publish.json b/.vib/deepspeed/vib-publish.json index f6a0c4b59a8a57..9b72166654a1fd 100644 --- a/.vib/deepspeed/vib-publish.json +++ b/.vib/deepspeed/vib-publish.json @@ -16,37 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/deepspeed" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "L4" - } - } - }, - "actions": [ - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "deepspeed/goss/goss.yaml", - "vars_file": "deepspeed/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-deepspeed-client" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/discourse/vib-publish.json b/.vib/discourse/vib-publish.json index c4c5bc932f7f90..3c5f10827ee76b 100644 --- a/.vib/discourse/vib-publish.json +++ b/.vib/discourse/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/discourse" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-discourse-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "discourse/goss/goss.yaml", - "vars_file": "discourse/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-discourse" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/discourse/cypress" - }, - "endpoint": "lb-discourse-http", - "app_protocol": "HTTP", - "env": { - "username": "user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/discourse/vib-verify.json b/.vib/discourse/vib-verify.json index 2b61b5023b44af..a88e8764f01695 100644 --- a/.vib/discourse/vib-verify.json +++ b/.vib/discourse/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-discourse-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/dokuwiki/vib-publish.json b/.vib/dokuwiki/vib-publish.json index 170023fd30549d..936a1f47cde788 100644 --- a/.vib/dokuwiki/vib-publish.json +++ b/.vib/dokuwiki/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/dokuwiki" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-dokuwiki-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/dokuwiki/cypress" - }, - "endpoint": "lb-dokuwiki-http", - "app_protocol": "HTTP", - "env": { - "username": "user", - "password": "ComplicatedPassword123!4" - } - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "dokuwiki/goss/goss.yaml", - "vars_file": "dokuwiki/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-dokuwiki" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/dokuwiki/vib-verify.json b/.vib/dokuwiki/vib-verify.json index 02246bc8f57793..31cd430c8a8d83 100644 --- a/.vib/dokuwiki/vib-verify.json +++ b/.vib/dokuwiki/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-dokuwiki-http", - "app_protocol": "HTTP" - } - }, { "action_id": "cypress", "params": { diff --git a/.vib/drupal/vib-publish.json b/.vib/drupal/vib-publish.json index 5526e143e19b30..aba064a2c87be2 100644 --- a/.vib/drupal/vib-publish.json +++ b/.vib/drupal/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/drupal" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-drupal-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "drupal/goss/goss.yaml", - "vars_file": "drupal/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-drupal" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/drupal/cypress" - }, - "endpoint": "lb-drupal-http", - "app_protocol": "HTTP", - "env": { - "username": "test_user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/drupal/vib-verify.json b/.vib/drupal/vib-verify.json index 757334ac2f492c..a074cba60ef1b1 100644 --- a/.vib/drupal/vib-verify.json +++ b/.vib/drupal/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-drupal-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/ejbca/vib-publish.json b/.vib/ejbca/vib-publish.json index 303d2294046ea4..b808f0d5475cb0 100644 --- a/.vib/ejbca/vib-publish.json +++ b/.vib/ejbca/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/ejbca" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "L4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-ejbca-https", - "app_protocol": "HTTPS" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "ejbca/goss/goss.yaml", - "vars_file": "ejbca/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-ejbca" - } - }, - "wait": { - "file": "ejbca/goss/goss-wait.yaml" - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/ejbca/cypress" - }, - "endpoint": "lb-ejbca-https", - "app_protocol": "HTTPS" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/ejbca/vib-verify.json b/.vib/ejbca/vib-verify.json index c6e8fc5ac175cc..7374f90bc92b22 100644 --- a/.vib/ejbca/vib-verify.json +++ b/.vib/ejbca/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-ejbca-https", - "app_protocol": "HTTPS" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/elasticsearch/vib-publish.json b/.vib/elasticsearch/vib-publish.json index 6d955b551f3394..591d19879acaa1 100644 --- a/.vib/elasticsearch/vib-publish.json +++ b/.vib/elasticsearch/vib-publish.json @@ -16,67 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/elasticsearch" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "L4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-elasticsearch-tcp-rest-api", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "elasticsearch/goss/goss.yaml", - "vars_file": "elasticsearch/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-elasticsearch-master" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/elasticsearch/cypress" - }, - "endpoint": "lb-elasticsearch-tcp-rest-api", - "app_protocol": "HTTP" - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/elasticsearch/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "elasticsearch" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/elasticsearch/vib-verify.json b/.vib/elasticsearch/vib-verify.json index 340f2422640b2b..d9aeb62ddae202 100644 --- a/.vib/elasticsearch/vib-verify.json +++ b/.vib/elasticsearch/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-elasticsearch-tcp-rest-api", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/etcd/vib-publish.json b/.vib/etcd/vib-publish.json index 2fa0002da484b9..ec170c13606169 100644 --- a/.vib/etcd/vib-publish.json +++ b/.vib/etcd/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/etcd" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-etcd-client", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "etcd/goss/goss.yaml", - "vars_file": "etcd/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-etcd" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/etcd/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "etcd", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/etcd/vib-verify.json b/.vib/etcd/vib-verify.json index 2098374218c53c..1a50e79682b353 100644 --- a/.vib/etcd/vib-verify.json +++ b/.vib/etcd/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-etcd-client", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/external-dns/vib-publish.json b/.vib/external-dns/vib-publish.json index 843a9dbd514572..1645dbe3a53417 100644 --- a/.vib/external-dns/vib-publish.json +++ b/.vib/external-dns/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/external-dns" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "external-dns/goss/goss.yaml", - "vars_file": "external-dns/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-external-dns" - } - } - } - }, - { - "action_id": "health-check", - "params": { - "endpoint": "lb-external-dns-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/external-dns/cypress" - }, - "endpoint": "lb-external-dns-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/external-dns/vib-verify.json b/.vib/external-dns/vib-verify.json index 14c59fd4522491..ed6c8a789f8d6d 100644 --- a/.vib/external-dns/vib-verify.json +++ b/.vib/external-dns/vib-verify.json @@ -45,13 +45,6 @@ } } }, - { - "action_id": "health-check", - "params": { - "endpoint": "lb-external-dns-http", - "app_protocol": "HTTP" - } - }, { "action_id": "cypress", "params": { diff --git a/.vib/flink/vib-publish.json b/.vib/flink/vib-publish.json index 6ade7f0adacca1..e035003f0394e8 100644 --- a/.vib/flink/vib-publish.json +++ b/.vib/flink/vib-publish.json @@ -16,52 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/flink" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-flink-jobmanager-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "flink/goss/goss.yaml", - "vars_file": "flink/runtime-parameters.yaml", - "remote": { - "workload": "deploy-flink-jobmanager" - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/flink/cypress" - }, - "endpoint": "lb-flink-jobmanager-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/flink/vib-verify.json b/.vib/flink/vib-verify.json index cbe50309c3d416..759d9f5bf02c12 100644 --- a/.vib/flink/vib-verify.json +++ b/.vib/flink/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-flink-jobmanager-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/fluent-bit/vib-publish.json b/.vib/fluent-bit/vib-publish.json index 8dc483f2a4d9a3..59f4a5937aab4c 100644 --- a/.vib/fluent-bit/vib-publish.json +++ b/.vib/fluent-bit/vib-publish.json @@ -16,44 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/fluent-bit" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-fluent-bit-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "fluent-bit/goss/goss.yaml", - "vars_file": "fluent-bit/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-fluent-bit" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/fluentd/vib-publish.json b/.vib/fluentd/vib-publish.json index 636aff45c02a3e..756b0919f026cb 100644 --- a/.vib/fluentd/vib-publish.json +++ b/.vib/fluentd/vib-publish.json @@ -16,40 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/fluentd" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4", - "worker_nodes_instance_count": 1 - } - } - }, - "actions": [ - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "wait": { - "file": "fluentd/goss/goss-wait.yaml" - }, - "tests_file": "fluentd/goss/goss.yaml", - "remote": { - "pod": { - "workload": "ds-fluentd" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/flux/goss/goss-wait.yaml b/.vib/flux/goss/goss-wait.yaml index c1875e008a143d..3b52106daf479b 100644 --- a/.vib/flux/goss/goss-wait.yaml +++ b/.vib/flux/goss/goss-wait.yaml @@ -2,6 +2,7 @@ # SPDX-License-Identifier: APACHE-2.0 addr: + {{ if not ( has "air-gapped" .Vars.target_platform_properties ) }} {{- $chartReleaseName := (index .Vars.extraDeploy 3).metadata.name }} tcp://{{ $chartReleaseName }}:80: reachable: true @@ -9,3 +10,7 @@ addr: tcp://podinfo:9898: reachable: true timeout: 2000 + {{ end }} + tcp://127.0.0.1:{{ .Vars.sourceController.containerPorts.http }}: + reachable: true + timeout: 2000 diff --git a/.vib/flux/goss/goss.yaml b/.vib/flux/goss/goss.yaml index 8cab0a65741fcb..f114581b3583cf 100644 --- a/.vib/flux/goss/goss.yaml +++ b/.vib/flux/goss/goss.yaml @@ -41,6 +41,7 @@ file: mode: "2775" owner: root # Verify the two cloned git repositories + {{ if not ( has "air-gapped" .Vars.target_platform_properties ) }} {{ .Vars.sourceController.persistence.mountPath }}/gitrepository/{{ .Env.RUNTIME_NAMESPACE }}/{{ $chartGitRepo }}: exists: true filetype: directory @@ -49,6 +50,7 @@ file: exists: true filetype: directory mode: "2700" + {{ end }} http: # Source Controller http://127.0.0.1:{{ .Vars.sourceController.containerPorts.http }}: @@ -81,6 +83,7 @@ http: body: - /ImageUpdateAutomation.*{{ $imageUpdateAutomationName }}/ # Ensure that the deployment done by the helm controller worked + {{ if not ( has "air-gapped" .Vars.target_platform_properties ) }} http://{{ $chartReleaseName }}/doku.php: status: 200 body: @@ -91,3 +94,4 @@ http: status: 200 body: - /greetings from podinfo/ + {{ end }} diff --git a/.vib/flux/runtime-parameters.yaml b/.vib/flux/runtime-parameters.yaml index ef5e44988a6333..0470262abc777a 100644 --- a/.vib/flux/runtime-parameters.yaml +++ b/.vib/flux/runtime-parameters.yaml @@ -81,7 +81,7 @@ imageReflectorController: extraDeploy: # This is for kustomize-controller and source-controller # Source: https://fluxcd.io/flux/components/kustomize/kustomization/ - - apiVersion: source.toolkit.fluxcd.io/v1beta2 + - apiVersion: source.toolkit.fluxcd.io/v1 kind: GitRepository metadata: name: vib-podinfo @@ -91,7 +91,7 @@ extraDeploy: url: https://github.com/stefanprodan/podinfo ref: branch: master - - apiVersion: kustomize.toolkit.fluxcd.io/v1beta2 + - apiVersion: kustomize.toolkit.fluxcd.io/v1 kind: Kustomization metadata: name: vib-podinfo @@ -106,7 +106,7 @@ extraDeploy: prune: false # This is for helm-controller and source-controller # We use bitnami charts for not causing conflicts with the deployment above - - apiVersion: source.toolkit.fluxcd.io/v1beta2 + - apiVersion: source.toolkit.fluxcd.io/v1 kind: GitRepository metadata: name: vib-bitnami-charts @@ -142,7 +142,7 @@ extraDeploy: # This is for image-notification-controller. We will use the metrics to ensure that it is consumed # and therefore RBAC is correct. The values do not need to be correct # Source: https://fluxcd.io/flux/components/notification/receiver/ - - apiVersion: notification.toolkit.fluxcd.io/v1beta2 + - apiVersion: notification.toolkit.fluxcd.io/v1 kind: Receiver metadata: name: vib-github-receiver @@ -155,7 +155,7 @@ extraDeploy: secretRef: name: receiver-token resources: - - apiVersion: source.toolkit.fluxcd.io/v1beta2 + - apiVersion: source.toolkit.fluxcd.io/v1 kind: GitRepository name: bitnami-charts namespace: '{{ include "common.names.namespace" . }}' diff --git a/.vib/flux/vib-publish.json b/.vib/flux/vib-publish.json index 29607f30e830ef..cc9b5564a5456e 100644 --- a/.vib/flux/vib-publish.json +++ b/.vib/flux/vib-publish.json @@ -16,47 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/flux" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-flux-source-controller-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "tests_file": "flux/goss/goss.yaml", - "vars_file": "flux/runtime-parameters.yaml", - "resources": { - "path": "/.vib" - }, - "remote": { - "pod": { - "workload": "deploy-flux-source-controller" - } - }, - "wait": { - "file": "flux/goss/goss-wait.yaml" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/ghost/cypress/cypress/integration/ghost_spec.js b/.vib/ghost/cypress/cypress/integration/ghost_spec.js index 44f1dc20e78e48..832479c6ebf7bb 100644 --- a/.vib/ghost/cypress/cypress/integration/ghost_spec.js +++ b/.vib/ghost/cypress/cypress/integration/ghost_spec.js @@ -9,16 +9,16 @@ import { random } from '../support/utils'; it('allows to create and publish a new post with an image', () => { cy.login(); cy.visit('/ghost/#/posts'); - cy.contains('New post').click(); - cy.get('[type="file"]').selectFile( - 'cypress/fixtures/images/test_image.jpeg', - { force: true } - ); + cy.get('span').contains('New post').click(); cy.fixture('posts').then((posts) => { cy.get('textarea[placeholder="Post title"]').type( `${posts.newPost.title}-${random}` ); - cy.get('article div[contenteditable="true"]').type(posts.newPost.content, { + cy.get('div[contenteditable="true"]').type(posts.newPost.content, { + force: true, + }); + cy.get('[type="file"]').selectFile( + 'cypress/fixtures/images/test_image.jpeg', { force: true, }); }); diff --git a/.vib/ghost/vib-publish.json b/.vib/ghost/vib-publish.json index 3711097ecfd6ed..9c182690d554fd 100644 --- a/.vib/ghost/vib-publish.json +++ b/.vib/ghost/vib-publish.json @@ -16,59 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/ghost" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-ghost-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "ghost/goss/goss.yaml", - "vars_file": "ghost/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-ghost" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/ghost/cypress" - }, - "endpoint": "lb-ghost-http", - "app_protocol": "HTTP", - "env": { - "email": "vim-tests@example.com", - "username": "bitnamiTest", - "password": "Complicated123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/ghost/vib-verify.json b/.vib/ghost/vib-verify.json index a3eabeb5891c38..00b07ec15f71d5 100644 --- a/.vib/ghost/vib-verify.json +++ b/.vib/ghost/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-ghost-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/gitea/vib-publish.json b/.vib/gitea/vib-publish.json index 050794b6d3ad06..6653e5cefb117c 100644 --- a/.vib/gitea/vib-publish.json +++ b/.vib/gitea/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/gitea" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-gitea-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "gitea/goss/goss.yaml", - "vars_file": "gitea/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-gitea" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/gitea/cypress" - }, - "endpoint": "lb-gitea-http", - "app_protocol": "HTTP", - "env": { - "user": "vib-user@example.com", - "password": "bitnami!1234" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/gitea/vib-verify.json b/.vib/gitea/vib-verify.json index 7cceb63a5e24e7..adc03aa6594160 100644 --- a/.vib/gitea/vib-verify.json +++ b/.vib/gitea/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-gitea-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/grafana-loki/vib-publish.json b/.vib/grafana-loki/vib-publish.json index 9d6d7133d75ca6..8e316fa7ab451f 100644 --- a/.vib/grafana-loki/vib-publish.json +++ b/.vib/grafana-loki/vib-publish.json @@ -16,69 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/grafana-loki" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-grafana-loki-gateway-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "grafana-loki/goss/promtail/goss.yaml", - "vars_file": "grafana-loki/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "ds-grafana-loki-promtail" - } - } - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "grafana-loki/goss/querier/goss.yaml", - "vars_file": "grafana-loki/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-grafana-loki-querier" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/grafana-loki/cypress" - }, - "endpoint": "lb-grafana-loki-gateway-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/grafana-loki/vib-verify.json b/.vib/grafana-loki/vib-verify.json index 15fe34c8c64a1d..c2765cb05bff09 100644 --- a/.vib/grafana-loki/vib-verify.json +++ b/.vib/grafana-loki/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-grafana-loki-gateway-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/grafana-mimir/vib-publish.json b/.vib/grafana-mimir/vib-publish.json index e65930a82f3dbf..fc2d37e263fa7a 100644 --- a/.vib/grafana-mimir/vib-publish.json +++ b/.vib/grafana-mimir/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/grafana-mimir" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-grafana-mimir-gateway-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "grafana-mimir/goss/goss.yaml", - "vars_file": "grafana-mimir/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-grafana-mimir-store-gateway" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/grafana-mimir/cypress" - }, - "endpoint": "lb-grafana-mimir-gateway-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/grafana-mimir/vib-verify.json b/.vib/grafana-mimir/vib-verify.json index fcae65ba1af3a3..bc29815f7c8047 100644 --- a/.vib/grafana-mimir/vib-verify.json +++ b/.vib/grafana-mimir/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-grafana-mimir-gateway-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/grafana-operator/vib-publish.json b/.vib/grafana-operator/vib-publish.json index 90f13225ee6dd9..7b173fd8bef1eb 100644 --- a/.vib/grafana-operator/vib-publish.json +++ b/.vib/grafana-operator/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/grafana-operator" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-grafana-operator-grafana-service-grafana-ve", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "grafana-operator/goss/goss.yaml", - "vars_file": "grafana-operator/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-grafana-operator" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/grafana-operator/cypress" - }, - "endpoint": "lb-grafana-operator-grafana-service-grafana-ve", - "app_protocol": "HTTP", - "env": { - "username": "test_admin", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/grafana-operator/vib-verify.json b/.vib/grafana-operator/vib-verify.json index 8cbd340eea2293..1c31175769a61d 100644 --- a/.vib/grafana-operator/vib-verify.json +++ b/.vib/grafana-operator/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-grafana-operator-grafana-service-grafana-ve", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/grafana-tempo/vib-publish.json b/.vib/grafana-tempo/vib-publish.json index 0804bea3e98b09..6d3bfda83c708a 100644 --- a/.vib/grafana-tempo/vib-publish.json +++ b/.vib/grafana-tempo/vib-publish.json @@ -16,62 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/grafana-tempo" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-grafana-tempo-query-frontend-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "grafana-tempo/goss/goss.yaml", - "vars_file": "grafana-tempo/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-grafana-tempo-compactor" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/grafana-tempo/cypress" - }, - "endpoint": "lb-grafana-tempo-compactor-http", - "app_protocol": "HTTP", - "env": { - "compactorReplicaCount": "2", - "distributorReplicaCount": "1", - "ingesterReplicaCount": "1", - "querierReplicaCount": "1", - "metricsReplicaCount": "1", - "gossipRingPort": "7946" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/grafana-tempo/vib-verify.json b/.vib/grafana-tempo/vib-verify.json index e8a3780f61ed13..bba277a825a364 100644 --- a/.vib/grafana-tempo/vib-verify.json +++ b/.vib/grafana-tempo/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-grafana-tempo-query-frontend-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/grafana/vib-publish.json b/.vib/grafana/vib-publish.json index 0bd6aa4fc228bd..fcf742d1ef319c 100644 --- a/.vib/grafana/vib-publish.json +++ b/.vib/grafana/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/grafana" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-grafana-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "grafana/goss/goss.yaml", - "vars_file": "grafana/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-grafana" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/grafana/cypress" - }, - "endpoint": "lb-grafana-http", - "app_protocol": "HTTP", - "env": { - "username": "test_admin", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/grafana/vib-verify.json b/.vib/grafana/vib-verify.json index 1b3bb3baaaa66d..b91622a46ed5b4 100644 --- a/.vib/grafana/vib-verify.json +++ b/.vib/grafana/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-grafana-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/haproxy/vib-publish.json b/.vib/haproxy/vib-publish.json index 058998aac13cd1..0263b55f854c29 100644 --- a/.vib/haproxy/vib-publish.json +++ b/.vib/haproxy/vib-publish.json @@ -16,53 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/haproxy" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-haproxy-http" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "haproxy/goss/goss.yaml", - "vars_file": "haproxy/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-haproxy" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/haproxy/cypress" - }, - "endpoint": "lb-haproxy-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/haproxy/vib-verify.json b/.vib/haproxy/vib-verify.json index 605590324c312b..b1920ea12f8056 100644 --- a/.vib/haproxy/vib-verify.json +++ b/.vib/haproxy/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-haproxy-http" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/harbor/vib-publish.json b/.vib/harbor/vib-publish.json index 282149e633d901..ea8ff32dcc382b 100644 --- a/.vib/harbor/vib-publish.json +++ b/.vib/harbor/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/harbor" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-harbor-https", - "app_protocol": "HTTPS" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "harbor/goss/goss.yaml", - "vars_file": "harbor/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-harbor-registry" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/harbor/cypress" - }, - "endpoint": "lb-harbor-https", - "app_protocol": "HTTPS", - "env": { - "username": "admin", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/harbor/vib-verify.json b/.vib/harbor/vib-verify.json index 552b7bb9aae66d..baf56a7958a53f 100644 --- a/.vib/harbor/vib-verify.json +++ b/.vib/harbor/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-harbor-https", - "app_protocol": "HTTPS" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/influxdb/vib-publish.json b/.vib/influxdb/vib-publish.json index 0dbc13ac3d9259..5263a93b013b7d 100644 --- a/.vib/influxdb/vib-publish.json +++ b/.vib/influxdb/vib-publish.json @@ -16,76 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/influxdb" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-influxdb-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "influxdb/goss/goss.yaml", - "vars_file": "influxdb/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-influxdb" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/influxdb/cypress" - }, - "endpoint": "lb-influxdb-http", - "app_protocol": "HTTP", - "env": { - "username": "influxAdmin", - "password": "RootP4ssw0rd", - "bucket": "primary", - "org": "primary" - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/influxdb/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "influxdb", - "token": "4dm1nT0k3n", - "org": "testOrganization", - "bucket": "testBucket" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/influxdb/vib-verify.json b/.vib/influxdb/vib-verify.json index 2c846c367b67ac..5b5e480c85dc42 100644 --- a/.vib/influxdb/vib-verify.json +++ b/.vib/influxdb/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-influxdb-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/jaeger/vib-publish.json b/.vib/jaeger/vib-publish.json index 75d37a75beb7bb..451c3db154d73e 100644 --- a/.vib/jaeger/vib-publish.json +++ b/.vib/jaeger/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/jaeger" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-jaeger-query-api", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "jaeger/goss/goss.yaml", - "vars_file": "jaeger/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-jaeger--agent" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/jaeger/cypress" - }, - "endpoint": "lb-jaeger-query-api", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/jaeger/vib-verify.json b/.vib/jaeger/vib-verify.json index eb5aa211927f8a..05f3f544ef94b8 100644 --- a/.vib/jaeger/vib-verify.json +++ b/.vib/jaeger/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-jaeger-query-api", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/jasperreports/vib-publish.json b/.vib/jasperreports/vib-publish.json index 5383c50fde3bab..eaa0ad8dd7a695 100644 --- a/.vib/jasperreports/vib-publish.json +++ b/.vib/jasperreports/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/jasperreports" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-jasperreports-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "jasperreports/goss/goss.yaml", - "vars_file": "jasperreports/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-jasperreports" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/jasperreports/cypress" - }, - "endpoint": "lb-jasperreports-http", - "app_protocol": "HTTP", - "env": { - "username": "jaspervibadmin", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/jasperreports/vib-verify.json b/.vib/jasperreports/vib-verify.json index 489d623891518a..dcdfbcdefdae7a 100644 --- a/.vib/jasperreports/vib-verify.json +++ b/.vib/jasperreports/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-jasperreports-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/jenkins/vib-publish.json b/.vib/jenkins/vib-publish.json index 02d192531a90e4..e7b7105edcc39f 100644 --- a/.vib/jenkins/vib-publish.json +++ b/.vib/jenkins/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/jenkins" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-jenkins-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "jenkins/goss/goss.yaml", - "vars_file": "jenkins/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-jenkins" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/jenkins/cypress" - }, - "endpoint": "lb-jenkins-http", - "app_protocol": "HTTP", - "env": { - "username": "user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/jenkins/vib-verify.json b/.vib/jenkins/vib-verify.json index 2d85eeb2e4e332..75c19bd3c712a8 100644 --- a/.vib/jenkins/vib-verify.json +++ b/.vib/jenkins/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-jenkins-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/joomla/vib-publish.json b/.vib/joomla/vib-publish.json index d4f9093b6acc62..c2208ce663e4ab 100644 --- a/.vib/joomla/vib-publish.json +++ b/.vib/joomla/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/joomla" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-joomla-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "joomla/goss/goss.yaml", - "vars_file": "joomla/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-joomla" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/joomla/cypress" - }, - "endpoint": "lb-joomla-http", - "app_protocol": "HTTP", - "env": { - "username": "user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/joomla/vib-verify.json b/.vib/joomla/vib-verify.json index 6006c42a1223c4..0115fbc59ad726 100644 --- a/.vib/joomla/vib-verify.json +++ b/.vib/joomla/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-joomla-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/jupyterhub/vib-publish.json b/.vib/jupyterhub/vib-publish.json index 2d8acf4695e957..16feb66ea847cd 100644 --- a/.vib/jupyterhub/vib-publish.json +++ b/.vib/jupyterhub/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/jupyterhub" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-jupyterhub-proxy-public-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "jupyterhub/goss/goss.yaml", - "vars_file": "jupyterhub/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-jupyterhub-hub" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/jupyterhub/cypress" - }, - "endpoint": "lb-jupyterhub-proxy-public-http", - "app_protocol": "HTTP", - "env": { - "username": "test_user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/jupyterhub/vib-verify.json b/.vib/jupyterhub/vib-verify.json index d3a25bd67cae57..8f64ffc5da2e84 100644 --- a/.vib/jupyterhub/vib-verify.json +++ b/.vib/jupyterhub/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-jupyterhub-proxy-public-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/kafka/vib-publish.json b/.vib/kafka/vib-publish.json index e1cb4dcf5ccf03..4c7e128869da4b 100644 --- a/.vib/kafka/vib-publish.json +++ b/.vib/kafka/vib-publish.json @@ -16,56 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/kafka" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kafka-controller-0-external-tcp-kafka" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "kafka/goss/goss.yaml", - "vars_file": "kafka/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-kafka-controller" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/kafka/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "kafka" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/kafka/vib-verify.json b/.vib/kafka/vib-verify.json index 624f7aff002caa..07fc99c6b1bf86 100644 --- a/.vib/kafka/vib-verify.json +++ b/.vib/kafka/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kafka-controller-0-external-tcp-kafka" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/keycloak/vib-publish.json b/.vib/keycloak/vib-publish.json index 6a590ada4c9e5b..10a1fb5e10a5d3 100644 --- a/.vib/keycloak/vib-publish.json +++ b/.vib/keycloak/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/keycloak" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-keycloak-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "keycloak/goss/goss.yaml", - "vars_file": "keycloak/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-keycloak" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/keycloak/cypress" - }, - "endpoint": "lb-keycloak-http", - "app_protocol": "HTTP", - "env": { - "username": "user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/keycloak/vib-verify.json b/.vib/keycloak/vib-verify.json index 00f4d99151da5e..0bac0bc4d65d47 100644 --- a/.vib/keycloak/vib-verify.json +++ b/.vib/keycloak/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-keycloak-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/kibana/vib-publish.json b/.vib/kibana/vib-publish.json index 38ce7eda02d429..1d6922db853936 100644 --- a/.vib/kibana/vib-publish.json +++ b/.vib/kibana/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/kibana" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kibana-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "kibana/goss/goss.yaml", - "vars_file": "kibana/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-kibana" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/kibana/cypress" - }, - "endpoint": "lb-kibana-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/kibana/vib-verify.json b/.vib/kibana/vib-verify.json index 4c3697997e244f..346223fe56001d 100644 --- a/.vib/kibana/vib-verify.json +++ b/.vib/kibana/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kibana-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/kong/vib-publish.json b/.vib/kong/vib-publish.json index 45b691f38ebfbc..3be09f863c4ca7 100644 --- a/.vib/kong/vib-publish.json +++ b/.vib/kong/vib-publish.json @@ -16,59 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/kong" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kong-http-proxy" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "kong/goss/goss.yaml", - "vars_file": "kong/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-kong" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/kong/cypress" - }, - "endpoint": "lb-kong-http-proxy", - "app_protocol": "HTTP", - "env": { - "apikey": "ComplicatedPassword123!4", - "ingressHost": "www.example.com", - "ingressPath": "/nginx", - "adminHttpPort": "443" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/kong/vib-verify.json b/.vib/kong/vib-verify.json index 0fe5af8d632b00..aeb0b8674bde4e 100644 --- a/.vib/kong/vib-verify.json +++ b/.vib/kong/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kong-http-proxy" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/kube-prometheus/vib-publish.json b/.vib/kube-prometheus/vib-publish.json index a1592523e8bac6..50f514a29c2a96 100644 --- a/.vib/kube-prometheus/vib-publish.json +++ b/.vib/kube-prometheus/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/kube-prometheus" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kube-prometheus-prometheus-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/kube-prometheus/cypress" - }, - "endpoint": "lb-kube-prometheus-prometheus-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "kube-prometheus/goss/goss.yaml", - "vars_file": "kube-prometheus/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-kube-prometheus-operator" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/kube-prometheus/vib-verify.json b/.vib/kube-prometheus/vib-verify.json index b94d20e9f40b2f..db04e9aa43e5e3 100644 --- a/.vib/kube-prometheus/vib-verify.json +++ b/.vib/kube-prometheus/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kube-prometheus-prometheus-http", - "app_protocol": "HTTP" - } - }, { "action_id": "cypress", "params": { diff --git a/.vib/kube-state-metrics/vib-publish.json b/.vib/kube-state-metrics/vib-publish.json index 66a46fe16fa171..9f0261480a9d5a 100644 --- a/.vib/kube-state-metrics/vib-publish.json +++ b/.vib/kube-state-metrics/vib-publish.json @@ -16,44 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/kube-state-metrics" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kube-state-metrics-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "kube-state-metrics/goss/goss.yaml", - "vars_file": "kube-state-metrics/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-kube-state-metrics" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/kubeapps/vib-publish.json b/.vib/kubeapps/vib-publish.json index d75a5187fa43ba..265b5ac45f4da8 100644 --- a/.vib/kubeapps/vib-publish.json +++ b/.vib/kubeapps/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/kubeapps" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kubeapps-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "kubeapps/goss/goss.yaml", - "vars_file": "kubeapps/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-kubeapps-internal-kubeappsapis" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/kubeapps/cypress" - }, - "endpoint": "lb-kubeapps-http", - "env": { - "repoName": "bitnami", - "repoURL": "oci://registry-1.docker.io/bitnamicharts" - }, - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/kubeapps/vib-verify.json b/.vib/kubeapps/vib-verify.json index 010732add9a2da..4936feda77b1e4 100644 --- a/.vib/kubeapps/vib-verify.json +++ b/.vib/kubeapps/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-kubeapps-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/kubernetes-event-exporter/vib-publish.json b/.vib/kubernetes-event-exporter/vib-publish.json index 1e1665ae010655..1788f6a9c5c922 100644 --- a/.vib/kubernetes-event-exporter/vib-publish.json +++ b/.vib/kubernetes-event-exporter/vib-publish.json @@ -16,49 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/kubernetes-event-exporter" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "kubernetes-event-exporter/goss/goss.yaml", - "vars_file": "kubernetes-event-exporter/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-kubernetes-event-exporter" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/kubernetes-event-exporter/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/logstash/vib-publish.json b/.vib/logstash/vib-publish.json index ede7db4e864176..4b35443a1e62ee 100644 --- a/.vib/logstash/vib-publish.json +++ b/.vib/logstash/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/logstash" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-logstash-monitoring", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "logstash/goss/goss.yaml", - "vars_file": "logstash/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-logstash" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/logstash/cypress" - }, - "endpoint": "lb-logstash-monitoring", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/logstash/vib-verify.json b/.vib/logstash/vib-verify.json index 17eeed78ff68bc..31e25894b66225 100644 --- a/.vib/logstash/vib-verify.json +++ b/.vib/logstash/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-logstash-monitoring", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/magento/vib-publish.json b/.vib/magento/vib-publish.json index 19189e9b54723f..8ab6e50b450cda 100644 --- a/.vib/magento/vib-publish.json +++ b/.vib/magento/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/magento" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "L4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-magento-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "magento/goss/goss.yaml", - "remote": { - "pod": { - "workload": "deploy-magento" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/magento/cypress" - }, - "endpoint": "lb-magento-http", - "app_protocol": "HTTP", - "env": { - "username": "user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/magento/vib-verify.json b/.vib/magento/vib-verify.json index ef1961dfcfb51b..cb0b6ab6364947 100644 --- a/.vib/magento/vib-verify.json +++ b/.vib/magento/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-magento-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/mariadb-galera/vib-publish.json b/.vib/mariadb-galera/vib-publish.json index 4059503445c144..77889dac4d12c0 100644 --- a/.vib/mariadb-galera/vib-publish.json +++ b/.vib/mariadb-galera/vib-publish.json @@ -16,59 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/mariadb-galera" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mariadb-galera-mysql", - "app_protocol": "GENERIC" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "mariadb-galera/goss/goss.yaml", - "vars_file": "mariadb-galera/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-mariadb-galera" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/mariadb-galera/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "mariadb-galera", - "username": "bitnamiroot", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/mariadb-galera/vib-verify.json b/.vib/mariadb-galera/vib-verify.json index 042d21c9840119..2d45cc1c2d6537 100644 --- a/.vib/mariadb-galera/vib-verify.json +++ b/.vib/mariadb-galera/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mariadb-galera-mysql", - "app_protocol": "GENERIC" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/mariadb/vib-publish.json b/.vib/mariadb/vib-publish.json index 8086f94e5b3a96..f0ea03ed6858b0 100644 --- a/.vib/mariadb/vib-publish.json +++ b/.vib/mariadb/vib-publish.json @@ -16,59 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/mariadb" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mariadb-primary-mysql", - "app_protocol": "GENERIC" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "mariadb/goss/goss.yaml", - "vars_file": "mariadb/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-mariadb-primary" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/mariadb/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "mariadb-primary", - "username": "root", - "password": "R0ot)Password" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/mariadb/vib-verify.json b/.vib/mariadb/vib-verify.json index 11373480b60013..635fc23fd9c87d 100644 --- a/.vib/mariadb/vib-verify.json +++ b/.vib/mariadb/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mariadb-primary-mysql", - "app_protocol": "GENERIC" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/mastodon/vib-publish.json b/.vib/mastodon/vib-publish.json index c08d08490951e7..5a11aedcd079eb 100644 --- a/.vib/mastodon/vib-publish.json +++ b/.vib/mastodon/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/mastodon" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "L4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mastodon-apache-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "mastodon/goss/goss.yaml", - "vars_file": "mastodon/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-mastodon-web" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/mastodon/cypress" - }, - "endpoint": "lb-mastodon-apache-http", - "app_protocol": "HTTP", - "env": { - "user": "vib-user@changeme.com", - "password": "bitnami!1234" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/mastodon/vib-verify.json b/.vib/mastodon/vib-verify.json index 9de193c4c5d958..b6e85965796195 100644 --- a/.vib/mastodon/vib-verify.json +++ b/.vib/mastodon/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mastodon-apache-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/matomo/vib-publish.json b/.vib/matomo/vib-publish.json index 0dc2ea20cc130e..a677f461caedfd 100644 --- a/.vib/matomo/vib-publish.json +++ b/.vib/matomo/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/matomo" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-matomo-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "matomo/goss/goss.yaml", - "remote": { - "pod": { - "workload": "deploy-matomo" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/matomo/cypress" - }, - "endpoint": "lb-matomo-http", - "app_protocol": "HTTP", - "env": { - "username": "user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/matomo/vib-verify.json b/.vib/matomo/vib-verify.json index 2b964bacb82106..43f82ee9aa1ba2 100644 --- a/.vib/matomo/vib-verify.json +++ b/.vib/matomo/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-matomo-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/mediawiki/vib-publish.json b/.vib/mediawiki/vib-publish.json index 511b45ceba2843..23e558a162544a 100644 --- a/.vib/mediawiki/vib-publish.json +++ b/.vib/mediawiki/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/mediawiki" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mediawiki-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "mediawiki/goss/goss.yaml", - "vars_file": "mediawiki/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-mediawiki" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/mediawiki/cypress" - }, - "endpoint": "lb-mediawiki-http", - "app_protocol": "HTTP", - "env": { - "username": "test_user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/mediawiki/vib-verify.json b/.vib/mediawiki/vib-verify.json index 875a1af3da43c4..a60470ccf02f4f 100644 --- a/.vib/mediawiki/vib-verify.json +++ b/.vib/mediawiki/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mediawiki-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/memcached/vib-publish.json b/.vib/memcached/vib-publish.json index 8053a13184cfed..b0b16a9e49f334 100644 --- a/.vib/memcached/vib-publish.json +++ b/.vib/memcached/vib-publish.json @@ -16,44 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/memcached" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-memcached-memcache", - "app_protocol": "GENERIC" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "memcached/goss/goss.yaml", - "vars_file": "memcached/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-memcached" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/metallb/vib-publish.json b/.vib/metallb/vib-publish.json index bddd5bfd859906..0e120ae06968a3 100644 --- a/.vib/metallb/vib-publish.json +++ b/.vib/metallb/vib-publish.json @@ -16,49 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/metallb" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/metallb/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}" - } - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "metallb/goss/goss.yaml", - "vars_file": "metallb/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-metallb-controller" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/metrics-server/vib-publish.json b/.vib/metrics-server/vib-publish.json index e8c97f3588ea0e..0ba06792d848b1 100644 --- a/.vib/metrics-server/vib-publish.json +++ b/.vib/metrics-server/vib-publish.json @@ -16,44 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/metrics-server" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-metrics-server-https", - "app_protocol": "HTTPS" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "metrics-server/goss/goss.yaml", - "vars_file": "metrics-server/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-metrics-server" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/milvus/vib-publish.json b/.vib/milvus/vib-publish.json index b8f56e5454a0fa..4f90108f50768b 100644 --- a/.vib/milvus/vib-publish.json +++ b/.vib/milvus/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/milvus" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-milvus-attu-http" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "milvus/goss/goss.yaml", - "vars_file": "milvus/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-milvus-proxy" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/milvus/cypress" - }, - "endpoint": "lb-milvus-attu-http", - "app_protocol": "HTTP", - "env": { - "username": "root", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/milvus/vib-verify.json b/.vib/milvus/vib-verify.json index 54467a8b83e9ba..697a81c4274998 100644 --- a/.vib/milvus/vib-verify.json +++ b/.vib/milvus/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-milvus-attu-http" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/minio/vib-publish.json b/.vib/minio/vib-publish.json index 6185749230d3f7..f06fc137a371e1 100644 --- a/.vib/minio/vib-publish.json +++ b/.vib/minio/vib-publish.json @@ -16,73 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/minio" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-minio-minio-console", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "minio/goss/goss.yaml", - "vars_file": "minio/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-minio" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/minio/cypress" - }, - "endpoint": "lb-minio-minio-console", - "app_protocol": "HTTP", - "env": { - "username": "test_admin", - "password": "ComplicatedPassword123!4" - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/minio/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "minio", - "username": "test_admin", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/minio/vib-verify.json b/.vib/minio/vib-verify.json index e5cd64ffd8a114..6e1d9ba64283e0 100644 --- a/.vib/minio/vib-verify.json +++ b/.vib/minio/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-minio-minio-console", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/mongodb-sharded/vib-publish.json b/.vib/mongodb-sharded/vib-publish.json index 8f71008bdfc9a6..085a1f446ed1af 100644 --- a/.vib/mongodb-sharded/vib-publish.json +++ b/.vib/mongodb-sharded/vib-publish.json @@ -16,59 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/mongodb-sharded" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mongodb-sharded-mongodb" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "mongodb-sharded/goss/goss.yaml", - "vars_file": "mongodb-sharded/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-mongodb-sharded-mongos" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/mongodb-sharded/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "mongodb-sharded", - "shards": "3", - "username": "root", - "password": "Password123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/mongodb-sharded/vib-verify.json b/.vib/mongodb-sharded/vib-verify.json index b9db79e14a0bac..dc11182c9ebbcd 100644 --- a/.vib/mongodb-sharded/vib-verify.json +++ b/.vib/mongodb-sharded/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mongodb-sharded-mongodb" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/mongodb/vib-publish.json b/.vib/mongodb/vib-publish.json index 83b9449d7a5bb8..bbe21da033a84b 100644 --- a/.vib/mongodb/vib-publish.json +++ b/.vib/mongodb/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/mongodb" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mongodb-mongodb" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "mongodb/goss/goss.yaml", - "vars_file": "mongodb/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-mongodb" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/mongodb/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "mongodb", - "username": "bitnamiRoot", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/mongodb/vib-verify.json b/.vib/mongodb/vib-verify.json index 6779ce12c71b5d..7a97a7d71ec9d7 100644 --- a/.vib/mongodb/vib-verify.json +++ b/.vib/mongodb/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mongodb-mongodb" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/moodle/vib-publish.json b/.vib/moodle/vib-publish.json index a015ea28450195..719edac882c662 100644 --- a/.vib/moodle/vib-publish.json +++ b/.vib/moodle/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/moodle" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-moodle-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "moodle/goss/goss.yaml", - "vars_file": "moodle/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-moodle" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/moodle/cypress" - }, - "endpoint": "lb-moodle-http", - "app_protocol": "HTTP", - "env": { - "username": "test_user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/moodle/vib-verify.json b/.vib/moodle/vib-verify.json index 1fd25802239463..a9b73d4e9fb2af 100644 --- a/.vib/moodle/vib-verify.json +++ b/.vib/moodle/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-moodle-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/multus-cni/vib-publish.json b/.vib/multus-cni/vib-publish.json index 41f5df1365361a..59886206f32dd2 100644 --- a/.vib/multus-cni/vib-publish.json +++ b/.vib/multus-cni/vib-publish.json @@ -16,37 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/multus-cni" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "multus-cni/goss/goss.yaml", - "vars_file": "multus-cni/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "ds-multus-cni" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/mxnet/vib-publish.json b/.vib/mxnet/vib-publish.json index 85dd91c9c23902..4a46052ad2d275 100644 --- a/.vib/mxnet/vib-publish.json +++ b/.vib/mxnet/vib-publish.json @@ -16,37 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/mxnet" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "mxnet/goss/goss.yaml", - "vars_file": "mxnet/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-mxnet" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/mysql/vib-publish.json b/.vib/mysql/vib-publish.json index 19c5a0213b8ddd..47fdf4e8248f2a 100644 --- a/.vib/mysql/vib-publish.json +++ b/.vib/mysql/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/mysql" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mysql-primary-mysql" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "mysql/goss/goss.yaml", - "vars_file": "mysql/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-mysql-primary" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/mysql/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "mysql-primary", - "username": "root", - "password": "R0ot)Password" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/mysql/vib-verify.json b/.vib/mysql/vib-verify.json index 54f26eb2582d0d..e4d217ddca3973 100644 --- a/.vib/mysql/vib-verify.json +++ b/.vib/mysql/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-mysql-primary-mysql" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/nats/vib-publish.json b/.vib/nats/vib-publish.json index c10b4441025779..7dd869fa29d34a 100644 --- a/.vib/nats/vib-publish.json +++ b/.vib/nats/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/nats" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-nats-tcp-monitoring", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "nats/goss/goss.yaml", - "vars_file": "nats/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-nats" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/nats/cypress" - }, - "endpoint": "lb-nats-tcp-monitoring", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/nats/vib-verify.json b/.vib/nats/vib-verify.json index 59efb796126c10..24315f19e303b0 100644 --- a/.vib/nats/vib-verify.json +++ b/.vib/nats/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-nats-tcp-monitoring", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/nginx-ingress-controller/vib-publish.json b/.vib/nginx-ingress-controller/vib-publish.json index 426cfee80d49aa..949d9e24e7e219 100644 --- a/.vib/nginx-ingress-controller/vib-publish.json +++ b/.vib/nginx-ingress-controller/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/nginx-ingress-controller" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-nginx-ingress-controller-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "nginx-ingress-controller/goss/goss.yaml", - "vars_file": "nginx-ingress-controller/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-nginx-ingress-controller" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/nginx-ingress-controller/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "service-name": "dokuwiki-vib", - "service-port": "80" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/nginx-ingress-controller/vib-verify.json b/.vib/nginx-ingress-controller/vib-verify.json index 90ddd62e8c7f5a..276173b7bd9828 100644 --- a/.vib/nginx-ingress-controller/vib-verify.json +++ b/.vib/nginx-ingress-controller/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-nginx-ingress-controller-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/nginx/vib-publish.json b/.vib/nginx/vib-publish.json index 024690023ff326..8d0a4c7169dd7f 100644 --- a/.vib/nginx/vib-publish.json +++ b/.vib/nginx/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/nginx" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-nginx-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "nginx/goss/goss.yaml", - "vars_file": "nginx/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-nginx" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/nginx/cypress" - }, - "endpoint": "lb-nginx-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/nginx/vib-verify.json b/.vib/nginx/vib-verify.json index 48b1af8d53006f..4259ce4369928f 100644 --- a/.vib/nginx/vib-verify.json +++ b/.vib/nginx/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-nginx-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/node-exporter/vib-publish.json b/.vib/node-exporter/vib-publish.json index edfc789e80c851..ab9327992445e3 100644 --- a/.vib/node-exporter/vib-publish.json +++ b/.vib/node-exporter/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/node-exporter" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "L4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-node-exporter-metrics", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "node-exporter/goss/goss.yaml", - "vars_file": "node-exporter/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "ds-node-exporter" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/node-exporter/cypress" - }, - "endpoint": "lb-node-exporter-metrics", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/node-exporter/vib-verify.json b/.vib/node-exporter/vib-verify.json index 2ccdf86de7987b..2d6816069e6c82 100644 --- a/.vib/node-exporter/vib-verify.json +++ b/.vib/node-exporter/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-node-exporter-metrics", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/oauth2-proxy/vib-publish.json b/.vib/oauth2-proxy/vib-publish.json index 54f6fd206bd07d..6a590b021f8cbb 100644 --- a/.vib/oauth2-proxy/vib-publish.json +++ b/.vib/oauth2-proxy/vib-publish.json @@ -16,59 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/oauth2-proxy" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-oauth2-proxy-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "oauth2-proxy/goss/goss.yaml", - "vars_file": "oauth2-proxy/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-oauth2-proxy" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/oauth2-proxy/cypress" - }, - "endpoint": "lb-oauth2-proxy-http", - "app_protocol": "HTTP", - "env": { - "upstreamURL": "/bitnami/oauth2-proxy/conf/", - "upstreamContent": "oauth2_proxy.cfg", - "dexPort": "5556" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/oauth2-proxy/vib-verify.json b/.vib/oauth2-proxy/vib-verify.json index 9b041f85043c7c..29ad8724708ac5 100644 --- a/.vib/oauth2-proxy/vib-verify.json +++ b/.vib/oauth2-proxy/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-oauth2-proxy-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/odoo/vib-publish.json b/.vib/odoo/vib-publish.json index a7713cb2a21b77..17e8f852898291 100644 --- a/.vib/odoo/vib-publish.json +++ b/.vib/odoo/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/odoo" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-odoo-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/odoo/cypress" - }, - "endpoint": "lb-odoo-http", - "app_protocol": "HTTP", - "env": { - "email": "user@example.com", - "password": "ComplicatedPassword123!4" - } - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "odoo/goss/goss.yaml", - "vars_file": "odoo/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-odoo" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/odoo/vib-verify.json b/.vib/odoo/vib-verify.json index b8262327760e96..564bb7ae22cd8d 100644 --- a/.vib/odoo/vib-verify.json +++ b/.vib/odoo/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-odoo-http", - "app_protocol": "HTTP" - } - }, { "action_id": "cypress", "params": { diff --git a/.vib/opencart/vib-publish.json b/.vib/opencart/vib-publish.json index b1fa8832a08bfe..a18086a185a109 100644 --- a/.vib/opencart/vib-publish.json +++ b/.vib/opencart/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/opencart" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-opencart-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "opencart/goss/goss.yaml", - "vars_file": "opencart/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-opencart" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/opencart/cypress" - }, - "endpoint": "lb-opencart-http", - "app_protocol": "HTTP", - "env": { - "username": "opencartUser", - "password": "Password123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/opencart/vib-verify.json b/.vib/opencart/vib-verify.json index 373888b96c82d8..38294ac338d667 100644 --- a/.vib/opencart/vib-verify.json +++ b/.vib/opencart/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-opencart-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/opensearch/vib-publish.json b/.vib/opensearch/vib-publish.json index f0ca39971c7c52..a76a444281e008 100644 --- a/.vib/opensearch/vib-publish.json +++ b/.vib/opensearch/vib-publish.json @@ -16,67 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/opensearch" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "L4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-opensearch-tcp-rest-api", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "opensearch/goss/goss.yaml", - "vars_file": "opensearch/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-opensearch-master" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/opensearch/cypress" - }, - "endpoint": "lb-opensearch-tcp-rest-api", - "app_protocol": "HTTP" - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/opensearch/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "opensearch" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/opensearch/vib-verify.json b/.vib/opensearch/vib-verify.json index b173ba7200eb4e..b2419d852b955b 100644 --- a/.vib/opensearch/vib-verify.json +++ b/.vib/opensearch/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-opensearch-tcp-rest-api", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/osclass/vib-publish.json b/.vib/osclass/vib-publish.json index f3a6599955e993..ed3a0842199b06 100644 --- a/.vib/osclass/vib-publish.json +++ b/.vib/osclass/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/osclass" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-osclass-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "osclass/goss/goss.yaml", - "vars_file": "osclass/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-osclass" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/osclass/cypress" - }, - "endpoint": "lb-osclass-http", - "app_protocol": "HTTP", - "env": { - "username": "test_user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/osclass/vib-verify.json b/.vib/osclass/vib-verify.json index 7801a47ebb803c..50336b84fd9db1 100644 --- a/.vib/osclass/vib-verify.json +++ b/.vib/osclass/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-osclass-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/parse/vib-publish.json b/.vib/parse/vib-publish.json index 663ba406158a4f..860b391e6a43cc 100644 --- a/.vib/parse/vib-publish.json +++ b/.vib/parse/vib-publish.json @@ -16,72 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/parse" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-parse-dashboard-http-dashboard" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "parse/goss/server/goss.yaml", - "vars_file": "parse/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-parse-server" - } - } - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "parse/goss/dashboard/goss.yaml", - "vars_file": "parse/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-parse-dashboard" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/parse/cypress" - }, - "endpoint": "lb-parse-http-server", - "app_protocol": "HTTP", - "env": { - "appId": "testApp", - "masterKey": "M4ster#K3y" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/parse/vib-verify.json b/.vib/parse/vib-verify.json index cf04de5bf41a99..ab76f8856b4723 100644 --- a/.vib/parse/vib-verify.json +++ b/.vib/parse/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-parse-dashboard-http-dashboard" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/phpbb/vib-publish.json b/.vib/phpbb/vib-publish.json index 1b277c5aefa6f4..2c910afc8c0fd7 100644 --- a/.vib/phpbb/vib-publish.json +++ b/.vib/phpbb/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/phpbb" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-phpbb-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "phpbb/goss/goss.yaml", - "remote": { - "pod": { - "workload": "deploy-phpbb" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/phpbb/cypress" - }, - "endpoint": "lb-phpbb-http", - "app_protocol": "HTTP", - "env": { - "username": "user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/phpbb/vib-verify.json b/.vib/phpbb/vib-verify.json index 691fe940499f33..0fdcb5dbc43b7a 100644 --- a/.vib/phpbb/vib-verify.json +++ b/.vib/phpbb/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-phpbb-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/phpmyadmin/vib-publish.json b/.vib/phpmyadmin/vib-publish.json index e5660fd3de1f14..146b19ef76abc2 100644 --- a/.vib/phpmyadmin/vib-publish.json +++ b/.vib/phpmyadmin/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/phpmyadmin" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-phpmyadmin-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "phpmyadmin/goss/goss.yaml", - "vars_file": "phpmyadmin/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-phpmyadmin" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/phpmyadmin/cypress" - }, - "endpoint": "lb-phpmyadmin-http", - "app_protocol": "HTTP", - "env": { - "username": "root", - "password": "rootPassword" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/phpmyadmin/vib-verify.json b/.vib/phpmyadmin/vib-verify.json index 37a2d5881b9285..ba556dd00e3b07 100644 --- a/.vib/phpmyadmin/vib-verify.json +++ b/.vib/phpmyadmin/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-phpmyadmin-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/pinniped/vib-publish.json b/.vib/pinniped/vib-publish.json index 7598ed5ce8dea0..ad985511f4722a 100644 --- a/.vib/pinniped/vib-publish.json +++ b/.vib/pinniped/vib-publish.json @@ -16,42 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/pinniped" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-pinniped-supervisor-https" - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/pinniped/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "auth-user": "vibuser", - "auth-password": "vibUser123" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/pinniped/vib-verify.json b/.vib/pinniped/vib-verify.json index 69eb8fbf693430..d2548bbd979e72 100644 --- a/.vib/pinniped/vib-verify.json +++ b/.vib/pinniped/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-pinniped-supervisor-https" - } - }, { "action_id": "ginkgo", "params": { diff --git a/.vib/postgresql-ha/vib-publish.json b/.vib/postgresql-ha/vib-publish.json index f4fb43de1ff3bb..a21bf05f95d78a 100644 --- a/.vib/postgresql-ha/vib-publish.json +++ b/.vib/postgresql-ha/vib-publish.json @@ -16,73 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/postgresql-ha" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-postgresql-ha-pgpool-postgresql" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "postgresql-ha/goss/repmgr/goss.yaml", - "vars_file": "postgresql-ha/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-postgresql-ha-postgresql" - } - } - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "postgresql-ha/goss/pgpool/goss.yaml", - "vars_file": "postgresql-ha/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-postgresql-ha-pgpool" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/postgresql-ha/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "postgresql-ha", - "username": "postgres", - "password": "psqlPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/postgresql-ha/vib-verify.json b/.vib/postgresql-ha/vib-verify.json index b34960e4882738..492170ee885939 100644 --- a/.vib/postgresql-ha/vib-verify.json +++ b/.vib/postgresql-ha/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-postgresql-ha-pgpool-postgresql" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/postgresql/vib-publish.json b/.vib/postgresql/vib-publish.json index 97d197e6e7f925..3c3cefa0d3571e 100644 --- a/.vib/postgresql/vib-publish.json +++ b/.vib/postgresql/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/postgresql" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-postgresql-rtest-tcp-postgresql" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "postgresql/goss/goss.yaml", - "vars_file": "postgresql/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-postgresql-ptest" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/postgresql/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "postgresql-ptest", - "username": "postgres", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/postgresql/vib-verify.json b/.vib/postgresql/vib-verify.json index 84e117e44b37a8..7d79f2c7d9d840 100644 --- a/.vib/postgresql/vib-verify.json +++ b/.vib/postgresql/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-postgresql-rtest-tcp-postgresql" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/prestashop/vib-publish.json b/.vib/prestashop/vib-publish.json index 1b1e58c2c5012b..da6dc73f29c266 100644 --- a/.vib/prestashop/vib-publish.json +++ b/.vib/prestashop/vib-publish.json @@ -16,59 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/prestashop" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-prestashop-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "prestashop/goss/goss.yaml", - "vars_file": "prestashop/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-prestashop" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/prestashop/cypress" - }, - "endpoint": "lb-prestashop-http", - "app_protocol": "HTTP", - "env": { - "username": "bitnamiTest", - "email": "bitnamiTest@example.com", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/prestashop/vib-verify.json b/.vib/prestashop/vib-verify.json index 3b70681bc006c6..1b17efc1f7c0c9 100644 --- a/.vib/prestashop/vib-verify.json +++ b/.vib/prestashop/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-prestashop-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/prometheus/vib-publish.json b/.vib/prometheus/vib-publish.json index 7c536af754eb43..8afb55bf742baf 100644 --- a/.vib/prometheus/vib-publish.json +++ b/.vib/prometheus/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/prometheus" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-prometheus-server-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/prometheus/cypress" - }, - "endpoint": "lb-prometheus-server-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "prometheus/goss/goss.yaml", - "vars_file": "prometheus/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-prometheus-server" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/prometheus/vib-verify.json b/.vib/prometheus/vib-verify.json index f644c339f0f310..6961beb3badf7c 100644 --- a/.vib/prometheus/vib-verify.json +++ b/.vib/prometheus/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-prometheus-server-http", - "app_protocol": "HTTP" - } - }, { "action_id": "cypress", "params": { diff --git a/.vib/pytorch/vib-publish.json b/.vib/pytorch/vib-publish.json index 6c88456bb5e390..5a7ce7bad8a468 100644 --- a/.vib/pytorch/vib-publish.json +++ b/.vib/pytorch/vib-publish.json @@ -16,37 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/pytorch" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "pytorch/goss/goss.yaml", - "vars_file": "pytorch/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-pytorch" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/rabbitmq-cluster-operator/vib-publish.json b/.vib/rabbitmq-cluster-operator/vib-publish.json index 541890543811a0..bf950f37ab877a 100644 --- a/.vib/rabbitmq-cluster-operator/vib-publish.json +++ b/.vib/rabbitmq-cluster-operator/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/rabbitmq-cluster-operator" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-rmq-op-webhook-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "rabbitmq-cluster-operator/goss/goss.yaml", - "vars_file": "rabbitmq-cluster-operator/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-ve-testing-server" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/rabbitmq-cluster-operator/cypress" - }, - "endpoint": "lb-extra-svc-management", - "app_protocol": "HTTP", - "env": { - "username": "test_user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/rabbitmq-cluster-operator/vib-verify.json b/.vib/rabbitmq-cluster-operator/vib-verify.json index 3cd01b4696e6a2..03333a4a33b927 100644 --- a/.vib/rabbitmq-cluster-operator/vib-verify.json +++ b/.vib/rabbitmq-cluster-operator/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-rmq-op-webhook-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/rabbitmq/vib-publish.json b/.vib/rabbitmq/vib-publish.json index d5c109338a6af6..6487d28c1fe661 100644 --- a/.vib/rabbitmq/vib-publish.json +++ b/.vib/rabbitmq/vib-publish.json @@ -16,73 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/rabbitmq" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-rabbitmq-http-stats", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "rabbitmq/goss/goss.yaml", - "vars_file": "rabbitmq/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-rabbitmq" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/rabbitmq/cypress" - }, - "endpoint": "lb-rabbitmq-http-stats", - "app_protocol": "HTTP", - "env": { - "username": "test_user", - "password": "ComplicatedPassword123!4" - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/rabbitmq/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "rabbitmq", - "username": "test_user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/rabbitmq/vib-verify.json b/.vib/rabbitmq/vib-verify.json index ab576ecaa2f331..f37903034e01f9 100644 --- a/.vib/rabbitmq/vib-verify.json +++ b/.vib/rabbitmq/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-rabbitmq-http-stats", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/redis-cluster/vib-publish.json b/.vib/redis-cluster/vib-publish.json index 78c31ea57bfe1f..075384a95de6b7 100644 --- a/.vib/redis-cluster/vib-publish.json +++ b/.vib/redis-cluster/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/redis-cluster" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-redis-cluster-tcp-redis" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "redis-cluster/goss/goss.yaml", - "vars_file": "redis-cluster/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-redis-cluster" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/redis-cluster/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "redis-cluster", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/redis-cluster/vib-verify.json b/.vib/redis-cluster/vib-verify.json index bee750f1bb1ad8..e31429c7ee1494 100644 --- a/.vib/redis-cluster/vib-verify.json +++ b/.vib/redis-cluster/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-redis-cluster-tcp-redis" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/redis/vib-publish.json b/.vib/redis/vib-publish.json index bd769bc8b63f01..db833cb9fdd54a 100644 --- a/.vib/redis/vib-publish.json +++ b/.vib/redis/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/redis" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-redis-master-tcp-redis" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "redis/goss/goss.yaml", - "vars_file": "redis/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-redis-master" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/redis/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "redis-master", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/redis/vib-verify.json b/.vib/redis/vib-verify.json index f218f1dcbf3753..174fcb26404322 100644 --- a/.vib/redis/vib-verify.json +++ b/.vib/redis/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-redis-master-tcp-redis" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/redmine/vib-publish.json b/.vib/redmine/vib-publish.json index 7b440063b756d7..7cff6e7fb04707 100644 --- a/.vib/redmine/vib-publish.json +++ b/.vib/redmine/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/redmine" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-redmine-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "redmine/goss/goss.yaml", - "vars_file": "redmine/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-redmine" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/redmine/cypress" - }, - "endpoint": "lb-redmine-http", - "app_protocol": "HTTP", - "env": { - "username": "bitnamiTest", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/redmine/vib-verify.json b/.vib/redmine/vib-verify.json index b462893b1d9a2c..5dc19d75704b76 100644 --- a/.vib/redmine/vib-verify.json +++ b/.vib/redmine/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-redmine-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/schema-registry/vib-publish.json b/.vib/schema-registry/vib-publish.json index 4c071dee8ac7b8..019dd0ba01f185 100644 --- a/.vib/schema-registry/vib-publish.json +++ b/.vib/schema-registry/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/schema-registry" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-schema-registry-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "schema-registry/goss/goss.yaml", - "vars_file": "schema-registry/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-schema-registry" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/schema-registry/cypress" - }, - "endpoint": "lb-schema-registry-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/schema-registry/vib-verify.json b/.vib/schema-registry/vib-verify.json index 56cecbe6a8aa2e..ddc1d863024fbe 100644 --- a/.vib/schema-registry/vib-verify.json +++ b/.vib/schema-registry/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-schema-registry-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/sealed-secrets/vib-publish.json b/.vib/sealed-secrets/vib-publish.json index 834f7a9ace7926..f875cf5a0a4394 100644 --- a/.vib/sealed-secrets/vib-publish.json +++ b/.vib/sealed-secrets/vib-publish.json @@ -16,51 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/sealed-secrets" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-sealed-secrets-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/sealed-secrets/cypress" - }, - "endpoint": "lb-sealed-secrets-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/sealed-secrets/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/sealed-secrets/vib-verify.json b/.vib/sealed-secrets/vib-verify.json index 6bf2d207add9a5..25214ac8cf5913 100644 --- a/.vib/sealed-secrets/vib-verify.json +++ b/.vib/sealed-secrets/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-sealed-secrets-http", - "app_protocol": "HTTP" - } - }, { "action_id": "cypress", "params": { diff --git a/.vib/solr/vib-publish.json b/.vib/solr/vib-publish.json index e73e30e183efde..266fe581b3df51 100644 --- a/.vib/solr/vib-publish.json +++ b/.vib/solr/vib-publish.json @@ -16,69 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/solr" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-solr-tcp-client", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "solr/goss/goss.yaml", - "vars_file": "solr/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-solr" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/solr/cypress" - }, - "endpoint": "lb-solr-tcp-client", - "app_protocol": "HTTP" - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/solr/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "solr", - "username": "admin_user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/solr/vib-verify.json b/.vib/solr/vib-verify.json index d3316248730a48..f4932214a93dc5 100644 --- a/.vib/solr/vib-verify.json +++ b/.vib/solr/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-solr-tcp-client", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/sonarqube/vib-publish.json b/.vib/sonarqube/vib-publish.json index 0563d477f171b4..b442cd13522a1c 100644 --- a/.vib/sonarqube/vib-publish.json +++ b/.vib/sonarqube/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/sonarqube" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_ALTERNATIVE_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-sonarqube-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/sonarqube/cypress" - }, - "endpoint": "lb-sonarqube-http", - "app_protocol": "HTTP", - "env": { - "user": "test_user", - "password": "ComplicatedPassword123!4" - } - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "sonarqube/goss/goss.yaml", - "vars_file": "sonarqube/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-sonarqube" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/sonarqube/vib-verify.json b/.vib/sonarqube/vib-verify.json index a920c2a5533a19..7bc5b6a60c77eb 100644 --- a/.vib/sonarqube/vib-verify.json +++ b/.vib/sonarqube/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-sonarqube-http", - "app_protocol": "HTTP" - } - }, { "action_id": "cypress", "params": { diff --git a/.vib/spark/vib-publish.json b/.vib/spark/vib-publish.json index f27f9eee51af48..25cd69f15f47f1 100644 --- a/.vib/spark/vib-publish.json +++ b/.vib/spark/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/spark" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-spark-master-svc-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "spark/goss/goss.yaml", - "vars_file": "spark/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-spark-worker" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/spark/cypress" - }, - "endpoint": "lb-spark-master-svc-http", - "app_protocol": "HTTP", - "env": { - "expectedWorkers": "2" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/spark/vib-verify.json b/.vib/spark/vib-verify.json index fdcd28317e98b3..84536c58193755 100644 --- a/.vib/spark/vib-verify.json +++ b/.vib/spark/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-spark-master-svc-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/spring-cloud-dataflow/vib-publish.json b/.vib/spring-cloud-dataflow/vib-publish.json index b78fc26209e242..3cb1b64ae5a1e0 100644 --- a/.vib/spring-cloud-dataflow/vib-publish.json +++ b/.vib/spring-cloud-dataflow/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/spring-cloud-dataflow" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-spring-cloud-dataflow-server-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "spring-cloud-dataflow/goss/goss.yaml", - "vars_file": "spring-cloud-dataflow/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-spring-cloud-dataflow-server" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/spring-cloud-dataflow/cypress" - }, - "endpoint": "lb-spring-cloud-dataflow-server-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/spring-cloud-dataflow/vib-verify.json b/.vib/spring-cloud-dataflow/vib-verify.json index 78f02efa5cd830..2bb18930a37382 100644 --- a/.vib/spring-cloud-dataflow/vib-verify.json +++ b/.vib/spring-cloud-dataflow/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-spring-cloud-dataflow-server-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/suitecrm/vib-publish.json b/.vib/suitecrm/vib-publish.json index 2fcfda9b12c265..753a2a72687c52 100644 --- a/.vib/suitecrm/vib-publish.json +++ b/.vib/suitecrm/vib-publish.json @@ -16,61 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/suitecrm" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-suitecrm-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "suitecrm/goss/goss.yaml", - "vars_file": "suitecrm/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-suitecrm" - } - }, - "wait": { - "file": "suitecrm/goss/goss-wait.yaml" - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/suitecrm/cypress" - }, - "endpoint": "lb-suitecrm-http", - "app_protocol": "HTTP", - "env": { - "username": "test_user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/suitecrm/vib-verify.json b/.vib/suitecrm/vib-verify.json index 0ff7738942e4fd..52ed8fe7d2b171 100644 --- a/.vib/suitecrm/vib-verify.json +++ b/.vib/suitecrm/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-suitecrm-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/supabase/vib-publish.json b/.vib/supabase/vib-publish.json index 6f4573276b3c99..3350a00732d407 100644 --- a/.vib/supabase/vib-publish.json +++ b/.vib/supabase/vib-publish.json @@ -16,57 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/supabase" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-supabase-kong-http-proxy", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "supabase/goss/goss.yaml", - "vars_file": "supabase/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-supabase-kong" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/supabase/cypress" - }, - "endpoint": "lb-supabase-kong-http-proxy", - "app_protocol": "HTTP", - "env": { - "serviceKey": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.ewogICAgInJvbGUiOiAic2VydmljZV9yb2xlIiwKICAgICJpc3MiOiAic3VwYWJhc2UiLAogICAgImlhdCI6IDE2NzU0MDA0MDAsCiAgICAiZXhwIjogMTgzMzE2NjgwMAp9.qNsmXzz4tG7eqJPh1Y58DbtIlJBauwpqx39UF-MwM8k" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/supabase/vib-verify.json b/.vib/supabase/vib-verify.json index 6d79eba35a48e2..6e00e0fa9888a1 100644 --- a/.vib/supabase/vib-verify.json +++ b/.vib/supabase/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-supabase-kong-http-proxy", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/tensorflow-resnet/vib-publish.json b/.vib/tensorflow-resnet/vib-publish.json index 1613ea9f1bd4ac..f37dcc8251d383 100644 --- a/.vib/tensorflow-resnet/vib-publish.json +++ b/.vib/tensorflow-resnet/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/tensorflow-resnet" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-tensorflow-resnet-tf-serving-api", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "tensorflow-resnet/goss/goss.yaml", - "vars_file": "tensorflow-resnet/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-tensorflow-resnet" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/tensorflow-resnet/cypress" - }, - "endpoint": "lb-tensorflow-resnet-tf-serving-api", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/tensorflow-resnet/vib-verify.json b/.vib/tensorflow-resnet/vib-verify.json index 809b5ae912305b..471d3288f988b8 100644 --- a/.vib/tensorflow-resnet/vib-verify.json +++ b/.vib/tensorflow-resnet/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-tensorflow-resnet-tf-serving-api", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/thanos/vib-publish.json b/.vib/thanos/vib-publish.json index abbdf324f69f44..41d1dd0291c8cd 100644 --- a/.vib/thanos/vib-publish.json +++ b/.vib/thanos/vib-publish.json @@ -16,43 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/thanos" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "M4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-thanos-query-frontend-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/thanos/cypress" - }, - "endpoint": "lb-thanos-query-frontend-http", - "app_protocol": "HTTP", - "env": { - "storePort": "10903", - "receivePort": "10904" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/thanos/vib-verify.json b/.vib/thanos/vib-verify.json index b85421b98453ae..066b41de069ccd 100644 --- a/.vib/thanos/vib-verify.json +++ b/.vib/thanos/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-thanos-query-frontend-http", - "app_protocol": "HTTP" - } - }, { "action_id": "cypress", "params": { diff --git a/.vib/tomcat/vib-publish.json b/.vib/tomcat/vib-publish.json index 59ffc52950c5f1..862e5b25c1245f 100644 --- a/.vib/tomcat/vib-publish.json +++ b/.vib/tomcat/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/tomcat" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-tomcat-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "tomcat/goss/goss.yaml", - "vars_file": "tomcat/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-tomcat" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/tomcat/cypress" - }, - "endpoint": "lb-tomcat-http", - "app_protocol": "HTTP", - "env": { - "username": "tomcatUser", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/tomcat/vib-verify.json b/.vib/tomcat/vib-verify.json index a64d9f2c11e2e5..e99e358307af79 100644 --- a/.vib/tomcat/vib-verify.json +++ b/.vib/tomcat/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-tomcat-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/vault/vib-publish.json b/.vib/vault/vib-publish.json index 4de92bfc2b276a..60d3e3dad6d486 100644 --- a/.vib/vault/vib-publish.json +++ b/.vib/vault/vib-publish.json @@ -16,58 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/vault" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-vault-server-active-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "vault/goss/goss.yaml", - "vars_file": "vault/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-vault-server" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/vault/cypress" - }, - "endpoint": "lb-vault-server-active-http", - "app_protocol": "HTTP", - "env": { - "username": "vib-user", - "password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/vault/vib-verify.json b/.vib/vault/vib-verify.json index 4a0837d4ee9a49..61ba13a74ff059 100644 --- a/.vib/vault/vib-verify.json +++ b/.vib/vault/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-vault-server-active-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/whereabouts/vib-publish.json b/.vib/whereabouts/vib-publish.json index 5caa2deaa613bd..9afa311918094b 100644 --- a/.vib/whereabouts/vib-publish.json +++ b/.vib/whereabouts/vib-publish.json @@ -16,37 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/whereabouts" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "whereabouts/goss/goss.yaml", - "vars_file": "whereabouts/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "ds-whereabouts" - } - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/wildfly/vib-publish.json b/.vib/wildfly/vib-publish.json index 9fd5662c5cd289..a36ea864ec91d5 100644 --- a/.vib/wildfly/vib-publish.json +++ b/.vib/wildfly/vib-publish.json @@ -16,54 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/wildfly" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-wildfly-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "wildfly/goss/goss.yaml", - "vars_file": "wildfly/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-wildfly" - } - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/wildfly/cypress" - }, - "endpoint": "lb-wildfly-http", - "app_protocol": "HTTP" - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/wildfly/vib-verify.json b/.vib/wildfly/vib-verify.json index c5ac9ff19e1b98..a6f1e308e4c8b9 100644 --- a/.vib/wildfly/vib-verify.json +++ b/.vib/wildfly/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-wildfly-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/wordpress/vib-publish.json b/.vib/wordpress/vib-publish.json index 01948212b611b7..cb25b8bfa3abbb 100644 --- a/.vib/wordpress/vib-publish.json +++ b/.vib/wordpress/vib-publish.json @@ -16,76 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/wordpress" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-wordpress-http", - "app_protocol": "HTTP" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "wordpress/goss/goss.yaml", - "vars_file": "wordpress/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "deploy-wordpress" - } - }, - "wait": { - "file": "wordpress/goss/goss-wait.yaml" - } - } - }, - { - "action_id": "cypress", - "params": { - "resources": { - "path": "/.vib/wordpress/cypress" - }, - "endpoint": "lb-wordpress-https", - "app_protocol": "HTTPS", - "env": { - "username": "test_user", - "password": "ComplicatedPassword123!4" - } - } - }, - { - "action_id": "jmeter", - "params": { - "resources": { - "path": "/.vib/wordpress/jmeter" - }, - "test_plan_file": "wordpress.jmx", - "endpoint": "lb-wordpress-https", - "app_protocol": "HTTPS", - "env": { - "wordpress.username": "test_user", - "wordpress.password": "ComplicatedPassword123!4" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/wordpress/vib-verify.json b/.vib/wordpress/vib-verify.json index ea9401bbd88ba3..6c1802bc1bedf4 100644 --- a/.vib/wordpress/vib-verify.json +++ b/.vib/wordpress/vib-verify.json @@ -30,13 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-wordpress-http", - "app_protocol": "HTTP" - } - }, { "action_id": "goss", "params": { diff --git a/.vib/zookeeper/vib-publish.json b/.vib/zookeeper/vib-publish.json index 9e1fab8d626c4e..632c86856fd99e 100644 --- a/.vib/zookeeper/vib-publish.json +++ b/.vib/zookeeper/vib-publish.json @@ -16,56 +16,6 @@ } ] }, - "verify": { - "context": { - "resources": { - "url": "{SHA_ARCHIVE}", - "path": "/bitnami/zookeeper" - }, - "target_platform": { - "target_platform_id": "{VIB_ENV_TARGET_PLATFORM}", - "size": { - "name": "S4" - } - } - }, - "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-zookeeper-tcp-client" - } - }, - { - "action_id": "goss", - "params": { - "resources": { - "path": "/.vib" - }, - "tests_file": "zookeeper/goss/goss.yaml", - "vars_file": "zookeeper/runtime-parameters.yaml", - "remote": { - "pod": { - "workload": "sts-zookeeper" - } - } - } - }, - { - "action_id": "ginkgo", - "params": { - "resources": { - "path": "/.vib/zookeeper/ginkgo" - }, - "params": { - "kubeconfig": "{{kubeconfig}}", - "namespace": "{{namespace}}", - "name": "zookeeper" - } - } - } - ] - }, "publish": { "actions": [ { diff --git a/.vib/zookeeper/vib-verify.json b/.vib/zookeeper/vib-verify.json index f709f5bab42a5b..5814a49f260235 100644 --- a/.vib/zookeeper/vib-verify.json +++ b/.vib/zookeeper/vib-verify.json @@ -30,12 +30,6 @@ } }, "actions": [ - { - "action_id": "health-check", - "params": { - "endpoint": "lb-zookeeper-tcp-client" - } - }, { "action_id": "goss", "params": { diff --git a/TESTING.md b/TESTING.md index d8f75eac356ced..f750cc33da1e53 100644 --- a/TESTING.md +++ b/TESTING.md @@ -1,11 +1,8 @@ # Testing information -At Bitnami, we are committed to ensure the quality of the assets we deliver, and as such, tests play a fundamental role in the `bitnami/charts` repository. Bear in mind that every contribution to our charts is ultimately published to our Helm index, where it is made available for the rest of the community to benefit from. Before this happens, different checks are required to succeed. More precisely, tests are run when: +At Bitnami, we are committed to ensure the quality of the assets we deliver, and as such, tests play a fundamental role in the `bitnami/charts` repository. Bear in mind that every contribution to our charts is ultimately published to our Helm index, where it is made available for the rest of the community to benefit from. Before this happens, different checks are required to succeed. More precisely, tests are run when a new contribution (regardless of its author) is made through a GitHub Pull Request. -1. A new contribution (regardless of its author) is made through a GitHub Pull Request. -2. Accepted changes are merged to the `main` branch, prior to their release. - -This strategy ensures that a set of changes must have succeeded twice before a new version is sent out to the public. +This strategy ensures that a set of changes must have succeeded before a new version is sent out to the public. In this section, we will discuss: @@ -115,9 +112,9 @@ This guide will focus in the `verify` phase section, in which there are some thi ### vib-verify.json vs vib-publish.json -As seen in the introduction, there are two different events that will trigger the execution of the tests. These two files are associated to those two events respectively (`vib-verify.json` to the creation of a PR, meanwhile `vib-publish.json` to the merging of changes to `main`), and define what VIB should do when they are triggered. +There are different events that will trigger the execution of the workflows and automations in this repository. These two files are associated to two events respectively (`vib-verify.json` to the creation of a PR, meanwhile `vib-publish.json` to the merging of changes to `main`), and define what VIB should do when they are triggered. -Hence, tweaking the files allows to define different action policies depending on the event that was fired. Nevertheless, it was decided that the verification process should be identical in both cases. Therefore, the `verify` section in `vib-verify.json` and `vib-verify.json` files must coincide. +Hence, tweaking the files allows to define different action policies depending on the event that was fired. It was decided that the verification process (i.e. the tests) should only take place when a new PR is created, and hence that is the reason for `verify` section to appear in `vib-verify.json`. ## Testing strategy @@ -265,7 +262,7 @@ Sometimes it is of interest to run the tests locally, for example during develop 1. Deploy the target Chart in your cluster, using the same installation parameters specified in the `vib-verify.json` pipeline file ```bash - $ helm install nginx bitnami/nginx -f .vib/nginx/runtime-parameters.yaml + helm install nginx bitnami/nginx -f .vib/nginx/runtime-parameters.yaml ``` 2. Download and install [Cypress](https://www.cypress.io/). The version currently used is `9.5.4` @@ -396,7 +393,7 @@ Sometimes it is of interest to run the tests locally, for example during develop 1. Deploy the target Chart in your cluster, using the same installation parameters specified in the `vib-verify.json` pipeline file ```bash - $ helm install metallb bitnami/metallb -f .vib/metallb/runtime-parameters.yaml + helm install metallb bitnami/metallb -f .vib/metallb/runtime-parameters.yaml ``` 2. Download and [install Ginkgo](https://onsi.github.io/ginkgo/#installing-ginkgo) in your system @@ -467,7 +464,7 @@ Sometimes it is of interest to run the tests locally, for example during develop 1. Deploy the target Chart in your cluster, using the same installation parameters specified in the `vib-verify.json` pipeline file ```bash - $ helm install nginx bitnami/nginx -f .vib/nginx/runtime-parameters.yaml + helm install nginx bitnami/nginx -f .vib/nginx/runtime-parameters.yaml ``` 2. Download the [GOSS binary for Linux AMD64](https://github.com/goss-org/goss/releases/) diff --git a/bitnami/airflow/Chart.lock b/bitnami/airflow/Chart.lock index e35551f3bbc30d..a2ed2c5af7fd49 100644 --- a/bitnami/airflow/Chart.lock +++ b/bitnami/airflow/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: redis repository: oci://registry-1.docker.io/bitnamicharts - version: 18.1.2 + version: 18.1.3 - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.0 + version: 13.1.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts version: 2.13.2 -digest: sha256:794e93c885a8c59672fced77245dba1d8c90fb5cbbb240d9dbca97dddb044f1d -generated: "2023-10-06T01:22:08.810307204Z" +digest: sha256:cf78163c9f1afeaa8609a6d6ea77f27d79afb32caa392e7f5cb3ed42cc21c677 +generated: "2023-10-09T21:10:32.642697314Z" diff --git a/bitnami/airflow/Chart.yaml b/bitnami/airflow/Chart.yaml index 85b03ce4b377c1..428f423508eb70 100644 --- a/bitnami/airflow/Chart.yaml +++ b/bitnami/airflow/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: airflow-exporter - image: docker.io/bitnami/airflow-exporter:0.20220314.0-debian-11-r433 + image: docker.io/bitnami/airflow-exporter:0.20220314.0-debian-11-r436 - name: airflow-scheduler image: docker.io/bitnami/airflow-scheduler:2.7.1-debian-11-r27 - name: airflow-worker @@ -16,7 +16,7 @@ annotations: - name: git image: docker.io/bitnami/git:2.42.0-debian-11-r41 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 2.7.1 dependencies: @@ -47,4 +47,4 @@ maintainers: name: airflow sources: - https://github.com/bitnami/charts/tree/main/bitnami/airflow -version: 16.0.2 +version: 16.0.3 diff --git a/bitnami/airflow/README.md b/bitnami/airflow/README.md index d8a17909f7b0b8..d9d6966047d68e 100644 --- a/bitnami/airflow/README.md +++ b/bitnami/airflow/README.md @@ -90,7 +90,7 @@ The command removes all the Kubernetes components associated with the chart and | `dags.existingConfigmap` | Name of an existing ConfigMap with all the DAGs files you want to load in Airflow | `""` | | `dags.image.registry` | Init container load-dags image registry | `docker.io` | | `dags.image.repository` | Init container load-dags image repository | `bitnami/os-shell` | -| `dags.image.tag` | Init container load-dags image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `dags.image.tag` | Init container load-dags image tag (immutable tags are recommended) | `11-debian-11-r89` | | `dags.image.digest` | Init container load-dags image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `dags.image.pullPolicy` | Init container load-dags image pull policy | `IfNotPresent` | | `dags.image.pullSecrets` | Init container load-dags image pull secrets | `[]` | @@ -410,7 +410,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Whether or not to create a standalone Airflow exporter to expose Airflow metrics | `false` | | `metrics.image.registry` | Airflow exporter image registry | `docker.io` | | `metrics.image.repository` | Airflow exporter image repository | `bitnami/airflow-exporter` | -| `metrics.image.tag` | Airflow exporter image tag (immutable tags are recommended) | `0.20220314.0-debian-11-r433` | +| `metrics.image.tag` | Airflow exporter image tag (immutable tags are recommended) | `0.20220314.0-debian-11-r436` | | `metrics.image.digest` | Airflow exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Airflow exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Airflow exporter image pull secrets | `[]` | diff --git a/bitnami/airflow/values.yaml b/bitnami/airflow/values.yaml index 018eaf26d41305..562a13e250f7e7 100644 --- a/bitnami/airflow/values.yaml +++ b/bitnami/airflow/values.yaml @@ -121,7 +121,7 @@ dags: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -1286,7 +1286,7 @@ metrics: image: registry: docker.io repository: bitnami/airflow-exporter - tag: 0.20220314.0-debian-11-r433 + tag: 0.20220314.0-debian-11-r436 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/apache/Chart.lock b/bitnami/apache/Chart.lock index f311a68796389c..f187c48bcc8d1c 100644 --- a/bitnami/apache/Chart.lock +++ b/bitnami/apache/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:eba5a1f693000386eaa87ad6e7864e5831cc41f32c07bfec159b5ff01fcd0ce5 -generated: "2023-10-04T19:04:39.417145191Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-05T23:50:04.879857117+02:00" diff --git a/bitnami/apache/Chart.yaml b/bitnami/apache/Chart.yaml index b6922ed5b183fe..dd137f328d2eba 100644 --- a/bitnami/apache/Chart.yaml +++ b/bitnami/apache/Chart.yaml @@ -35,4 +35,4 @@ maintainers: name: apache sources: - https://github.com/bitnami/charts/tree/main/bitnami/apache -version: 10.1.3 +version: 10.1.4 diff --git a/bitnami/appsmith/Chart.lock b/bitnami/appsmith/Chart.lock index 66ec0c9d215978..1f8c8f27085b90 100644 --- a/bitnami/appsmith/Chart.lock +++ b/bitnami/appsmith/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: redis repository: oci://registry-1.docker.io/bitnamicharts - version: 18.1.0 + version: 18.1.3 - name: mongodb repository: oci://registry-1.docker.io/bitnamicharts - version: 14.0.0 + version: 14.0.6 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:725e2c3fe19b2ef776c42f188e5c8d8b3f8aade7dc4c78f731ef84e1c6cc1c8f -generated: "2023-09-22T17:56:13.345280189+02:00" + version: 2.13.2 +digest: sha256:08cd26362898af3f31644d8fec28aec16f5d928fe6f559e4f5c253481a07031d +generated: "2023-10-09T21:04:03.494137787Z" diff --git a/bitnami/appsmith/Chart.yaml b/bitnami/appsmith/Chart.yaml index cc30b8fb7aad83..5690419ffcddb5 100644 --- a/bitnami/appsmith/Chart.yaml +++ b/bitnami/appsmith/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: appsmith - image: docker.io/bitnami/appsmith:1.9.37-debian-11-r10 + image: docker.io/bitnami/appsmith:1.9.38-debian-11-r0 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 -appVersion: 1.9.37 +appVersion: 1.9.38 dependencies: - condition: redis.enabled name: redis @@ -37,4 +37,4 @@ maintainers: name: appsmith sources: - https://github.com/bitnami/charts/tree/main/bitnami/appsmith -version: 2.0.3 +version: 2.0.5 diff --git a/bitnami/appsmith/README.md b/bitnami/appsmith/README.md index f5dedcbeefc8b8..ae7b1262a33c01 100644 --- a/bitnami/appsmith/README.md +++ b/bitnami/appsmith/README.md @@ -67,26 +67,26 @@ The command removes all the Kubernetes components associated with the chart and ### Common parameters -| Name | Description | Value | -| ------------------------ | --------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | -| `kubeVersion` | Override Kubernetes version | `""` | -| `nameOverride` | String to partially override common.names.name | `""` | -| `fullnameOverride` | String to fully override common.names.fullname | `""` | -| `namespaceOverride` | String to fully override common.names.namespace | `""` | -| `commonLabels` | Labels to add to all deployed objects | `{}` | -| `commonAnnotations` | Annotations to add to all deployed objects | `{}` | -| `clusterDomain` | Kubernetes cluster domain name | `cluster.local` | -| `extraDeploy` | Array of extra objects to deploy with the release | `[]` | -| `diagnosticMode.enabled` | Enable diagnostic mode (all probes will be disabled and the command will be overridden) | `false` | -| `diagnosticMode.command` | Command to override all containers in the deployment | `["sleep"]` | -| `diagnosticMode.args` | Args to override all containers in the deployment | `["infinity"]` | -| `image.registry` | Appsmith image registry | `docker.io` | -| `image.repository` | Appsmith image repository | `bitnami/appsmith` | -| `image.tag` | Appsmith image tag (immutable tags are recommended) | `1.9.37-debian-11-r10` | -| `image.digest` | Appsmith image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | -| `image.pullPolicy` | Appsmith image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Appsmith image pull secrets | `[]` | -| `image.debug` | Enable Appsmith image debug mode | `false` | +| Name | Description | Value | +| ------------------------ | --------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- | +| `kubeVersion` | Override Kubernetes version | `""` | +| `nameOverride` | String to partially override common.names.name | `""` | +| `fullnameOverride` | String to fully override common.names.fullname | `""` | +| `namespaceOverride` | String to fully override common.names.namespace | `""` | +| `commonLabels` | Labels to add to all deployed objects | `{}` | +| `commonAnnotations` | Annotations to add to all deployed objects | `{}` | +| `clusterDomain` | Kubernetes cluster domain name | `cluster.local` | +| `extraDeploy` | Array of extra objects to deploy with the release | `[]` | +| `diagnosticMode.enabled` | Enable diagnostic mode (all probes will be disabled and the command will be overridden) | `false` | +| `diagnosticMode.command` | Command to override all containers in the deployment | `["sleep"]` | +| `diagnosticMode.args` | Args to override all containers in the deployment | `["infinity"]` | +| `image.registry` | Appsmith image registry | `docker.io` | +| `image.repository` | Appsmith image repository | `bitnami/appsmith` | +| `image.tag` | Appsmith image tag (immutable tags are recommended) | `1.9.38-debian-11-r0` | +| `image.digest` | Appsmith image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | +| `image.pullPolicy` | Appsmith image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Appsmith image pull secrets | `[]` | +| `image.debug` | Enable Appsmith image debug mode | `false` | ### Appsmith Client Parameters @@ -368,7 +368,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | | `volumePermissions.resources.limits` | The resources limits for the init container | `{}` | diff --git a/bitnami/appsmith/values.yaml b/bitnami/appsmith/values.yaml index b816f8e4bce492..77340173d52d32 100644 --- a/bitnami/appsmith/values.yaml +++ b/bitnami/appsmith/values.yaml @@ -76,7 +76,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/appsmith - tag: 1.9.37-debian-11-r10 + tag: 1.9.38-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1117,7 +1117,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. diff --git a/bitnami/argo-cd/Chart.lock b/bitnami/argo-cd/Chart.lock index 7d44a270481d40..6b846065210d1e 100644 --- a/bitnami/argo-cd/Chart.lock +++ b/bitnami/argo-cd/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: redis repository: oci://registry-1.docker.io/bitnamicharts - version: 18.1.1 + version: 18.1.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:3cf849cecd0e14bc519b4b7c87b1d2d2f1ac65fea7e640e6358396645f100095 -generated: "2023-09-29T20:01:22.373735071Z" + version: 2.13.2 +digest: sha256:b8ca50c329cb04310e2d3a12e20a330276290f9b4cff68b53e6ee2335cb0e012 +generated: "2023-10-09T21:13:24.232028142Z" diff --git a/bitnami/argo-cd/Chart.yaml b/bitnami/argo-cd/Chart.yaml index 8aeb1ceec383cb..87d0c114c77314 100644 --- a/bitnami/argo-cd/Chart.yaml +++ b/bitnami/argo-cd/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: argo-cd - image: docker.io/bitnami/argo-cd:2.8.4-debian-11-r8 + image: docker.io/bitnami/argo-cd:2.8.4-debian-11-r13 - name: dex - image: docker.io/bitnami/dex:2.37.0-debian-11-r90 + image: docker.io/bitnami/dex:2.37.0-debian-11-r94 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: redis - image: docker.io/bitnami/redis:7.2.1-debian-11-r22 + image: docker.io/bitnami/redis:7.2.1-debian-11-r26 apiVersion: v2 appVersion: 2.8.4 dependencies: @@ -39,4 +39,4 @@ maintainers: name: argo-cd sources: - https://github.com/bitnami/charts/tree/main/bitnami/argo-cd -version: 5.1.7 +version: 5.1.11 diff --git a/bitnami/argo-cd/README.md b/bitnami/argo-cd/README.md index 55a3b6582a09dc..5ab158fd29990c 100644 --- a/bitnami/argo-cd/README.md +++ b/bitnami/argo-cd/README.md @@ -75,15 +75,15 @@ The command removes all the Kubernetes components associated with the chart and ### Argo CD image parameters -| Name | Description | Value | -| ------------------- | ------------------------------------------------------------------------------------------------------- | -------------------- | -| `image.registry` | Argo CD image registry | `docker.io` | -| `image.repository` | Argo CD image repository | `bitnami/argo-cd` | -| `image.tag` | Argo CD image tag (immutable tags are recommended) | `2.8.4-debian-11-r8` | -| `image.digest` | Argo CD image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | Argo CD image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Argo CD image pull secrets | `[]` | -| `image.debug` | Enable Argo CD image debug mode | `false` | +| Name | Description | Value | +| ------------------- | ------------------------------------------------------------------------------------------------------- | --------------------- | +| `image.registry` | Argo CD image registry | `docker.io` | +| `image.repository` | Argo CD image repository | `bitnami/argo-cd` | +| `image.tag` | Argo CD image tag (immutable tags are recommended) | `2.8.4-debian-11-r13` | +| `image.digest` | Argo CD image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | Argo CD image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Argo CD image pull secrets | `[]` | +| `image.debug` | Enable Argo CD image debug mode | `false` | ### Argo CD application controller parameters @@ -693,7 +693,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------------------------------- | --------------------------------------------------------------------------------------------------- | ---------------------- | | `dex.image.registry` | Dex image registry | `docker.io` | | `dex.image.repository` | Dex image repository | `bitnami/dex` | -| `dex.image.tag` | Dex image tag (immutable tags are recommended) | `2.37.0-debian-11-r90` | +| `dex.image.tag` | Dex image tag (immutable tags are recommended) | `2.37.0-debian-11-r94` | | `dex.image.digest` | Dex image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `dex.image.pullPolicy` | Dex image pull policy | `IfNotPresent` | | `dex.image.pullSecrets` | Dex image pull secrets | `[]` | @@ -833,7 +833,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | @@ -848,7 +848,7 @@ The command removes all the Kubernetes components associated with the chart and | `rbac.create` | Specifies whether RBAC resources should be created | `true` | | `redis.image.registry` | Redis image registry | `docker.io` | | `redis.image.repository` | Redis image repository | `bitnami/redis` | -| `redis.image.tag` | Redis image tag (immutable tags are recommended) | `7.2.1-debian-11-r22` | +| `redis.image.tag` | Redis image tag (immutable tags are recommended) | `7.2.1-debian-11-r26` | | `redis.image.digest` | Redis image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `redis.image.pullPolicy` | Redis image pull policy | `IfNotPresent` | | `redis.image.pullSecrets` | Redis image pull secrets | `[]` | diff --git a/bitnami/argo-cd/values.yaml b/bitnami/argo-cd/values.yaml index 4e0d98e9db115b..ad29445f9a98cc 100644 --- a/bitnami/argo-cd/values.yaml +++ b/bitnami/argo-cd/values.yaml @@ -58,7 +58,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/argo-cd - tag: 2.8.4-debian-11-r8 + tag: 2.8.4-debian-11-r13 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2701,7 +2701,7 @@ dex: image: registry: docker.io repository: bitnami/dex - tag: 2.37.0-debian-11-r90 + tag: 2.37.0-debian-11-r94 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -3324,7 +3324,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -3377,7 +3377,7 @@ redis: image: registry: docker.io repository: bitnami/redis - tag: 7.2.1-debian-11-r22 + tag: 7.2.1-debian-11-r26 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/argo-workflows/Chart.lock b/bitnami/argo-workflows/Chart.lock index fa672d73fe0acc..e5bdd57880d6fc 100644 --- a/bitnami/argo-workflows/Chart.lock +++ b/bitnami/argo-workflows/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.0.0 + version: 13.1.2 - name: mysql repository: oci://registry-1.docker.io/bitnamicharts - version: 9.12.3 + version: 9.12.4 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:c62e566265d96b2e4459385ee960fd8344ca5c1991b77a1bd86016960196ddb1 -generated: "2023-10-03T17:51:28.075159323Z" + version: 2.13.2 +digest: sha256:1d18a4b4216d3ad993f73f3c9c65f1d1a667091acd0d94c4d52a7f5f3fb3b839 +generated: "2023-10-11T01:31:53.645160066Z" diff --git a/bitnami/argo-workflows/Chart.yaml b/bitnami/argo-workflows/Chart.yaml index 7c79ef29e08627..bb765f96ac1006 100644 --- a/bitnami/argo-workflows/Chart.yaml +++ b/bitnami/argo-workflows/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: argo-workflow-controller - image: docker.io/bitnami/argo-workflow-controller:3.4.11-debian-11-r24 + image: docker.io/bitnami/argo-workflow-controller:3.4.11-debian-11-r28 - name: argo-workflow-exec - image: docker.io/bitnami/argo-workflow-exec:3.4.11-debian-11-r24 + image: docker.io/bitnami/argo-workflow-exec:3.4.11-debian-11-r27 - name: argo-workflow-cli - image: docker.io/bitnami/argo-workflow-cli:3.4.11-debian-11-r24 + image: docker.io/bitnami/argo-workflow-cli:3.4.11-debian-11-r28 apiVersion: v2 appVersion: 3.4.11 dependencies: @@ -42,4 +42,4 @@ maintainers: name: argo-workflows sources: - https://github.com/bitnami/charts/tree/main/bitnami/argo-workflows -version: 6.0.1 +version: 6.0.4 diff --git a/bitnami/argo-workflows/README.md b/bitnami/argo-workflows/README.md index 5d580a0a56fb32..0f4c3f5030ae6b 100644 --- a/bitnami/argo-workflows/README.md +++ b/bitnami/argo-workflows/README.md @@ -81,7 +81,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------- | --------------------------- | | `server.image.registry` | server image registry | `docker.io` | | `server.image.repository` | server image repository | `bitnami/argo-workflow-cli` | -| `server.image.tag` | server image tag (immutable tags are recommended) | `3.4.11-debian-11-r24` | +| `server.image.tag` | server image tag (immutable tags are recommended) | `3.4.11-debian-11-r28` | | `server.image.digest` | server image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `server.image.pullPolicy` | server image pull policy | `IfNotPresent` | | `server.image.pullSecrets` | server image pull secrets | `[]` | @@ -184,7 +184,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------- | ---------------------------------- | | `controller.image.registry` | controller image registry | `docker.io` | | `controller.image.repository` | controller image repository | `bitnami/argo-workflow-controller` | -| `controller.image.tag` | controller image tag (immutable tags are recommended) | `3.4.11-debian-11-r24` | +| `controller.image.tag` | controller image tag (immutable tags are recommended) | `3.4.11-debian-11-r28` | | `controller.image.digest` | controller image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `controller.image.pullPolicy` | controller image pull policy | `IfNotPresent` | | `controller.image.pullSecrets` | controller image pull secrets | `[]` | @@ -290,7 +290,7 @@ The command removes all the Kubernetes components associated with the chart and | ---------------------------------------------------------- | -------------------------------------------------------------------------------------------------------- | ---------------------------- | | `executor.image.registry` | executor image registry | `docker.io` | | `executor.image.repository` | executor image repository | `bitnami/argo-workflow-exec` | -| `executor.image.tag` | executor image tag (immutable tags are recommended) | `3.4.11-debian-11-r24` | +| `executor.image.tag` | executor image tag (immutable tags are recommended) | `3.4.11-debian-11-r27` | | `executor.image.digest` | executor image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `executor.image.pullPolicy` | executor image pull policy | `IfNotPresent` | | `executor.image.pullSecrets` | executor image pull secrets | `[]` | diff --git a/bitnami/argo-workflows/values.yaml b/bitnami/argo-workflows/values.yaml index 6673c6162172d0..9b8fc768a56583 100644 --- a/bitnami/argo-workflows/values.yaml +++ b/bitnami/argo-workflows/values.yaml @@ -68,7 +68,7 @@ server: image: registry: docker.io repository: bitnami/argo-workflow-cli - tag: 3.4.11-debian-11-r24 + tag: 3.4.11-debian-11-r28 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -477,7 +477,7 @@ controller: image: registry: docker.io repository: bitnami/argo-workflow-controller - tag: 3.4.11-debian-11-r24 + tag: 3.4.11-debian-11-r28 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -956,7 +956,7 @@ executor: image: registry: docker.io repository: bitnami/argo-workflow-exec - tag: 3.4.11-debian-11-r24 + tag: 3.4.11-debian-11-r27 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/aspnet-core/Chart.lock b/bitnami/aspnet-core/Chart.lock index 56a5b960c51618..3360e8c630a323 100644 --- a/bitnami/aspnet-core/Chart.lock +++ b/bitnami/aspnet-core/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.0 -digest: sha256:250b173b89f097db6e85c9c203d88df6076bf4f7930c9db7fcc072f428922276 -generated: "2023-09-12T21:45:01.999194039Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-05T23:50:10.0805861+02:00" diff --git a/bitnami/aspnet-core/Chart.yaml b/bitnami/aspnet-core/Chart.yaml index d5284b217d1c5a..a5f830098079d9 100644 --- a/bitnami/aspnet-core/Chart.yaml +++ b/bitnami/aspnet-core/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: aspnet-core - image: docker.io/bitnami/aspnet-core:7.0.11-debian-11-r0 + image: docker.io/bitnami/aspnet-core:7.0.12-debian-11-r0 - name: dotnet-sdk - image: docker.io/bitnami/dotnet-sdk:7.0.401-debian-11-r0 + image: docker.io/bitnami/dotnet-sdk:7.0.401-debian-11-r19 - name: git - image: docker.io/bitnami/git:2.42.0-debian-11-r20 + image: docker.io/bitnami/git:2.42.0-debian-11-r41 apiVersion: v2 -appVersion: 7.0.11 +appVersion: 7.0.12 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -31,4 +31,4 @@ maintainers: name: aspnet-core sources: - https://github.com/bitnami/charts/tree/main/bitnami/aspnet-core -version: 4.4.2 +version: 4.4.4 diff --git a/bitnami/aspnet-core/README.md b/bitnami/aspnet-core/README.md index f5e31b8082eae1..2a36a3ce3b815f 100644 --- a/bitnami/aspnet-core/README.md +++ b/bitnami/aspnet-core/README.md @@ -80,7 +80,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------- | ------------------------------------------------------------------------------------------------------------ | --------------------- | | `image.registry` | ASP.NET Core image registry | `docker.io` | | `image.repository` | ASP.NET Core image repository | `bitnami/aspnet-core` | -| `image.tag` | ASP.NET Core image tag (immutable tags are recommended) | `7.0.11-debian-11-r0` | +| `image.tag` | ASP.NET Core image tag (immutable tags are recommended) | `7.0.12-debian-11-r0` | | `image.digest` | ASP.NET Core image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | ASP.NET Core image pull policy | `IfNotPresent` | | `image.pullSecrets` | ASP.NET Core image pull secrets | `[]` | @@ -163,7 +163,7 @@ The command removes all the Kubernetes components associated with the chart and | `appFromExternalRepo.enabled` | Enable to download/build ASP.NET Core app from external git repository | `true` | | `appFromExternalRepo.clone.image.registry` | Git image registry | `docker.io` | | `appFromExternalRepo.clone.image.repository` | Git image repository | `bitnami/git` | -| `appFromExternalRepo.clone.image.tag` | Git image tag (immutable tags are recommended) | `2.42.0-debian-11-r20` | +| `appFromExternalRepo.clone.image.tag` | Git image tag (immutable tags are recommended) | `2.42.0-debian-11-r41` | | `appFromExternalRepo.clone.image.digest` | Git image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `appFromExternalRepo.clone.image.pullPolicy` | Git image pull policy | `IfNotPresent` | | `appFromExternalRepo.clone.image.pullSecrets` | Git image pull secrets | `[]` | @@ -172,7 +172,7 @@ The command removes all the Kubernetes components associated with the chart and | `appFromExternalRepo.clone.extraVolumeMounts` | Add extra volume mounts for the GIT container | `[]` | | `appFromExternalRepo.publish.image.registry` | .NET SDK image registry | `docker.io` | | `appFromExternalRepo.publish.image.repository` | .NET SDK image repository | `bitnami/dotnet-sdk` | -| `appFromExternalRepo.publish.image.tag` | .NET SDK image tag (immutable tags are recommended) | `7.0.401-debian-11-r0` | +| `appFromExternalRepo.publish.image.tag` | .NET SDK image tag (immutable tags are recommended) | `7.0.401-debian-11-r19` | | `appFromExternalRepo.publish.image.digest` | .NET SDK image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `appFromExternalRepo.publish.image.pullPolicy` | .NET SDK image pull policy | `IfNotPresent` | | `appFromExternalRepo.publish.image.pullSecrets` | .NET SDK image pull secrets | `[]` | diff --git a/bitnami/aspnet-core/values.yaml b/bitnami/aspnet-core/values.yaml index 60086e2509fabd..d045382fd7257f 100644 --- a/bitnami/aspnet-core/values.yaml +++ b/bitnami/aspnet-core/values.yaml @@ -64,7 +64,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/aspnet-core - tag: 7.0.11-debian-11-r0 + tag: 7.0.12-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -376,7 +376,7 @@ appFromExternalRepo: image: registry: docker.io repository: bitnami/git - tag: 2.42.0-debian-11-r20 + tag: 2.42.0-debian-11-r41 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -418,7 +418,7 @@ appFromExternalRepo: image: registry: docker.io repository: bitnami/dotnet-sdk - tag: 7.0.401-debian-11-r0 + tag: 7.0.401-debian-11-r19 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/cassandra/Chart.lock b/bitnami/cassandra/Chart.lock index cb615076af3a30..41a9972156d66d 100644 --- a/bitnami/cassandra/Chart.lock +++ b/bitnami/cassandra/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-01T11:21:47.493108145Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-05T23:50:15.305433234+02:00" diff --git a/bitnami/cassandra/Chart.yaml b/bitnami/cassandra/Chart.yaml index 3c15b0dd30c27a..87ee2c6c695218 100644 --- a/bitnami/cassandra/Chart.yaml +++ b/bitnami/cassandra/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: cassandra-exporter - image: docker.io/bitnami/cassandra-exporter:2.3.8-debian-11-r423 + image: docker.io/bitnami/cassandra-exporter:2.3.8-debian-11-r426 - name: cassandra - image: docker.io/bitnami/cassandra:4.1.3-debian-11-r63 + image: docker.io/bitnami/cassandra:4.1.3-debian-11-r69 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r83 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 4.1.3 dependencies: @@ -32,4 +32,4 @@ maintainers: name: cassandra sources: - https://github.com/bitnami/charts/tree/main/bitnami/cassandra -version: 10.5.5 +version: 10.5.7 diff --git a/bitnami/cassandra/README.md b/bitnami/cassandra/README.md index 42770f20a3409a..4a935fccb8d27a 100644 --- a/bitnami/cassandra/README.md +++ b/bitnami/cassandra/README.md @@ -81,7 +81,7 @@ The command removes all the Kubernetes components associated with the chart and | ----------------------------- | ---------------------------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | Cassandra image registry | `docker.io` | | `image.repository` | Cassandra image repository | `bitnami/cassandra` | -| `image.tag` | Cassandra image tag (immutable tags are recommended) | `4.1.3-debian-11-r63` | +| `image.tag` | Cassandra image tag (immutable tags are recommended) | `4.1.3-debian-11-r69` | | `image.digest` | Cassandra image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | image pull policy | `IfNotPresent` | | `image.pullSecrets` | Cassandra image pull secrets | `[]` | @@ -232,7 +232,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` | | `volumePermissions.image.registry` | Init container volume image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume image tag (immutable tags are recommended) | `11-debian-11-r83` | +| `volumePermissions.image.tag` | Init container volume image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -247,7 +247,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Cassandra exporter image registry | `docker.io` | | `metrics.image.repository` | Cassandra exporter image name | `bitnami/cassandra-exporter` | -| `metrics.image.tag` | Cassandra exporter image tag | `2.3.8-debian-11-r423` | +| `metrics.image.tag` | Cassandra exporter image tag | `2.3.8-debian-11-r426` | | `metrics.image.digest` | Cassandra exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/cassandra/values.yaml b/bitnami/cassandra/values.yaml index 9b2164dcbc1b11..0fa623cbf8cc2e 100644 --- a/bitnami/cassandra/values.yaml +++ b/bitnami/cassandra/values.yaml @@ -76,7 +76,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/cassandra - tag: 4.1.3-debian-11-r63 + tag: 4.1.3-debian-11-r69 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -616,7 +616,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r83 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -684,7 +684,7 @@ metrics: image: registry: docker.io repository: bitnami/cassandra-exporter - tag: 2.3.8-debian-11-r423 + tag: 2.3.8-debian-11-r426 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/cert-manager/Chart.lock b/bitnami/cert-manager/Chart.lock index b8e7a2ab7b4685..e38c1996a1f385 100644 --- a/bitnami/cert-manager/Chart.lock +++ b/bitnami/cert-manager/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:eba5a1f693000386eaa87ad6e7864e5831cc41f32c07bfec159b5ff01fcd0ce5 -generated: "2023-10-04T19:29:05.971845557Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T18:59:50.70846+02:00" diff --git a/bitnami/cert-manager/Chart.yaml b/bitnami/cert-manager/Chart.yaml index 9db3554625f113..1f1d1ec2e2cfdc 100644 --- a/bitnami/cert-manager/Chart.yaml +++ b/bitnami/cert-manager/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: acmesolver - image: docker.io/bitnami/acmesolver:1.13.1-debian-11-r7 + image: docker.io/bitnami/acmesolver:1.13.1-debian-11-r8 - name: cainjector - image: docker.io/bitnami/cainjector:1.13.1-debian-11-r8 + image: docker.io/bitnami/cainjector:1.13.1-debian-11-r9 - name: cert-manager-webhook - image: docker.io/bitnami/cert-manager-webhook:1.13.1-debian-11-r5 + image: docker.io/bitnami/cert-manager-webhook:1.13.1-debian-11-r10 - name: cert-manager - image: docker.io/bitnami/cert-manager:1.13.1-debian-11-r8 + image: docker.io/bitnami/cert-manager:1.13.1-debian-11-r11 apiVersion: v2 appVersion: 1.13.1 dependencies: @@ -35,4 +35,4 @@ maintainers: name: cert-manager sources: - https://github.com/bitnami/charts/tree/main/bitnami/cert-manager -version: 0.12.8 +version: 0.12.11 diff --git a/bitnami/cert-manager/README.md b/bitnami/cert-manager/README.md index 9ecfaef562fbec..bf78f6cc8ed27f 100644 --- a/bitnami/cert-manager/README.md +++ b/bitnami/cert-manager/README.md @@ -83,14 +83,14 @@ The command removes all the Kubernetes components associated with the chart and | `controller.replicaCount` | Number of Controller replicas | `1` | | `controller.image.registry` | Controller image registry | `docker.io` | | `controller.image.repository` | Controller image repository | `bitnami/cert-manager` | -| `controller.image.tag` | Controller image tag (immutable tags are recommended) | `1.13.1-debian-11-r8` | +| `controller.image.tag` | Controller image tag (immutable tags are recommended) | `1.13.1-debian-11-r11` | | `controller.image.digest` | Controller image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `controller.image.pullPolicy` | Controller image pull policy | `IfNotPresent` | | `controller.image.pullSecrets` | Controller image pull secrets | `[]` | | `controller.image.debug` | Controller image debug mode | `false` | | `controller.acmesolver.image.registry` | Controller image registry | `docker.io` | | `controller.acmesolver.image.repository` | Controller image repository | `bitnami/acmesolver` | -| `controller.acmesolver.image.tag` | Controller image tag (immutable tags are recommended) | `1.13.1-debian-11-r7` | +| `controller.acmesolver.image.tag` | Controller image tag (immutable tags are recommended) | `1.13.1-debian-11-r8` | | `controller.acmesolver.image.digest` | Controller image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `controller.acmesolver.image.pullPolicy` | Controller image pull policy | `IfNotPresent` | | `controller.acmesolver.image.pullSecrets` | Controller image pull secrets | `[]` | @@ -145,7 +145,7 @@ The command removes all the Kubernetes components associated with the chart and | `webhook.replicaCount` | Number of Webhook replicas | `1` | | `webhook.image.registry` | Webhook image registry | `docker.io` | | `webhook.image.repository` | Webhook image repository | `bitnami/cert-manager-webhook` | -| `webhook.image.tag` | Webhook image tag (immutable tags are recommended) | `1.13.1-debian-11-r5` | +| `webhook.image.tag` | Webhook image tag (immutable tags are recommended) | `1.13.1-debian-11-r10` | | `webhook.image.digest` | Webhook image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `webhook.image.pullPolicy` | Webhook image pull policy | `IfNotPresent` | | `webhook.image.pullSecrets` | Webhook image pull secrets | `[]` | @@ -217,7 +217,7 @@ The command removes all the Kubernetes components associated with the chart and | `cainjector.replicaCount` | Number of CAInjector replicas | `1` | | `cainjector.image.registry` | CAInjector image registry | `docker.io` | | `cainjector.image.repository` | CAInjector image repository | `bitnami/cainjector` | -| `cainjector.image.tag` | CAInjector image tag (immutable tags are recommended) | `1.13.1-debian-11-r8` | +| `cainjector.image.tag` | CAInjector image tag (immutable tags are recommended) | `1.13.1-debian-11-r9` | | `cainjector.image.digest` | CAInjector image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `cainjector.image.pullPolicy` | CAInjector image pull policy | `IfNotPresent` | | `cainjector.image.pullSecrets` | CAInjector image pull secrets | `[]` | diff --git a/bitnami/cert-manager/values.yaml b/bitnami/cert-manager/values.yaml index fcd2c65eed4f3f..2ec6cb10b63683 100644 --- a/bitnami/cert-manager/values.yaml +++ b/bitnami/cert-manager/values.yaml @@ -72,7 +72,7 @@ controller: image: registry: docker.io repository: bitnami/cert-manager - tag: 1.13.1-debian-11-r8 + tag: 1.13.1-debian-11-r11 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -103,7 +103,7 @@ controller: image: registry: docker.io repository: bitnami/acmesolver - tag: 1.13.1-debian-11-r7 + tag: 1.13.1-debian-11-r8 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -329,7 +329,7 @@ webhook: image: registry: docker.io repository: bitnami/cert-manager-webhook - tag: 1.13.1-debian-11-r5 + tag: 1.13.1-debian-11-r10 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -595,7 +595,7 @@ cainjector: image: registry: docker.io repository: bitnami/cainjector - tag: 1.13.1-debian-11-r8 + tag: 1.13.1-debian-11-r9 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/clickhouse/Chart.lock b/bitnami/clickhouse/Chart.lock index d6285079aa18fd..86fcfb9f1fea56 100644 --- a/bitnami/clickhouse/Chart.lock +++ b/bitnami/clickhouse/Chart.lock @@ -4,6 +4,6 @@ dependencies: version: 12.1.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6e3716213db604b13109e4c542a7d67d7df35b50a0764f7f56a5032a0add2c70 -generated: "2023-09-29T18:39:53.808527443Z" + version: 2.13.2 +digest: sha256:014815aff273844f34be8506ddc386d70779c46590d9899f756d141eb6285acd +generated: "2023-10-09T21:13:20.620902149Z" diff --git a/bitnami/clickhouse/Chart.yaml b/bitnami/clickhouse/Chart.yaml index e5ea480bbb0384..36e8687d3e4dfc 100644 --- a/bitnami/clickhouse/Chart.yaml +++ b/bitnami/clickhouse/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: clickhouse - image: docker.io/bitnami/clickhouse:23.9.1-debian-11-r0 + image: docker.io/bitnami/clickhouse:23.9.1-debian-11-r3 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r83 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: zookeeper - image: docker.io/bitnami/zookeeper:3.8.2-debian-11-r61 + image: docker.io/bitnami/zookeeper:3.8.2-debian-11-r68 apiVersion: v2 appVersion: 23.9.1 dependencies: @@ -35,4 +35,4 @@ maintainers: name: clickhouse sources: - https://github.com/bitnami/charts/tree/main/bitnami/clickhouse -version: 4.0.5 +version: 4.0.7 diff --git a/bitnami/clickhouse/README.md b/bitnami/clickhouse/README.md index 19798154f6aabf..5ce5930288163c 100644 --- a/bitnami/clickhouse/README.md +++ b/bitnami/clickhouse/README.md @@ -91,7 +91,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------------------- | ---------------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | ClickHouse image registry | `docker.io` | | `image.repository` | ClickHouse image repository | `bitnami/clickhouse` | -| `image.tag` | ClickHouse image tag (immutable tags are recommended) | `23.9.1-debian-11-r0` | +| `image.tag` | ClickHouse image tag (immutable tags are recommended) | `23.9.1-debian-11-r3` | | `image.digest` | ClickHouse image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | ClickHouse image pull policy | `IfNotPresent` | | `image.pullSecrets` | ClickHouse image pull secrets | `[]` | @@ -300,7 +300,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r83` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | | `volumePermissions.resources.limits` | The resources limits for the init container | `{}` | @@ -349,7 +349,7 @@ The command removes all the Kubernetes components associated with the chart and | `zookeeper.service.ports.client` | Zookeeper client port | `2181` | | `zookeeper.image.registry` | Zookeeper image registry | `docker.io` | | `zookeeper.image.repository` | Zookeeper image repository | `bitnami/zookeeper` | -| `zookeeper.image.tag` | Zookeeper image tag (immutable tags are recommended) | `3.8.2-debian-11-r61` | +| `zookeeper.image.tag` | Zookeeper image tag (immutable tags are recommended) | `3.8.2-debian-11-r68` | | `zookeeper.image.pullPolicy` | Zookeeper image pull policy | `IfNotPresent` | See to create the table. diff --git a/bitnami/clickhouse/values.yaml b/bitnami/clickhouse/values.yaml index 4c224f71c77d99..a0aa6ce42c9520 100644 --- a/bitnami/clickhouse/values.yaml +++ b/bitnami/clickhouse/values.yaml @@ -79,7 +79,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/clickhouse - tag: 23.9.1-debian-11-r0 + tag: 23.9.1-debian-11-r3 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -966,7 +966,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r83 + tag: 11-debian-11-r89 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. @@ -1119,7 +1119,7 @@ zookeeper: image: registry: docker.io repository: bitnami/zookeeper - tag: 3.8.2-debian-11-r61 + tag: 3.8.2-debian-11-r68 pullPolicy: IfNotPresent replicaCount: 3 service: diff --git a/bitnami/concourse/Chart.lock b/bitnami/concourse/Chart.lock index 139c5b67fccaed..f6cd5af045e19c 100644 --- a/bitnami/concourse/Chart.lock +++ b/bitnami/concourse/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.0.0 + version: 13.1.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:4bb22d8f943a0cafbcc2ac21ecfc76326415a93270b309a26c572596baf6e4d3 -generated: "2023-09-29T20:49:35.182256959Z" + version: 2.13.2 +digest: sha256:2fc3ce8d481c87958b5f49c29275735785751300c1edfd46b4c0b84d958a8421 +generated: "2023-10-09T21:10:27.053416379Z" diff --git a/bitnami/concourse/Chart.yaml b/bitnami/concourse/Chart.yaml index 130c79d42d809d..c4d0c102d122ef 100644 --- a/bitnami/concourse/Chart.yaml +++ b/bitnami/concourse/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: concourse - image: docker.io/bitnami/concourse:7.10.0-debian-11-r55 + image: docker.io/bitnami/concourse:7.10.0-debian-11-r57 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 7.10.0 dependencies: @@ -37,4 +37,4 @@ maintainers: name: concourse sources: - https://github.com/bitnami/charts/tree/main/bitnami/concourse -version: 3.0.3 +version: 3.0.5 diff --git a/bitnami/concourse/README.md b/bitnami/concourse/README.md index 86094e2804726a..64cd4386e08326 100644 --- a/bitnami/concourse/README.md +++ b/bitnami/concourse/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | image registry | `docker.io` | | `image.repository` | image repository | `bitnami/concourse` | -| `image.tag` | image tag (immutable tags are recommended) | `7.10.0-debian-11-r55` | +| `image.tag` | image tag (immutable tags are recommended) | `7.10.0-debian-11-r57` | | `image.digest` | image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | image pull policy | `IfNotPresent` | | `image.pullSecrets` | image pull secrets | `[]` | @@ -356,7 +356,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | diff --git a/bitnami/concourse/values.yaml b/bitnami/concourse/values.yaml index 9450d1d8b50ebd..be0e010fe50443 100644 --- a/bitnami/concourse/values.yaml +++ b/bitnami/concourse/values.yaml @@ -71,7 +71,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/concourse - tag: 7.10.0-debian-11-r55 + tag: 7.10.0-debian-11-r57 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1212,7 +1212,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/consul/Chart.lock b/bitnami/consul/Chart.lock index d9c81c38e0ef02..42f7dd51fac8c6 100644 --- a/bitnami/consul/Chart.lock +++ b/bitnami/consul/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-03T18:16:40.920592989Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T18:57:57.385616+02:00" diff --git a/bitnami/consul/Chart.yaml b/bitnami/consul/Chart.yaml index a89b68c30cc3e0..fede85a06cd3e2 100644 --- a/bitnami/consul/Chart.yaml +++ b/bitnami/consul/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: consul-exporter - image: docker.io/bitnami/consul-exporter:0.9.0-debian-11-r295 + image: docker.io/bitnami/consul-exporter:0.9.0-debian-11-r297 - name: consul - image: docker.io/bitnami/consul:1.16.2-debian-11-r13 + image: docker.io/bitnami/consul:1.16.2-debian-11-r15 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 1.16.2 dependencies: @@ -32,4 +32,4 @@ maintainers: name: consul sources: - https://github.com/bitnami/charts/tree/main/bitnami/consul -version: 10.13.5 +version: 10.13.8 diff --git a/bitnami/consul/README.md b/bitnami/consul/README.md index bc63be8877a3bd..3a221f1b432d06 100644 --- a/bitnami/consul/README.md +++ b/bitnami/consul/README.md @@ -85,7 +85,7 @@ helm delete --purge my-release | ------------------------------- | ---------------------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | HashiCorp Consul image registry | `docker.io` | | `image.repository` | HashiCorp Consul image repository | `bitnami/consul` | -| `image.tag` | HashiCorp Consul image tag (immutable tags are recommended) | `1.16.2-debian-11-r13` | +| `image.tag` | HashiCorp Consul image tag (immutable tags are recommended) | `1.16.2-debian-11-r15` | | `image.digest` | HashiCorp Consul image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | HashiCorp Consul image pull policy | `IfNotPresent` | | `image.pullSecrets` | HashiCorp Consul image pull secrets | `[]` | @@ -220,7 +220,7 @@ helm delete --purge my-release | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | @@ -234,7 +234,7 @@ helm delete --purge my-release | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | HashiCorp Consul Prometheus Exporter image registry | `docker.io` | | `metrics.image.repository` | HashiCorp Consul Prometheus Exporter image repository | `bitnami/consul-exporter` | -| `metrics.image.tag` | HashiCorp Consul Prometheus Exporter image tag (immutable tags are recommended) | `0.9.0-debian-11-r295` | +| `metrics.image.tag` | HashiCorp Consul Prometheus Exporter image tag (immutable tags are recommended) | `0.9.0-debian-11-r297` | | `metrics.image.digest` | HashiCorp Consul Prometheus Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | HashiCorp Consul Prometheus Exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | HashiCorp Consul Prometheus Exporter image pull secrets | `[]` | diff --git a/bitnami/consul/values.yaml b/bitnami/consul/values.yaml index f8c9b63143761f..21e00ee3edf4e4 100644 --- a/bitnami/consul/values.yaml +++ b/bitnami/consul/values.yaml @@ -76,7 +76,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/consul - tag: 1.16.2-debian-11-r13 + tag: 1.16.2-debian-11-r15 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -622,7 +622,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -673,7 +673,7 @@ metrics: image: registry: docker.io repository: bitnami/consul-exporter - tag: 0.9.0-debian-11-r295 + tag: 0.9.0-debian-11-r297 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/contour/Chart.lock b/bitnami/contour/Chart.lock index 00a35d9d2cf567..5fa8e3e8c65d2e 100644 --- a/bitnami/contour/Chart.lock +++ b/bitnami/contour/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-03T18:27:09.69715422Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T18:55:33.685447+02:00" diff --git a/bitnami/contour/Chart.yaml b/bitnami/contour/Chart.yaml index 7c1c4feecae025..fe2f2d2418420c 100644 --- a/bitnami/contour/Chart.yaml +++ b/bitnami/contour/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: contour - image: docker.io/bitnami/contour:1.26.0-debian-11-r14 + image: docker.io/bitnami/contour:1.26.0-debian-11-r16 - name: envoy - image: docker.io/bitnami/envoy:1.26.4-debian-11-r64 + image: docker.io/bitnami/envoy:1.26.4-debian-11-r66 - name: nginx - image: docker.io/bitnami/nginx:1.25.2-debian-11-r42 + image: docker.io/bitnami/nginx:1.25.2-debian-11-r45 apiVersion: v2 appVersion: 1.26.0 dependencies: @@ -32,4 +32,4 @@ maintainers: name: contour sources: - https://github.com/bitnami/charts/tree/main/bitnami/contour -version: 13.1.1 +version: 13.1.3 diff --git a/bitnami/contour/README.md b/bitnami/contour/README.md index f1222c28f8a1d3..36363068413f37 100644 --- a/bitnami/contour/README.md +++ b/bitnami/contour/README.md @@ -90,7 +90,7 @@ helm uninstall my-release | `contour.enabled` | Contour Deployment creation. | `true` | | `contour.image.registry` | Contour image registry | `docker.io` | | `contour.image.repository` | Contour image name | `bitnami/contour` | -| `contour.image.tag` | Contour image tag | `1.26.0-debian-11-r14` | +| `contour.image.tag` | Contour image tag | `1.26.0-debian-11-r16` | | `contour.image.digest` | Contour image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `contour.image.pullPolicy` | Contour Image pull policy | `IfNotPresent` | | `contour.image.pullSecrets` | Contour Image pull secrets | `[]` | @@ -200,7 +200,7 @@ helm uninstall my-release | `envoy.enabled` | Envoy Proxy creation | `true` | | `envoy.image.registry` | Envoy Proxy image registry | `docker.io` | | `envoy.image.repository` | Envoy Proxy image repository | `bitnami/envoy` | -| `envoy.image.tag` | Envoy Proxy image tag (immutable tags are recommended) | `1.26.4-debian-11-r64` | +| `envoy.image.tag` | Envoy Proxy image tag (immutable tags are recommended) | `1.26.4-debian-11-r66` | | `envoy.image.digest` | Envoy Proxy image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `envoy.image.pullPolicy` | Envoy image pull policy | `IfNotPresent` | | `envoy.image.pullSecrets` | Envoy image pull secrets | `[]` | @@ -331,7 +331,7 @@ helm uninstall my-release | `defaultBackend.enabled` | Enable a default backend based on NGINX | `false` | | `defaultBackend.image.registry` | Default backend image registry | `docker.io` | | `defaultBackend.image.repository` | Default backend image name | `bitnami/nginx` | -| `defaultBackend.image.tag` | Default backend image tag | `1.25.2-debian-11-r42` | +| `defaultBackend.image.tag` | Default backend image tag | `1.25.2-debian-11-r45` | | `defaultBackend.image.digest` | Default backend image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `defaultBackend.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `defaultBackend.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/contour/values.yaml b/bitnami/contour/values.yaml index 43325c3695d97b..2b837285820824 100644 --- a/bitnami/contour/values.yaml +++ b/bitnami/contour/values.yaml @@ -96,7 +96,7 @@ contour: image: registry: docker.io repository: bitnami/contour - tag: 1.26.0-debian-11-r14 + tag: 1.26.0-debian-11-r16 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -508,7 +508,7 @@ envoy: image: registry: docker.io repository: bitnami/envoy - tag: 1.26.4-debian-11-r64 + tag: 1.26.4-debian-11-r66 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -980,7 +980,7 @@ defaultBackend: image: registry: docker.io repository: bitnami/nginx - tag: 1.25.2-debian-11-r42 + tag: 1.25.2-debian-11-r45 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/deepspeed/Chart.lock b/bitnami/deepspeed/Chart.lock index c825b71f9623e7..fd08a78da43ee2 100644 --- a/bitnami/deepspeed/Chart.lock +++ b/bitnami/deepspeed/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.10.1 -digest: sha256:daa1b58d8ebece125719a584651716f45f3b32268d691e449da396b34ae89c27 -generated: "2023-09-12T03:55:12.589600416Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-05T23:50:40.011667458+02:00" diff --git a/bitnami/deepspeed/Chart.yaml b/bitnami/deepspeed/Chart.yaml index 62dbdfc378dbb5..70ce9d6c93fe5a 100644 --- a/bitnami/deepspeed/Chart.yaml +++ b/bitnami/deepspeed/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: deepspeed - image: docker.io/bitnami/deepspeed:0.10.3-debian-11-r0 + image: docker.io/bitnami/deepspeed:0.10.3-debian-11-r19 - name: git - image: docker.io/bitnami/git:2.42.0-debian-11-r20 + image: docker.io/bitnami/git:2.42.0-debian-11-r41 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r63 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 0.10.3 dependencies: @@ -35,4 +35,4 @@ name: deepspeed sources: - https://github.com/bitnami/charts/tree/main/bitnami/deepspeed - https://github.com/bitnami/charts/tree/main/bitnami/pytorch -version: 1.2.3 +version: 1.2.5 diff --git a/bitnami/deepspeed/README.md b/bitnami/deepspeed/README.md index 364e369a979285..3fcf9a4c39b90c 100644 --- a/bitnami/deepspeed/README.md +++ b/bitnami/deepspeed/README.md @@ -79,32 +79,32 @@ The command removes all the Kubernetes components associated with the chart and ### Source code parameters -| Name | Description | Value | -| ----------------------------------- | --------------------------------------------------------------------------------------------------------- | --------------------- | -| `image.registry` | Deepspeed image registry | `docker.io` | -| `image.repository` | Deepspeed image repository | `bitnami/deepspeed` | -| `image.tag` | Deepspeed image tag (immutable tags are recommended) | `0.10.3-debian-11-r0` | -| `image.digest` | Deepspeed image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | Deepspeed image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `source.type` | Where the source comes from: Possible values: configmap, git, custom | `configmap` | -| `source.launchCommand` | deepspeed command to run over the project | `""` | -| `source.configMap` | List of files of the project | `{}` | -| `source.existingConfigMap` | Name of a configmap containing the files of the project | `""` | -| `source.git.repository` | Repository that holds the files | `""` | -| `source.git.revision` | Revision from the repository to checkout | `""` | -| `source.git.extraVolumeMounts` | Add extra volume mounts for the Git container | `[]` | -| `config.defaultHostFile` | Host file generated by default (only edit if you know what you are doing) | `""` | -| `config.overrideHostFile` | Override default host file with the content in this value | `""` | -| `config.existingHostFileConfigMap` | Name of a ConfigMap containing the hostfile | `""` | -| `config.defaultSSHClient` | Default SSH client configuration for the client node (only edit if you know what you are doing) | `""` | -| `config.overrideSSHClient` | Override default SSH cliient configuration with the content in this value | `""` | -| `config.existingSSHClientConfigMap` | Name of a ConfigMap containing the SSH client configuration | `""` | -| `config.defaultSSHServer` | Default SSH Server configuration for the worker nodes (only edit if you know what you are doing) | `""` | -| `config.overrideSSHServer` | Overidde SSH Server configuration with the content in this value | `""` | -| `config.existingSSHServerConfigMap` | Name of a ConfigMap with with the SSH Server configuration | `""` | -| `config.sshPrivateKey` | Private key for the client node to connect to the worker nodes | `""` | -| `config.existingSSHKeySecret` | Name of a secret containing the ssh private key | `""` | +| Name | Description | Value | +| ----------------------------------- | --------------------------------------------------------------------------------------------------------- | ---------------------- | +| `image.registry` | Deepspeed image registry | `docker.io` | +| `image.repository` | Deepspeed image repository | `bitnami/deepspeed` | +| `image.tag` | Deepspeed image tag (immutable tags are recommended) | `0.10.3-debian-11-r19` | +| `image.digest` | Deepspeed image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | Deepspeed image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `source.type` | Where the source comes from: Possible values: configmap, git, custom | `configmap` | +| `source.launchCommand` | deepspeed command to run over the project | `""` | +| `source.configMap` | List of files of the project | `{}` | +| `source.existingConfigMap` | Name of a configmap containing the files of the project | `""` | +| `source.git.repository` | Repository that holds the files | `""` | +| `source.git.revision` | Revision from the repository to checkout | `""` | +| `source.git.extraVolumeMounts` | Add extra volume mounts for the Git container | `[]` | +| `config.defaultHostFile` | Host file generated by default (only edit if you know what you are doing) | `""` | +| `config.overrideHostFile` | Override default host file with the content in this value | `""` | +| `config.existingHostFileConfigMap` | Name of a ConfigMap containing the hostfile | `""` | +| `config.defaultSSHClient` | Default SSH client configuration for the client node (only edit if you know what you are doing) | `""` | +| `config.overrideSSHClient` | Override default SSH cliient configuration with the content in this value | `""` | +| `config.existingSSHClientConfigMap` | Name of a ConfigMap containing the SSH client configuration | `""` | +| `config.defaultSSHServer` | Default SSH Server configuration for the worker nodes (only edit if you know what you are doing) | `""` | +| `config.overrideSSHServer` | Overidde SSH Server configuration with the content in this value | `""` | +| `config.existingSSHServerConfigMap` | Name of a ConfigMap with with the SSH Server configuration | `""` | +| `config.sshPrivateKey` | Private key for the client node to connect to the worker nodes | `""` | +| `config.existingSSHKeySecret` | Name of a secret containing the ssh private key | `""` | ### Client Deployment Parameters @@ -321,14 +321,14 @@ The command removes all the Kubernetes components associated with the chart and | `worker.persistence.annotations` | Persistent Volume annotations | `{}` | | `gitImage.registry` | Git image registry | `docker.io` | | `gitImage.repository` | Git image repository | `bitnami/git` | -| `gitImage.tag` | Git image tag (immutable tags are recommended) | `2.42.0-debian-11-r20` | +| `gitImage.tag` | Git image tag (immutable tags are recommended) | `2.42.0-debian-11-r41` | | `gitImage.digest` | Git image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `gitImage.pullPolicy` | Git image pull policy | `IfNotPresent` | | `gitImage.pullSecrets` | Specify docker-registry secret names as an array | `[]` | | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r63` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/deepspeed/values.yaml b/bitnami/deepspeed/values.yaml index 3fd6a3e57bdf89..9b9d1a196496bf 100644 --- a/bitnami/deepspeed/values.yaml +++ b/bitnami/deepspeed/values.yaml @@ -74,7 +74,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/deepspeed - tag: 0.10.3-debian-11-r0 + tag: 0.10.3-debian-11-r19 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -977,7 +977,7 @@ worker: gitImage: registry: docker.io repository: bitnami/git - tag: 2.42.0-debian-11-r20 + tag: 2.42.0-debian-11-r41 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -1005,7 +1005,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r63 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/discourse/Chart.lock b/bitnami/discourse/Chart.lock index efdd7b2e444c9c..fc89a34a046ee2 100644 --- a/bitnami/discourse/Chart.lock +++ b/bitnami/discourse/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: redis repository: oci://registry-1.docker.io/bitnamicharts - version: 18.1.0 + version: 18.1.2 - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.0.0 + version: 13.1.0 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.1 -digest: sha256:16ad2880378a23013f632a787110830f73f209c29039c8b14ba49b69be666445 -generated: "2023-09-29T10:33:16.548073+02:00" + version: 2.13.2 +digest: sha256:cf8948b15444ddd573ef853a3aebdb6150b3a029cd28d521f4175b81a08ab2b1 +generated: "2023-10-06T04:04:24.282170872Z" diff --git a/bitnami/discourse/Chart.yaml b/bitnami/discourse/Chart.yaml index accbe0a959f12b..6299c2e28c9909 100644 --- a/bitnami/discourse/Chart.yaml +++ b/bitnami/discourse/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: discourse - image: docker.io/bitnami/discourse:3.1.1-debian-11-r13 + image: docker.io/bitnami/discourse:3.1.1-debian-11-r22 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r86 apiVersion: v2 appVersion: 3.1.1 dependencies: @@ -41,4 +41,4 @@ maintainers: name: discourse sources: - https://github.com/bitnami/charts/tree/main/bitnami/discourse -version: 12.0.0 +version: 12.0.1 diff --git a/bitnami/discourse/README.md b/bitnami/discourse/README.md index 1552bddc3c1cfd..0bfe26864f3307 100644 --- a/bitnami/discourse/README.md +++ b/bitnami/discourse/README.md @@ -84,7 +84,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | --------------------- | | `image.registry` | Discourse image registry | `docker.io` | | `image.repository` | Discourse image repository | `bitnami/discourse` | -| `image.tag` | Discourse image tag | `3.1.1-debian-11-r13` | +| `image.tag` | Discourse image tag | `3.1.1-debian-11-r22` | | `image.digest` | Discourse image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Discourse image pull policy | `IfNotPresent` | | `image.pullSecrets` | Discourse image pull secrets | `[]` | @@ -252,7 +252,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r86` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | @@ -507,4 +507,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/discourse/values.yaml b/bitnami/discourse/values.yaml index 40a83e943d369b..6adfef2b08b4f8 100644 --- a/bitnami/discourse/values.yaml +++ b/bitnami/discourse/values.yaml @@ -72,7 +72,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/discourse - tag: 3.1.1-debian-11-r13 + tag: 3.1.1-debian-11-r22 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -677,7 +677,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r86 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/dokuwiki/Chart.yaml b/bitnami/dokuwiki/Chart.yaml index bfd733a6526ef1..d076a96f04cf45 100644 --- a/bitnami/dokuwiki/Chart.yaml +++ b/bitnami/dokuwiki/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r5 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: dokuwiki image: docker.io/bitnami/dokuwiki:20230404.1.0-debian-11-r100 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 20230404.1.0 dependencies: @@ -35,4 +35,4 @@ maintainers: name: dokuwiki sources: - https://github.com/bitnami/charts/tree/main/bitnami/dokuwiki -version: 14.2.3 +version: 14.2.4 diff --git a/bitnami/dokuwiki/README.md b/bitnami/dokuwiki/README.md index 04cb6d2aec706e..60ab7dfff179fe 100644 --- a/bitnami/dokuwiki/README.md +++ b/bitnami/dokuwiki/README.md @@ -192,7 +192,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r86` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -206,7 +206,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a exporter side-car | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image name | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag | `1.0.2-debian-11-r5` | +| `metrics.image.tag` | Apache exporter image tag | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -231,7 +231,7 @@ The command removes all the Kubernetes components associated with the chart and | `certificates.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `""` | | `certificates.image.registry` | Container sidecar registry | `docker.io` | | `certificates.image.repository` | Container sidecar image | `bitnami/os-shell` | -| `certificates.image.tag` | Container sidecar image tag | `11-debian-11-r86` | +| `certificates.image.tag` | Container sidecar image tag | `11-debian-11-r89` | | `certificates.image.digest` | Container sidecar image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `certificates.image.pullPolicy` | Container sidecar image pull policy | `IfNotPresent` | | `certificates.image.pullSecrets` | Container sidecar image pull secrets | `[]` | diff --git a/bitnami/dokuwiki/values.yaml b/bitnami/dokuwiki/values.yaml index 36eda008534e33..56e26f14b6fbeb 100644 --- a/bitnami/dokuwiki/values.yaml +++ b/bitnami/dokuwiki/values.yaml @@ -524,7 +524,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -575,7 +575,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.2-debian-11-r5 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -648,7 +648,7 @@ certificates: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/drupal/Chart.lock b/bitnami/drupal/Chart.lock index 19e77b0ab15552..0df46f220f19e3 100644 --- a/bitnami/drupal/Chart.lock +++ b/bitnami/drupal/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.3 + version: 14.0.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts version: 2.13.2 -digest: sha256:c6e65edbabef9c25d383071a222186fd74d56e72e3f930d0b64273624470477d -generated: "2023-10-06T02:15:29.923678565Z" +digest: sha256:7617e01cd06d41043c65d55055935e5b34bfb7a55014a5c7d8da13a52b7f070c +generated: "2023-10-10T13:40:37.590219164+02:00" diff --git a/bitnami/drupal/Chart.yaml b/bitnami/drupal/Chart.yaml index da05a745796714..c8ae290ab86b46 100644 --- a/bitnami/drupal/Chart.yaml +++ b/bitnami/drupal/Chart.yaml @@ -6,18 +6,18 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r5 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: drupal image: docker.io/bitnami/drupal:10.1.5-debian-11-r1 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 10.1.5 dependencies: - condition: mariadb.enabled name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.x.x + version: 14.x.x - name: common repository: oci://registry-1.docker.io/bitnamicharts tags: @@ -40,4 +40,4 @@ maintainers: name: drupal sources: - https://github.com/bitnami/charts/tree/main/bitnami/drupal -version: 15.1.7 +version: 16.0.0 diff --git a/bitnami/drupal/README.md b/bitnami/drupal/README.md index 390c8d4a82c42f..3bdca6bd68d730 100644 --- a/bitnami/drupal/README.md +++ b/bitnami/drupal/README.md @@ -229,7 +229,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r86` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -243,7 +243,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a exporter side-car | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag | `1.0.2-debian-11-r5` | +| `metrics.image.tag` | Apache exporter image tag | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -287,7 +287,7 @@ The command removes all the Kubernetes components associated with the chart and | `certificates.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `""` | | `certificates.image.registry` | Container sidecar registry | `docker.io` | | `certificates.image.repository` | Container sidecar image | `bitnami/os-shell` | -| `certificates.image.tag` | Container sidecar image tag | `11-debian-11-r86` | +| `certificates.image.tag` | Container sidecar image tag | `11-debian-11-r89` | | `certificates.image.digest` | Container sidecar image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `certificates.image.pullPolicy` | Container sidecar image pull policy | `IfNotPresent` | | `certificates.image.pullSecrets` | Container sidecar image pull secrets | `[]` | @@ -408,6 +408,10 @@ Find more information about how to deal with common errors related to Bitnami's ## Upgrading +### To 16.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 15.0.0 This major release bumps the MariaDB version to 11.0. Follow the [upstream instructions](https://mariadb.com/kb/en/upgrading-from-mariadb-10-11-to-mariadb-11-0/) for upgrading from MariaDB 10.11 to 11.0. No major issues are expected during the upgrade. @@ -542,4 +546,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License. diff --git a/bitnami/drupal/values.yaml b/bitnami/drupal/values.yaml index 28e8a5affc6255..9762249de8808a 100644 --- a/bitnami/drupal/values.yaml +++ b/bitnami/drupal/values.yaml @@ -649,7 +649,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -699,7 +699,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.2-debian-11-r5 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -855,7 +855,7 @@ certificates: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/ejbca/Chart.lock b/bitnami/ejbca/Chart.lock index d4cf7611b44f65..653e39b44a867e 100644 --- a/bitnami/ejbca/Chart.lock +++ b/bitnami/ejbca/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.3 + version: 14.0.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:caa848bae8ca8224ac03bb3f49713213a6b63447702cf4e982bfafbf6e2e9bb3 -generated: "2023-09-26T11:16:29.99656616Z" + version: 2.13.2 +digest: sha256:9daa7ebb5cc12099d97a22004fd1a97637feddb5fb42030cc24d89339f78a142 +generated: "2023-10-10T16:39:58.062063428+02:00" diff --git a/bitnami/ejbca/Chart.yaml b/bitnami/ejbca/Chart.yaml index c0d041b8511622..2e4681c7add174 100644 --- a/bitnami/ejbca/Chart.yaml +++ b/bitnami/ejbca/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: ejbca - image: docker.io/bitnami/ejbca:8.0.0-debian-11-r2 + image: docker.io/bitnami/ejbca:8.0.0-debian-11-r7 apiVersion: v2 appVersion: 8.0.0 dependencies: @@ -15,7 +15,7 @@ dependencies: repository: oci://registry-1.docker.io/bitnamicharts tags: - ejbca-database - version: 13.x.x + version: 14.x.x - name: common repository: oci://registry-1.docker.io/bitnamicharts tags: @@ -35,4 +35,4 @@ maintainers: name: ejbca sources: - https://github.com/bitnami/charts/tree/main/bitnami/ejbca -version: 9.0.4 +version: 10.0.0 diff --git a/bitnami/ejbca/README.md b/bitnami/ejbca/README.md index 55966f7ca9bdaa..b13d99fe992801 100644 --- a/bitnami/ejbca/README.md +++ b/bitnami/ejbca/README.md @@ -83,7 +83,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------- | ----------------------------------------------------------------------------------------------------------- | -------------------- | | `image.registry` | EJBCA image registry | `docker.io` | | `image.repository` | EJBCA image name | `bitnami/ejbca` | -| `image.tag` | EJBCA image tag | `8.0.0-debian-11-r2` | +| `image.tag` | EJBCA image tag | `8.0.0-debian-11-r7` | | `image.digest` | EJBCA image image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | EJBCA image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -312,6 +312,10 @@ Find more information about how to deal with common errors related to Bitnami's ## Upgrading +### To 10.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 9.0.0 This major release only bumps the EJBCA version to 8.x. No major issues are expected during the upgrade. Refer to [upstream upgrade notes](https://doc.primekey.com/ejbca/ejbca-release-information/ejbca-upgrade-notes/ejbca-8-0-upgrade-notes) for more info about the changes included in this new major version of the application. @@ -403,4 +407,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License. diff --git a/bitnami/ejbca/values.yaml b/bitnami/ejbca/values.yaml index 9565232d7275a9..da0a2f7feb0e9f 100644 --- a/bitnami/ejbca/values.yaml +++ b/bitnami/ejbca/values.yaml @@ -73,7 +73,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/ejbca - tag: 8.0.0-debian-11-r2 + tag: 8.0.0-debian-11-r7 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/elasticsearch/Chart.lock b/bitnami/elasticsearch/Chart.lock index e12b5433308955..a80a73fbbe52ef 100644 --- a/bitnami/elasticsearch/Chart.lock +++ b/bitnami/elasticsearch/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: kibana repository: oci://registry-1.docker.io/bitnamicharts - version: 10.5.5 + version: 10.5.6 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:db5f89f41ee9c497a7c04c57108cbcf1aaed3bbdd4d7fddf59b2d3332af837fb -generated: "2023-09-27T13:35:55.757549675Z" + version: 2.13.2 +digest: sha256:00ba4a0a9fe4524a5160574d1cc7e4883a9f85fa71d50a01d93662030d6be29d +generated: "2023-10-10T18:13:17.008047029Z" diff --git a/bitnami/elasticsearch/Chart.yaml b/bitnami/elasticsearch/Chart.yaml index 7d5d5ec9a38f48..c0cfbe84226737 100644 --- a/bitnami/elasticsearch/Chart.yaml +++ b/bitnami/elasticsearch/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: elasticsearch-exporter - image: docker.io/bitnami/elasticsearch-exporter:1.6.0-debian-11-r83 + image: docker.io/bitnami/elasticsearch-exporter:1.6.0-debian-11-r93 - name: elasticsearch - image: docker.io/bitnami/elasticsearch:8.10.2-debian-11-r6 + image: docker.io/bitnami/elasticsearch:8.10.3-debian-11-r0 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 -appVersion: 8.10.2 +appVersion: 8.10.3 dependencies: - condition: global.kibanaEnabled name: kibana @@ -34,4 +34,4 @@ maintainers: name: elasticsearch sources: - https://github.com/bitnami/charts/tree/main/bitnami/elasticsearch -version: 19.13.0 +version: 19.13.2 diff --git a/bitnami/elasticsearch/README.md b/bitnami/elasticsearch/README.md index e5a4f4f27fe195..93ece4ea0ba0f2 100644 --- a/bitnami/elasticsearch/README.md +++ b/bitnami/elasticsearch/README.md @@ -108,7 +108,7 @@ helm delete --purge my-release | `useIstioLabels` | Use this variable to add Istio labels to all pods | `true` | | `image.registry` | Elasticsearch image registry | `docker.io` | | `image.repository` | Elasticsearch image repository | `bitnami/elasticsearch` | -| `image.tag` | Elasticsearch image tag (immutable tags are recommended) | `8.10.2-debian-11-r6` | +| `image.tag` | Elasticsearch image tag (immutable tags are recommended) | `8.10.3-debian-11-r0` | | `image.digest` | Elasticsearch image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Elasticsearch image pull policy | `IfNotPresent` | | `image.pullSecrets` | Elasticsearch image pull secrets | `[]` | @@ -540,7 +540,7 @@ helm delete --purge my-release | `metrics.fullnameOverride` | String to fully override common.names.fullname | `""` | | `metrics.image.registry` | Metrics exporter image registry | `docker.io` | | `metrics.image.repository` | Metrics exporter image repository | `bitnami/elasticsearch-exporter` | -| `metrics.image.tag` | Metrics exporter image tag | `1.6.0-debian-11-r83` | +| `metrics.image.tag` | Metrics exporter image tag | `1.6.0-debian-11-r93` | | `metrics.image.digest` | Metrics exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Metrics exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Metrics exporter image pull secrets | `[]` | @@ -622,7 +622,7 @@ helm delete --purge my-release | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r77` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | @@ -631,7 +631,7 @@ helm delete --purge my-release | `sysctlImage.enabled` | Enable kernel settings modifier image | `true` | | `sysctlImage.registry` | Kernel settings modifier image registry | `docker.io` | | `sysctlImage.repository` | Kernel settings modifier image repository | `bitnami/os-shell` | -| `sysctlImage.tag` | Kernel settings modifier image tag | `11-debian-11-r77` | +| `sysctlImage.tag` | Kernel settings modifier image tag | `11-debian-11-r89` | | `sysctlImage.digest` | Kernel settings modifier image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `sysctlImage.pullPolicy` | Kernel settings modifier image pull policy | `IfNotPresent` | | `sysctlImage.pullSecrets` | Kernel settings modifier image pull secrets | `[]` | @@ -1013,4 +1013,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/elasticsearch/values.yaml b/bitnami/elasticsearch/values.yaml index 9e665267b57c90..115870e8e79466 100644 --- a/bitnami/elasticsearch/values.yaml +++ b/bitnami/elasticsearch/values.yaml @@ -189,7 +189,7 @@ useIstioLabels: true image: registry: docker.io repository: bitnami/elasticsearch - tag: 8.10.2-debian-11-r6 + tag: 8.10.3-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1839,7 +1839,7 @@ metrics: image: registry: docker.io repository: bitnami/elasticsearch-exporter - tag: 1.6.0-debian-11-r83 + tag: 1.6.0-debian-11-r93 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -2172,7 +2172,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -2219,7 +2219,7 @@ sysctlImage: ## registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/etcd/Chart.lock b/bitnami/etcd/Chart.lock index c457376686baae..5132ee23b72422 100644 --- a/bitnami/etcd/Chart.lock +++ b/bitnami/etcd/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-03T18:57:05.438853555Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T18:53:33.9513+02:00" diff --git a/bitnami/etcd/Chart.yaml b/bitnami/etcd/Chart.yaml index c7ad480c85e1b2..56e4ab6aaecffe 100644 --- a/bitnami/etcd/Chart.yaml +++ b/bitnami/etcd/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: etcd - image: docker.io/bitnami/etcd:3.5.9-debian-11-r144 + image: docker.io/bitnami/etcd:3.5.9-debian-11-r148 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 3.5.9 dependencies: @@ -32,4 +32,4 @@ maintainers: name: etcd sources: - https://github.com/bitnami/charts/tree/main/bitnami/etcd -version: 9.5.1 +version: 9.5.5 diff --git a/bitnami/etcd/README.md b/bitnami/etcd/README.md index ecf6d6751c8c80..d551265d17ec9d 100644 --- a/bitnami/etcd/README.md +++ b/bitnami/etcd/README.md @@ -81,7 +81,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------------------------- | -------------------------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | etcd image registry | `docker.io` | | `image.repository` | etcd image name | `bitnami/etcd` | -| `image.tag` | etcd image tag | `3.5.9-debian-11-r144` | +| `image.tag` | etcd image tag | `3.5.9-debian-11-r148` | | `image.digest` | etcd image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | etcd image pull policy | `IfNotPresent` | | `image.pullSecrets` | etcd image pull secrets | `[]` | @@ -238,7 +238,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r86` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/etcd/values.yaml b/bitnami/etcd/values.yaml index b0a7ec8cc5e648..c0f5f239c4c68f 100644 --- a/bitnami/etcd/values.yaml +++ b/bitnami/etcd/values.yaml @@ -73,7 +73,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/etcd - tag: 3.5.9-debian-11-r144 + tag: 3.5.9-debian-11-r148 digest: "" ## @param image.pullPolicy etcd image pull policy ## Specify a imagePullPolicy @@ -645,7 +645,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## diff --git a/bitnami/external-dns/Chart.lock b/bitnami/external-dns/Chart.lock index 6c2d46d6d21940..a4c7b9465f0a3d 100644 --- a/bitnami/external-dns/Chart.lock +++ b/bitnami/external-dns/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-29T10:59:22.429308+02:00" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-06T11:20:47.444526051Z" diff --git a/bitnami/external-dns/Chart.yaml b/bitnami/external-dns/Chart.yaml index c455989346fee2..95ed26609c5101 100644 --- a/bitnami/external-dns/Chart.yaml +++ b/bitnami/external-dns/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: external-dns - image: docker.io/bitnami/external-dns:0.13.6-debian-11-r26 + image: docker.io/bitnami/external-dns:0.13.6-debian-11-r30 apiVersion: v2 appVersion: 0.13.6 dependencies: @@ -28,4 +28,4 @@ maintainers: name: external-dns sources: - https://github.com/bitnami/charts/tree/main/bitnami/external-dns -version: 6.26.3 +version: 6.26.5 diff --git a/bitnami/external-dns/README.md b/bitnami/external-dns/README.md index c331b4c17f92c2..eda985b7d09876 100755 --- a/bitnami/external-dns/README.md +++ b/bitnami/external-dns/README.md @@ -78,7 +78,7 @@ The command removes all the Kubernetes components associated with the chart and | ----------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------------- | | `image.registry` | ExternalDNS image registry | `docker.io` | | `image.repository` | ExternalDNS image repository | `bitnami/external-dns` | -| `image.tag` | ExternalDNS Image tag (immutable tags are recommended) | `0.13.6-debian-11-r26` | +| `image.tag` | ExternalDNS Image tag (immutable tags are recommended) | `0.13.6-debian-11-r30` | | `image.digest` | ExternalDNS image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | ExternalDNS image pull policy | `IfNotPresent` | | `image.pullSecrets` | ExternalDNS image pull secrets | `[]` | diff --git a/bitnami/external-dns/values.yaml b/bitnami/external-dns/values.yaml index a592f88a5365a5..dfa2784557d361 100644 --- a/bitnami/external-dns/values.yaml +++ b/bitnami/external-dns/values.yaml @@ -67,7 +67,7 @@ useDaemonset: false image: registry: docker.io repository: bitnami/external-dns - tag: 0.13.6-debian-11-r26 + tag: 0.13.6-debian-11-r30 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/flux/Chart.lock b/bitnami/flux/Chart.lock index ba743258a48849..5be2fa2520a43c 100644 --- a/bitnami/flux/Chart.lock +++ b/bitnami/flux/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-03T20:05:19.05515641Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-06T11:35:54.729126193Z" diff --git a/bitnami/flux/Chart.yaml b/bitnami/flux/Chart.yaml index 0287b74b09ae36..6817393851eb6c 100644 --- a/bitnami/flux/Chart.yaml +++ b/bitnami/flux/Chart.yaml @@ -6,19 +6,19 @@ annotations: licenses: Apache-2.0 images: | - name: fluxcd-helm-controller - image: docker.io/bitnami/fluxcd-helm-controller:0.36.1-debian-11-r14 + image: docker.io/bitnami/fluxcd-helm-controller:0.36.1-debian-11-r16 - name: fluxcd-image-automation-controller - image: docker.io/bitnami/fluxcd-image-automation-controller:0.36.1-debian-11-r11 + image: docker.io/bitnami/fluxcd-image-automation-controller:0.36.1-debian-11-r13 - name: fluxcd-image-reflector-controller - image: docker.io/bitnami/fluxcd-image-reflector-controller:0.30.0-debian-11-r39 + image: docker.io/bitnami/fluxcd-image-reflector-controller:0.30.0-debian-11-r41 - name: fluxcd-kustomize-controller - image: docker.io/bitnami/fluxcd-kustomize-controller:1.1.0-debian-11-r25 + image: docker.io/bitnami/fluxcd-kustomize-controller:1.1.0-debian-11-r27 - name: fluxcd-notification-controller image: docker.io/bitnami/fluxcd-notification-controller:1.1.0-debian-11-r26 - name: fluxcd-source-controller - image: docker.io/bitnami/fluxcd-source-controller:1.1.1-debian-11-r14 + image: docker.io/bitnami/fluxcd-source-controller:1.1.1-debian-11-r16 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 1.1.1 dependencies: @@ -43,4 +43,4 @@ maintainers: name: flux sources: - https://github.com/bitnami/charts/tree/main/bitnami/flux -version: 1.0.2 +version: 1.0.4 diff --git a/bitnami/flux/README.md b/bitnami/flux/README.md index d4122b25873cb0..6ad76e866c9cf7 100644 --- a/bitnami/flux/README.md +++ b/bitnami/flux/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | `kustomizeController.enabled` | Enable Kustomize Controller | `true` | | `kustomizeController.image.registry` | Kustomize Controller image registry | `docker.io` | | `kustomizeController.image.repository` | Kustomize Controller image repository | `bitnami/fluxcd-kustomize-controller` | -| `kustomizeController.image.tag` | Kustomize Controller image tag (immutable tags are recommended) | `1.1.0-debian-11-r25` | +| `kustomizeController.image.tag` | Kustomize Controller image tag (immutable tags are recommended) | `1.1.0-debian-11-r27` | | `kustomizeController.image.digest` | Kustomize Controller image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `kustomizeController.image.pullPolicy` | Kustomize Controller image pull policy | `IfNotPresent` | | `kustomizeController.image.pullSecrets` | Kustomize Controller image pull secrets | `[]` | @@ -203,7 +203,7 @@ The command removes all the Kubernetes components associated with the chart and | `helmController.enabled` | Enable Helm Controller | `true` | | `helmController.image.registry` | Helm Controller image registry | `docker.io` | | `helmController.image.repository` | Helm Controller image repository | `bitnami/fluxcd-helm-controller` | -| `helmController.image.tag` | Helm Controller image tag (immutable tags are recommended) | `0.36.1-debian-11-r14` | +| `helmController.image.tag` | Helm Controller image tag (immutable tags are recommended) | `0.36.1-debian-11-r16` | | `helmController.image.digest` | Helm Controller image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `helmController.image.pullPolicy` | Helm Controller image pull policy | `IfNotPresent` | | `helmController.image.pullSecrets` | Helm Controller image pull secrets | `[]` | @@ -324,7 +324,7 @@ The command removes all the Kubernetes components associated with the chart and | `sourceController.enabled` | Enable Source Controller | `true` | | `sourceController.image.registry` | Source Controller image registry | `docker.io` | | `sourceController.image.repository` | Source Controller image repository | `bitnami/fluxcd-source-controller` | -| `sourceController.image.tag` | Source Controller image tag (immutable tags are recommended) | `1.1.1-debian-11-r14` | +| `sourceController.image.tag` | Source Controller image tag (immutable tags are recommended) | `1.1.1-debian-11-r16` | | `sourceController.image.digest` | Source Controller image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `sourceController.image.pullPolicy` | Source Controller image pull policy | `IfNotPresent` | | `sourceController.image.pullSecrets` | Source Controller image pull secrets | `[]` | @@ -605,7 +605,7 @@ The command removes all the Kubernetes components associated with the chart and | `imageAutomationController.enabled` | Enable Image Automation Controller | `true` | | `imageAutomationController.image.registry` | Image Automation Controller image registry | `docker.io` | | `imageAutomationController.image.repository` | Image Automation Controller image repository | `bitnami/fluxcd-image-automation-controller` | -| `imageAutomationController.image.tag` | Image Automation Controller image tag (immutable tags are recommended) | `0.36.1-debian-11-r11` | +| `imageAutomationController.image.tag` | Image Automation Controller image tag (immutable tags are recommended) | `0.36.1-debian-11-r13` | | `imageAutomationController.image.digest` | Image Automation Controller image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `imageAutomationController.image.pullPolicy` | Image Automation Controller image pull policy | `IfNotPresent` | | `imageAutomationController.image.pullSecrets` | Image Automation Controller image pull secrets | `[]` | @@ -726,7 +726,7 @@ The command removes all the Kubernetes components associated with the chart and | `imageReflectorController.enabled` | Enable Image Reflector Controller | `true` | | `imageReflectorController.image.registry` | Image Reflector Controller image registry | `docker.io` | | `imageReflectorController.image.repository` | Image Reflector Controller image repository | `bitnami/fluxcd-image-reflector-controller` | -| `imageReflectorController.image.tag` | Image Reflector Controller image tag (immutable tags are recommended) | `0.30.0-debian-11-r39` | +| `imageReflectorController.image.tag` | Image Reflector Controller image tag (immutable tags are recommended) | `0.30.0-debian-11-r41` | | `imageReflectorController.image.digest` | Image Reflector Controller image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `imageReflectorController.image.pullPolicy` | Image Reflector Controller image pull policy | `IfNotPresent` | | `imageReflectorController.image.pullSecrets` | Image Reflector Controller image pull secrets | `[]` | @@ -857,7 +857,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | diff --git a/bitnami/flux/values.yaml b/bitnami/flux/values.yaml index e2554c00af53af..78cf93b4bb6b1d 100644 --- a/bitnami/flux/values.yaml +++ b/bitnami/flux/values.yaml @@ -82,7 +82,7 @@ kustomizeController: image: registry: docker.io repository: bitnami/fluxcd-kustomize-controller - tag: 1.1.0-debian-11-r25 + tag: 1.1.0-debian-11-r27 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -515,7 +515,7 @@ helmController: image: registry: docker.io repository: bitnami/fluxcd-helm-controller - tag: 0.36.1-debian-11-r14 + tag: 0.36.1-debian-11-r16 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -948,7 +948,7 @@ sourceController: image: registry: docker.io repository: bitnami/fluxcd-source-controller - tag: 1.1.1-debian-11-r14 + tag: 1.1.1-debian-11-r16 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1974,7 +1974,7 @@ imageAutomationController: image: registry: docker.io repository: bitnami/fluxcd-image-automation-controller - tag: 0.36.1-debian-11-r11 + tag: 0.36.1-debian-11-r13 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2407,7 +2407,7 @@ imageReflectorController: image: registry: docker.io repository: bitnami/fluxcd-image-reflector-controller - tag: 0.30.0-debian-11-r39 + tag: 0.30.0-debian-11-r41 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2884,7 +2884,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/ghost/Chart.lock b/bitnami/ghost/Chart.lock index 714235717c69cb..610ed83ab0ab49 100644 --- a/bitnami/ghost/Chart.lock +++ b/bitnami/ghost/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: mysql repository: oci://registry-1.docker.io/bitnamicharts - version: 9.12.3 + version: 9.12.4 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:4f645e94ac6870a910a5c05a4b54bbc7a426d96c80a02583427099a22687e22f -generated: "2023-10-04T19:34:06.048411809Z" + version: 2.13.2 +digest: sha256:ee0514afb41293fcee7c138ce91e6367314d1a92e1b655e29d5f405984f1c6d5 +generated: "2023-10-09T17:10:34.918418651Z" diff --git a/bitnami/ghost/Chart.yaml b/bitnami/ghost/Chart.yaml index c5af3e543f1b33..66d95cba0064da 100644 --- a/bitnami/ghost/Chart.yaml +++ b/bitnami/ghost/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: ghost - image: docker.io/bitnami/ghost:5.67.0-debian-11-r0 + image: docker.io/bitnami/ghost:5.68.0-debian-11-r0 - name: os-shell image: docker.io/bitnami/os-shell:11-debian-11-r86 apiVersion: v2 -appVersion: 5.67.0 +appVersion: 5.68.0 dependencies: - condition: mysql.enabled name: mysql @@ -40,4 +40,4 @@ maintainers: name: ghost sources: - https://github.com/bitnami/charts/tree/main/bitnami/ghost -version: 19.5.12 +version: 19.5.13 diff --git a/bitnami/ghost/README.md b/bitnami/ghost/README.md index 8f1e9d200fe6fd..93b4260c885fb7 100644 --- a/bitnami/ghost/README.md +++ b/bitnami/ghost/README.md @@ -84,7 +84,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------- | ----------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | Ghost image registry | `docker.io` | | `image.repository` | Ghost image repository | `bitnami/ghost` | -| `image.tag` | Ghost image tag (immutable tags are recommended) | `5.67.0-debian-11-r0` | +| `image.tag` | Ghost image tag (immutable tags are recommended) | `5.68.0-debian-11-r0` | | `image.digest` | Ghost image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Ghost image pull policy | `IfNotPresent` | | `image.pullSecrets` | Ghost image pull secrets | `[]` | diff --git a/bitnami/ghost/values.yaml b/bitnami/ghost/values.yaml index 7bb80fff242fcf..84dd71a933d578 100644 --- a/bitnami/ghost/values.yaml +++ b/bitnami/ghost/values.yaml @@ -73,7 +73,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/ghost - tag: 5.67.0-debian-11-r0 + tag: 5.68.0-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/gitea/Chart.lock b/bitnami/gitea/Chart.lock index 6254afaa046a54..c0bc7e2fcd8cb9 100644 --- a/bitnami/gitea/Chart.lock +++ b/bitnami/gitea/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.0 + version: 13.1.2 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:4a9daa68c8ffafc670045f3da58cdad44d1985414ff89c6a2060c09d0941a348 -generated: "2023-10-05T09:40:32.874791391Z" + version: 2.13.2 +digest: sha256:7231bbd9aede608b96afd7cb87bd478830dd36c5eebca4a38cc4a7a90d5f7e11 +generated: "2023-10-11T03:39:05.158396485Z" diff --git a/bitnami/gitea/Chart.yaml b/bitnami/gitea/Chart.yaml index 7c2f176a773ae6..a285746839c5da 100644 --- a/bitnami/gitea/Chart.yaml +++ b/bitnami/gitea/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: gitea - image: docker.io/bitnami/gitea:1.20.5-debian-11-r2 + image: docker.io/bitnami/gitea:1.20.5-debian-11-r5 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 1.20.5 dependencies: @@ -37,4 +37,4 @@ maintainers: name: gitea sources: - https://github.com/bitnami/charts/tree/main/bitnami/gitea -version: 1.0.2 +version: 1.0.5 diff --git a/bitnami/gitea/README.md b/bitnami/gitea/README.md index 92eabaab1cf5ec..b3e230323837dc 100644 --- a/bitnami/gitea/README.md +++ b/bitnami/gitea/README.md @@ -81,7 +81,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------- | --------------------------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | Gitea image registry | `docker.io` | | `image.repository` | Gitea Image name | `bitnami/gitea` | -| `image.tag` | Gitea Image tag | `1.20.5-debian-11-r2` | +| `image.tag` | Gitea Image tag | `1.20.5-debian-11-r5` | | `image.digest` | Gitea image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Gitea image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -234,7 +234,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r86` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/gitea/values.yaml b/bitnami/gitea/values.yaml index 1bbf84ac50b8d2..e17a822c4f37ea 100644 --- a/bitnami/gitea/values.yaml +++ b/bitnami/gitea/values.yaml @@ -62,7 +62,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/gitea - tag: 1.20.5-debian-11-r2 + tag: 1.20.5-debian-11-r5 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -638,7 +638,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/grafana-loki/Chart.lock b/bitnami/grafana-loki/Chart.lock index cdc6ba7f997867..52776e4f25aa9f 100644 --- a/bitnami/grafana-loki/Chart.lock +++ b/bitnami/grafana-loki/Chart.lock @@ -1,18 +1,18 @@ dependencies: - name: memcached repository: oci://registry-1.docker.io/bitnamicharts - version: 6.6.2 + version: 6.6.5 - name: memcached repository: oci://registry-1.docker.io/bitnamicharts - version: 6.6.2 + version: 6.6.5 - name: memcached repository: oci://registry-1.docker.io/bitnamicharts - version: 6.6.2 + version: 6.6.5 - name: memcached repository: oci://registry-1.docker.io/bitnamicharts - version: 6.6.2 + version: 6.6.5 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:46f93a82c62c9a7aa034d6b44d1c1d5d5706300030515fa45a6ae11ee40ce215 -generated: "2023-10-03T20:52:19.578676993Z" + version: 2.13.2 +digest: sha256:516518f051174c1b7dde7206dfb336bb51ca9d443b698a171fde2ac62bf4e054 +generated: "2023-10-11T04:34:03.61675573Z" diff --git a/bitnami/grafana-loki/Chart.yaml b/bitnami/grafana-loki/Chart.yaml index 069b4fe703578f..03c6ea9c2e0ffb 100644 --- a/bitnami/grafana-loki/Chart.yaml +++ b/bitnami/grafana-loki/Chart.yaml @@ -6,15 +6,15 @@ annotations: licenses: Apache-2.0 images: | - name: grafana-loki - image: docker.io/bitnami/grafana-loki:2.9.1-debian-11-r19 + image: docker.io/bitnami/grafana-loki:2.9.1-debian-11-r22 - name: memcached - image: docker.io/bitnami/memcached:1.6.21-debian-11-r104 + image: docker.io/bitnami/memcached:1.6.21-debian-11-r107 - name: nginx - image: docker.io/bitnami/nginx:1.25.2-debian-11-r42 + image: docker.io/bitnami/nginx:1.25.2-debian-11-r46 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: promtail - image: docker.io/bitnami/promtail:2.9.1-debian-11-r2 + image: docker.io/bitnami/promtail:2.9.1-debian-11-r6 apiVersion: v2 appVersion: 2.9.1 dependencies: @@ -57,4 +57,4 @@ maintainers: name: grafana-loki sources: - https://github.com/bitnami/charts/tree/main/bitnami/grafana-loki -version: 2.11.6 +version: 2.11.10 diff --git a/bitnami/grafana-loki/README.md b/bitnami/grafana-loki/README.md index cd32c41ff4a85b..f4fb58bea85a17 100644 --- a/bitnami/grafana-loki/README.md +++ b/bitnami/grafana-loki/README.md @@ -85,7 +85,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------------- | ------------------------------------------------------------------------------------------------------------ | ----------------------- | | `loki.image.registry` | Grafana Loki image registry | `docker.io` | | `loki.image.repository` | Grafana Loki image repository | `bitnami/grafana-loki` | -| `loki.image.tag` | Grafana Loki image tag (immutable tags are recommended) | `2.9.1-debian-11-r19` | +| `loki.image.tag` | Grafana Loki image tag (immutable tags are recommended) | `2.9.1-debian-11-r22` | | `loki.image.digest` | Grafana Loki image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `loki.image.pullPolicy` | Grafana Loki image pull policy | `IfNotPresent` | | `loki.image.pullSecrets` | Grafana Loki image pull secrets | `[]` | @@ -192,7 +192,7 @@ The command removes all the Kubernetes components associated with the chart and | `gateway.enabled` | Enable Gateway deployment | `true` | | `gateway.image.registry` | Nginx image registry | `docker.io` | | `gateway.image.repository` | Nginx image repository | `bitnami/nginx` | -| `gateway.image.tag` | Nginx image tag (immutable tags are recommended) | `1.25.2-debian-11-r42` | +| `gateway.image.tag` | Nginx image tag (immutable tags are recommended) | `1.25.2-debian-11-r46` | | `gateway.image.digest` | Nginx image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `gateway.image.pullPolicy` | Nginx image pull policy | `IfNotPresent` | | `gateway.image.pullSecrets` | Nginx image pull secrets | `[]` | @@ -973,7 +973,7 @@ The command removes all the Kubernetes components associated with the chart and | `promtail.enabled` | Deploy promtail | `true` | | `promtail.image.registry` | Grafana Promtail image registry | `docker.io` | | `promtail.image.repository` | Grafana Promtail image repository | `bitnami/promtail` | -| `promtail.image.tag` | Grafana Promtail image tag (immutable tags are recommended) | `2.9.1-debian-11-r2` | +| `promtail.image.tag` | Grafana Promtail image tag (immutable tags are recommended) | `2.9.1-debian-11-r6` | | `promtail.image.digest` | Grafana Promtail image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `promtail.image.pullPolicy` | Grafana Promtail image pull policy | `IfNotPresent` | | `promtail.image.pullSecrets` | Grafana Promtail image pull secrets | `[]` | @@ -1065,7 +1065,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | @@ -1112,7 +1112,7 @@ The command removes all the Kubernetes components associated with the chart and | `memcachedchunks.enabled` | Deploy memcached sub-chart | `true` | | `memcachedchunks.image.registry` | Memcached image registry | `docker.io` | | `memcachedchunks.image.repository` | Memcached image repository | `bitnami/memcached` | -| `memcachedchunks.image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r104` | +| `memcachedchunks.image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r107` | | `memcachedchunks.image.digest` | Memcached image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `memcachedchunks.nameOverride` | override the subchart name | `""` | | `memcachedchunks.architecture` | Memcached architecture | `high-availability` | @@ -1132,7 +1132,7 @@ The command removes all the Kubernetes components associated with the chart and | `memcachedfrontend.enabled` | Deploy memcached sub-chart | `true` | | `memcachedfrontend.image.registry` | Memcached image registry | `docker.io` | | `memcachedfrontend.image.repository` | Memcached image repository | `bitnami/memcached` | -| `memcachedfrontend.image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r104` | +| `memcachedfrontend.image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r107` | | `memcachedfrontend.image.digest` | Memcached image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `memcachedfrontend.architecture` | Memcached architecture | `high-availability` | | `memcachedfrontend.nameOverride` | override the subchart name | `""` | @@ -1152,7 +1152,7 @@ The command removes all the Kubernetes components associated with the chart and | `memcachedindexqueries.enabled` | Deploy memcached sub-chart | `true` | | `memcachedindexqueries.image.registry` | Memcached image registry | `docker.io` | | `memcachedindexqueries.image.repository` | Memcached image repository | `bitnami/memcached` | -| `memcachedindexqueries.image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r104` | +| `memcachedindexqueries.image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r107` | | `memcachedindexqueries.image.digest` | Memcached image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `memcachedindexqueries.architecture` | Memcached architecture | `high-availability` | | `memcachedindexqueries.nameOverride` | override the subchart name | `""` | @@ -1172,7 +1172,7 @@ The command removes all the Kubernetes components associated with the chart and | `memcachedindexwrites.enabled` | Deploy memcached sub-chart | `false` | | `memcachedindexwrites.image.registry` | Memcached image registry | `docker.io` | | `memcachedindexwrites.image.repository` | Memcached image repository | `bitnami/memcached` | -| `memcachedindexwrites.image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r104` | +| `memcachedindexwrites.image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r107` | | `memcachedindexwrites.image.digest` | Memcached image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `memcachedindexwrites.architecture` | Memcached architecture | `high-availability` | | `memcachedindexwrites.nameOverride` | override the subchart name | `""` | diff --git a/bitnami/grafana-loki/values.yaml b/bitnami/grafana-loki/values.yaml index 0b53d5befd392f..ec1c73822bf093 100644 --- a/bitnami/grafana-loki/values.yaml +++ b/bitnami/grafana-loki/values.yaml @@ -75,7 +75,7 @@ loki: image: registry: docker.io repository: bitnami/grafana-loki - tag: 2.9.1-debian-11-r19 + tag: 2.9.1-debian-11-r22 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -595,7 +595,7 @@ gateway: image: registry: docker.io repository: bitnami/nginx - tag: 1.25.2-debian-11-r42 + tag: 1.25.2-debian-11-r46 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -3292,7 +3292,7 @@ promtail: image: registry: docker.io repository: bitnami/promtail - tag: 2.9.1-debian-11-r2 + tag: 2.9.1-debian-11-r6 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -3710,7 +3710,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -3832,7 +3832,7 @@ memcachedchunks: image: registry: docker.io repository: bitnami/memcached - tag: 1.6.21-debian-11-r104 + tag: 1.6.21-debian-11-r107 digest: "" ## @param memcachedchunks.nameOverride override the subchart name ## @@ -3873,7 +3873,7 @@ memcachedfrontend: image: registry: docker.io repository: bitnami/memcached - tag: 1.6.21-debian-11-r104 + tag: 1.6.21-debian-11-r107 digest: "" ## @param memcachedfrontend.architecture Memcached architecture ## @@ -3915,7 +3915,7 @@ memcachedindexqueries: image: registry: docker.io repository: bitnami/memcached - tag: 1.6.21-debian-11-r104 + tag: 1.6.21-debian-11-r107 digest: "" ## @param memcachedindexqueries.architecture Memcached architecture ## @@ -3956,7 +3956,7 @@ memcachedindexwrites: image: registry: docker.io repository: bitnami/memcached - tag: 1.6.21-debian-11-r104 + tag: 1.6.21-debian-11-r107 digest: "" ## @param memcachedindexwrites.architecture Memcached architecture ## diff --git a/bitnami/grafana-mimir/Chart.lock b/bitnami/grafana-mimir/Chart.lock index cf7799acc85f7b..145d80d1968897 100644 --- a/bitnami/grafana-mimir/Chart.lock +++ b/bitnami/grafana-mimir/Chart.lock @@ -1,21 +1,21 @@ dependencies: - name: minio repository: oci://registry-1.docker.io/bitnamicharts - version: 12.8.11 + version: 12.8.12 - name: memcached repository: oci://registry-1.docker.io/bitnamicharts - version: 6.6.2 + version: 6.6.3 - name: memcached repository: oci://registry-1.docker.io/bitnamicharts - version: 6.6.2 + version: 6.6.3 - name: memcached repository: oci://registry-1.docker.io/bitnamicharts - version: 6.6.2 + version: 6.6.3 - name: memcached repository: oci://registry-1.docker.io/bitnamicharts - version: 6.6.2 + version: 6.6.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:1f891893f9e159b07707b8deee94bb6bba4cf3e1fee9147d486b42f0559fd4c0 -generated: "2023-10-03T21:27:58.768921385Z" + version: 2.13.2 +digest: sha256:c3fba8d600c43fa25f2197ad0040d10756120a7087238219c41c0c8478556d47 +generated: "2023-10-09T21:17:34.748902486Z" diff --git a/bitnami/grafana-mimir/Chart.yaml b/bitnami/grafana-mimir/Chart.yaml index a6bc5c7fbff627..e800f4610b4bb2 100644 --- a/bitnami/grafana-mimir/Chart.yaml +++ b/bitnami/grafana-mimir/Chart.yaml @@ -10,9 +10,9 @@ annotations: - name: memcached image: docker.io/bitnami/memcached:1.6.21-debian-11-r104 - name: nginx - image: docker.io/bitnami/nginx:1.25.2-debian-11-r42 + image: docker.io/bitnami/nginx:1.25.2-debian-11-r45 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 2.10.0 dependencies: @@ -59,4 +59,4 @@ maintainers: name: grafana-mimir sources: - https://github.com/bitnami/charts/tree/main/bitnami/grafana-mimir -version: 0.6.6 +version: 0.6.7 diff --git a/bitnami/grafana-mimir/README.md b/bitnami/grafana-mimir/README.md index 9cf5402232ec7c..37bf901eef5ed6 100644 --- a/bitnami/grafana-mimir/README.md +++ b/bitnami/grafana-mimir/README.md @@ -381,7 +381,7 @@ The command removes all the Kubernetes components associated with the chart and | `gateway.enabled` | Enable Gateway deployment | `true` | | `gateway.image.registry` | Nginx image registry | `docker.io` | | `gateway.image.repository` | Nginx image repository | `bitnami/nginx` | -| `gateway.image.tag` | Nginx image tag (immutable tags are recommended) | `1.25.2-debian-11-r42` | +| `gateway.image.tag` | Nginx image tag (immutable tags are recommended) | `1.25.2-debian-11-r45` | | `gateway.image.digest` | Nginx image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `gateway.image.pullPolicy` | Nginx image pull policy | `IfNotPresent` | | `gateway.image.pullSecrets` | Nginx image pull secrets | `[]` | @@ -1098,7 +1098,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | | `volumePermissions.resources.limits` | The resources limits for the init container | `{}` | diff --git a/bitnami/grafana-mimir/values.yaml b/bitnami/grafana-mimir/values.yaml index c62ea2731dd56a..11f50419dd844f 100644 --- a/bitnami/grafana-mimir/values.yaml +++ b/bitnami/grafana-mimir/values.yaml @@ -1316,7 +1316,7 @@ gateway: image: registry: docker.io repository: bitnami/nginx - tag: 1.25.2-debian-11-r42 + tag: 1.25.2-debian-11-r45 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -3908,7 +3908,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. diff --git a/bitnami/grafana-operator/Chart.lock b/bitnami/grafana-operator/Chart.lock index c17cd27dee9b64..227b334f57acb2 100644 --- a/bitnami/grafana-operator/Chart.lock +++ b/bitnami/grafana-operator/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-03T21:31:10.219462767Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-06T11:52:01.092403831Z" diff --git a/bitnami/grafana-operator/Chart.yaml b/bitnami/grafana-operator/Chart.yaml index 7d3f470f3c8a6d..35413d999d8aa4 100644 --- a/bitnami/grafana-operator/Chart.yaml +++ b/bitnami/grafana-operator/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: grafana-operator - image: docker.io/bitnami/grafana-operator:5.4.1-debian-11-r20 + image: docker.io/bitnami/grafana-operator:5.4.1-debian-11-r24 - name: grafana - image: docker.io/bitnami/grafana:10.1.4-debian-11-r2 + image: docker.io/bitnami/grafana:10.1.4-debian-11-r3 apiVersion: v2 appVersion: 5.4.1 dependencies: @@ -30,4 +30,4 @@ maintainers: name: grafana-operator sources: - https://github.com/bitnami/charts/tree/main/bitnami/grafana-operator -version: 3.4.7 +version: 3.4.9 diff --git a/bitnami/grafana-operator/README.md b/bitnami/grafana-operator/README.md index 0fb451bc234f3e..f60bd4b0079db4 100644 --- a/bitnami/grafana-operator/README.md +++ b/bitnami/grafana-operator/README.md @@ -110,7 +110,7 @@ For more information, refer to the [documentation on the differences between the | `operator.updateStrategy.type` | Set up update strategy for Grafana Operator installation. | `Recreate` | | `operator.image.registry` | Grafana Operator image registry | `docker.io` | | `operator.image.repository` | Grafana Operator image name | `bitnami/grafana-operator` | -| `operator.image.tag` | Grafana Operator image tag | `5.4.1-debian-11-r20` | +| `operator.image.tag` | Grafana Operator image tag | `5.4.1-debian-11-r24` | | `operator.image.digest` | Grafana Operator image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `operator.image.pullPolicy` | Grafana Operator image pull policy | `IfNotPresent` | | `operator.image.pullSecrets` | Grafana Operator image pull secrets | `[]` | @@ -191,7 +191,7 @@ For more information, refer to the [documentation on the differences between the | `grafana.enabled` | Enabled the deployment of the Grafana CRD object into the cluster | `true` | | `grafana.image.registry` | Grafana image registry | `docker.io` | | `grafana.image.repository` | Grafana image name | `bitnami/grafana` | -| `grafana.image.tag` | Grafana image tag | `10.1.4-debian-11-r2` | +| `grafana.image.tag` | Grafana image tag | `10.1.4-debian-11-r3` | | `grafana.image.digest` | Grafana image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `grafana.image.pullPolicy` | Grafana image pull policy | `IfNotPresent` | | `grafana.image.pullSecrets` | Grafana image pull secrets | `[]` | diff --git a/bitnami/grafana-operator/values.yaml b/bitnami/grafana-operator/values.yaml index 8fbad693ea2438..27c5ad85fbe408 100644 --- a/bitnami/grafana-operator/values.yaml +++ b/bitnami/grafana-operator/values.yaml @@ -151,7 +151,7 @@ operator: image: registry: docker.io repository: bitnami/grafana-operator - tag: 5.4.1-debian-11-r20 + tag: 5.4.1-debian-11-r24 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -424,7 +424,7 @@ grafana: image: registry: docker.io repository: bitnami/grafana - tag: 10.1.4-debian-11-r2 + tag: 10.1.4-debian-11-r3 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/grafana-tempo/Chart.lock b/bitnami/grafana-tempo/Chart.lock index 04574fcf4b9a19..6f60165f5161e3 100644 --- a/bitnami/grafana-tempo/Chart.lock +++ b/bitnami/grafana-tempo/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: memcached repository: oci://registry-1.docker.io/bitnamicharts - version: 6.6.2 + version: 6.6.5 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:cf341ea7275cf76475efbc83156081624a6392f5ce9e710c6e93d409dbfe69e6 -generated: "2023-10-03T21:35:54.336346601Z" + version: 2.13.2 +digest: sha256:191b27d4431af350efe743b19bb55e896be797e3609f70e764f810d0fb5b80c6 +generated: "2023-10-11T05:14:35.488867531Z" diff --git a/bitnami/grafana-tempo/Chart.yaml b/bitnami/grafana-tempo/Chart.yaml index 139d8359d00912..158120f71d0cfe 100644 --- a/bitnami/grafana-tempo/Chart.yaml +++ b/bitnami/grafana-tempo/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: grafana-tempo-query - image: docker.io/bitnami/grafana-tempo-query:2.2.3-debian-11-r7 + image: docker.io/bitnami/grafana-tempo-query:2.2.3-debian-11-r12 - name: grafana-tempo-vulture - image: docker.io/bitnami/grafana-tempo-vulture:2.2.3-debian-11-r7 + image: docker.io/bitnami/grafana-tempo-vulture:2.2.3-debian-11-r10 - name: grafana-tempo - image: docker.io/bitnami/grafana-tempo:2.2.3-debian-11-r20 + image: docker.io/bitnami/grafana-tempo:2.2.3-debian-11-r23 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 2.2.3 dependencies: @@ -39,4 +39,4 @@ maintainers: name: grafana-tempo sources: - https://github.com/bitnami/charts/tree/main/bitnami/grafana-tempo -version: 2.4.8 +version: 2.4.11 diff --git a/bitnami/grafana-tempo/README.md b/bitnami/grafana-tempo/README.md index 8e271303bc6d1e..43c1ceed44a7b7 100644 --- a/bitnami/grafana-tempo/README.md +++ b/bitnami/grafana-tempo/README.md @@ -85,7 +85,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------------------------- | ------------------------------------------------------------------------------------------------------------- | ----------------------------- | | `tempo.image.registry` | Grafana Tempo image registry | `docker.io` | | `tempo.image.repository` | Grafana Tempo image repository | `bitnami/grafana-tempo` | -| `tempo.image.tag` | Grafana Tempo image tag (immutable tags are recommended) | `2.2.3-debian-11-r20` | +| `tempo.image.tag` | Grafana Tempo image tag (immutable tags are recommended) | `2.2.3-debian-11-r23` | | `tempo.image.digest` | Grafana Tempo image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `tempo.image.pullPolicy` | Grafana Tempo image pull policy | `IfNotPresent` | | `tempo.image.pullSecrets` | Grafana Tempo image pull secrets | `[]` | @@ -572,7 +572,7 @@ The command removes all the Kubernetes components associated with the chart and | `queryFrontend.initContainers` | Add additional init containers to the queryFrontend pod(s) | `[]` | | `queryFrontend.query.image.registry` | Grafana Tempo Query image registry | `docker.io` | | `queryFrontend.query.image.repository` | Grafana Tempo Query image repository | `bitnami/grafana-tempo-query` | -| `queryFrontend.query.image.tag` | Grafana Tempo Query image tag (immutable tags are recommended) | `2.2.3-debian-11-r7` | +| `queryFrontend.query.image.tag` | Grafana Tempo Query image tag (immutable tags are recommended) | `2.2.3-debian-11-r12` | | `queryFrontend.query.image.digest` | Grafana Tempo Query image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `queryFrontend.query.image.pullPolicy` | Grafana Tempo Query image pull policy | `IfNotPresent` | | `queryFrontend.query.image.pullSecrets` | Grafana Tempo Query image pull secrets | `[]` | @@ -640,7 +640,7 @@ The command removes all the Kubernetes components associated with the chart and | `vulture.enabled` | Enable vulture deployment | `true` | | `vulture.image.registry` | Grafana Vulture image registry | `docker.io` | | `vulture.image.repository` | Grafana Vulture image repository | `bitnami/grafana-tempo-vulture` | -| `vulture.image.tag` | Grafana Vulture image tag (immutable tags are recommended) | `2.2.3-debian-11-r7` | +| `vulture.image.tag` | Grafana Vulture image tag (immutable tags are recommended) | `2.2.3-debian-11-r10` | | `vulture.image.digest` | Grafana Vulture image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `vulture.image.pullPolicy` | Grafana Vulture image pull policy | `IfNotPresent` | | `vulture.image.pullSecrets` | Grafana Vulture image pull secrets | `[]` | @@ -724,7 +724,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | diff --git a/bitnami/grafana-tempo/values.yaml b/bitnami/grafana-tempo/values.yaml index aa688d2d0c6062..9e8488a6d45ec4 100644 --- a/bitnami/grafana-tempo/values.yaml +++ b/bitnami/grafana-tempo/values.yaml @@ -75,7 +75,7 @@ tempo: image: registry: docker.io repository: bitnami/grafana-tempo - tag: 2.2.3-debian-11-r20 + tag: 2.2.3-debian-11-r23 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1822,7 +1822,7 @@ queryFrontend: image: registry: docker.io repository: bitnami/grafana-tempo-query - tag: 2.2.3-debian-11-r7 + tag: 2.2.3-debian-11-r12 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2033,7 +2033,7 @@ vulture: image: registry: docker.io repository: bitnami/grafana-tempo-vulture - tag: 2.2.3-debian-11-r7 + tag: 2.2.3-debian-11-r10 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2331,7 +2331,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/grafana/Chart.yaml b/bitnami/grafana/Chart.yaml index bd026985fa6e55..9b02b55824316c 100644 --- a/bitnami/grafana/Chart.yaml +++ b/bitnami/grafana/Chart.yaml @@ -8,9 +8,9 @@ annotations: - name: grafana-image-renderer image: docker.io/bitnami/grafana-image-renderer:3.8.3-debian-11-r3 - name: grafana - image: docker.io/bitnami/grafana:10.1.4-debian-11-r3 + image: docker.io/bitnami/grafana:10.1.4-debian-11-r6 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 10.1.4 dependencies: diff --git a/bitnami/grafana/README.md b/bitnami/grafana/README.md index 0d77775efec2ad..b8f6753394ff22 100644 --- a/bitnami/grafana/README.md +++ b/bitnami/grafana/README.md @@ -162,7 +162,7 @@ This solution allows to easily deploy multiple Grafana instances compared to the | ---------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------- | | `image.registry` | Grafana image registry | `docker.io` | | `image.repository` | Grafana image repository | `bitnami/grafana` | -| `image.tag` | Grafana image tag (immutable tags are recommended) | `10.1.4-debian-11-r3` | +| `image.tag` | Grafana image tag (immutable tags are recommended) | `10.1.4-debian-11-r6` | | `image.digest` | Grafana image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Grafana image pull policy | `IfNotPresent` | | `image.pullSecrets` | Grafana image pull secrets | `[]` | @@ -436,7 +436,7 @@ This solution allows to easily deploy multiple Grafana instances compared to the | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | diff --git a/bitnami/grafana/values.yaml b/bitnami/grafana/values.yaml index 35a82a7673a255..437ce5ff681e40 100644 --- a/bitnami/grafana/values.yaml +++ b/bitnami/grafana/values.yaml @@ -57,7 +57,7 @@ commonAnnotations: {} image: registry: docker.io repository: bitnami/grafana - tag: 10.1.4-debian-11-r3 + tag: 10.1.4-debian-11-r6 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1177,7 +1177,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/harbor/Chart.lock b/bitnami/harbor/Chart.lock index cbf625a8b66b05..23ce3fa142b328 100644 --- a/bitnami/harbor/Chart.lock +++ b/bitnami/harbor/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: redis repository: oci://registry-1.docker.io/bitnamicharts - version: 18.1.1 + version: 18.1.3 - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.0.0 + version: 13.1.2 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:72ce660367df152982553fd55a73f484f244ad6f30d6da2bfb540f558f9bfc95 -generated: "2023-09-29T13:09:43.136853+02:00" + version: 2.13.2 +digest: sha256:bd7ac0c2fa761434301bba06003935dc41a28fa403c0803291507433ed4523aa +generated: "2023-10-09T23:29:33.036695829Z" diff --git a/bitnami/harbor/Chart.yaml b/bitnami/harbor/Chart.yaml index 96015828e8a66b..ed5d3197ece2e0 100644 --- a/bitnami/harbor/Chart.yaml +++ b/bitnami/harbor/Chart.yaml @@ -6,25 +6,25 @@ annotations: licenses: Apache-2.0 images: | - name: harbor-adapter-trivy - image: docker.io/bitnami/harbor-adapter-trivy:2.9.0-debian-11-r14 + image: docker.io/bitnami/harbor-adapter-trivy:2.9.0-debian-11-r24 - name: harbor-core - image: docker.io/bitnami/harbor-core:2.9.0-debian-11-r14 + image: docker.io/bitnami/harbor-core:2.9.0-debian-11-r21 - name: harbor-exporter - image: docker.io/bitnami/harbor-exporter:2.9.0-debian-11-r14 + image: docker.io/bitnami/harbor-exporter:2.9.0-debian-11-r21 - name: harbor-jobservice - image: docker.io/bitnami/harbor-jobservice:2.9.0-debian-11-r11 + image: docker.io/bitnami/harbor-jobservice:2.9.0-debian-11-r22 - name: harbor-registry - image: docker.io/bitnami/harbor-registry:2.9.0-debian-11-r26 + image: docker.io/bitnami/harbor-registry:2.9.0-debian-11-r33 - name: harbor-registryctl - image: docker.io/bitnami/harbor-registryctl:2.9.0-debian-11-r11 + image: docker.io/bitnami/harbor-registryctl:2.9.0-debian-11-r21 - name: harbor-portal - image: docker.io/bitnami/harbor-portal:2.9.0-debian-11-r26 + image: docker.io/bitnami/harbor-portal:2.9.0-debian-11-r35 - name: nginx - image: docker.io/bitnami/nginx:1.25.2-debian-11-r37 + image: docker.io/bitnami/nginx:1.25.2-debian-11-r46 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: postgresql - image: docker.io/bitnami/postgresql:13.12.0-debian-11-r46 + image: docker.io/bitnami/postgresql:13.12.0-debian-11-r56 apiVersion: v2 appVersion: 2.9.0 dependencies: @@ -55,4 +55,4 @@ maintainers: name: harbor sources: - https://github.com/bitnami/charts/tree/main/bitnami/harbor -version: 19.0.0 +version: 19.0.4 diff --git a/bitnami/harbor/README.md b/bitnami/harbor/README.md index 37ccd2d48e750d..22170d643e8f14 100644 --- a/bitnami/harbor/README.md +++ b/bitnami/harbor/README.md @@ -251,7 +251,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | @@ -266,7 +266,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | --------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | ---------------------- | | `nginx.image.registry` | NGINX image registry | `docker.io` | | `nginx.image.repository` | NGINX image repository | `bitnami/nginx` | -| `nginx.image.tag` | NGINX image tag (immutable tags are recommended) | `1.25.2-debian-11-r37` | +| `nginx.image.tag` | NGINX image tag (immutable tags are recommended) | `1.25.2-debian-11-r46` | | `nginx.image.digest` | NGINX image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `nginx.image.pullPolicy` | NGINX image pull policy | `IfNotPresent` | | `nginx.image.pullSecrets` | NGINX image pull secrets | `[]` | @@ -338,7 +338,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | ---------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | ----------------------- | | `portal.image.registry` | Harbor Portal image registry | `docker.io` | | `portal.image.repository` | Harbor Portal image repository | `bitnami/harbor-portal` | -| `portal.image.tag` | Harbor Portal image tag (immutable tags are recommended) | `2.9.0-debian-11-r26` | +| `portal.image.tag` | Harbor Portal image tag (immutable tags are recommended) | `2.9.0-debian-11-r35` | | `portal.image.digest` | Harbor Portal image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `portal.image.pullPolicy` | Harbor Portal image pull policy | `IfNotPresent` | | `portal.image.pullSecrets` | Harbor Portal image pull secrets | `[]` | @@ -410,7 +410,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | -------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- | | `core.image.registry` | Harbor Core image registry | `docker.io` | | `core.image.repository` | Harbor Core image repository | `bitnami/harbor-core` | -| `core.image.tag` | Harbor Core image tag (immutable tags are recommended) | `2.9.0-debian-11-r14` | +| `core.image.tag` | Harbor Core image tag (immutable tags are recommended) | `2.9.0-debian-11-r21` | | `core.image.digest` | Harbor Core image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `core.image.pullPolicy` | Harbor Core image pull policy | `IfNotPresent` | | `core.image.pullSecrets` | Harbor Core image pull secrets | `[]` | @@ -496,7 +496,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | -------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------------------ | | `jobservice.image.registry` | Harbor Jobservice image registry | `docker.io` | | `jobservice.image.repository` | Harbor Jobservice image repository | `bitnami/harbor-jobservice` | -| `jobservice.image.tag` | Harbor Jobservice image tag (immutable tags are recommended) | `2.9.0-debian-11-r11` | +| `jobservice.image.tag` | Harbor Jobservice image tag (immutable tags are recommended) | `2.9.0-debian-11-r22` | | `jobservice.image.digest` | Harbor Jobservice image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `jobservice.image.pullPolicy` | Harbor Jobservice image pull policy | `IfNotPresent` | | `jobservice.image.pullSecrets` | Harbor Jobservice image pull secrets | `[]` | @@ -611,7 +611,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | `registry.automountServiceAccountToken` | Automount service account token | `false` | | `registry.server.image.registry` | Harbor Registry image registry | `docker.io` | | `registry.server.image.repository` | Harbor Registry image repository | `bitnami/harbor-registry` | -| `registry.server.image.tag` | Harbor Registry image tag (immutable tags are recommended) | `2.9.0-debian-11-r26` | +| `registry.server.image.tag` | Harbor Registry image tag (immutable tags are recommended) | `2.9.0-debian-11-r33` | | `registry.server.image.digest` | Harbor Registry image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `registry.server.image.pullPolicy` | Harbor Registry image pull policy | `IfNotPresent` | | `registry.server.image.pullSecrets` | Harbor Registry image pull secrets | `[]` | @@ -658,7 +658,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | `registry.server.service.ports.metrics` | Harbor Registry metrics service port | `8001` | | `registry.controller.image.registry` | Harbor Registryctl image registry | `docker.io` | | `registry.controller.image.repository` | Harbor Registryctl image repository | `bitnami/harbor-registryctl` | -| `registry.controller.image.tag` | Harbor Registryctl image tag (immutable tags are recommended) | `2.9.0-debian-11-r11` | +| `registry.controller.image.tag` | Harbor Registryctl image tag (immutable tags are recommended) | `2.9.0-debian-11-r21` | | `registry.controller.image.digest` | Harbor Registryctl image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `registry.controller.image.pullPolicy` | Harbor Registryctl image pull policy | `IfNotPresent` | | `registry.controller.image.pullSecrets` | Harbor Registryctl image pull secrets | `[]` | @@ -707,7 +707,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | --------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | -------------------------------------- | | `trivy.image.registry` | Harbor Adapter Trivy image registry | `docker.io` | | `trivy.image.repository` | Harbor Adapter Trivy image repository | `bitnami/harbor-adapter-trivy` | -| `trivy.image.tag` | Harbor Adapter Trivy image tag (immutable tags are recommended) | `2.9.0-debian-11-r14` | +| `trivy.image.tag` | Harbor Adapter Trivy image tag (immutable tags are recommended) | `2.9.0-debian-11-r24` | | `trivy.image.digest` | Harbor Adapter Trivy image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `trivy.image.pullPolicy` | Harbor Adapter Trivy image pull policy | `IfNotPresent` | | `trivy.image.pullSecrets` | Harbor Adapter Trivy image pull secrets | `[]` | @@ -788,7 +788,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | ------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------- | | `exporter.image.registry` | Harbor Exporter image registry | `docker.io` | | `exporter.image.repository` | Harbor Exporter image repository | `bitnami/harbor-exporter` | -| `exporter.image.tag` | Harbor Exporter image tag | `2.9.0-debian-11-r14` | +| `exporter.image.tag` | Harbor Exporter image tag | `2.9.0-debian-11-r21` | | `exporter.image.digest` | Harbor Exporter image image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `exporter.image.pullPolicy` | Harbor exporter image pull policy | `IfNotPresent` | | `exporter.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -866,7 +866,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | `postgresql.primary.initdb.scripts` | Initdb scripts to create Harbor databases | `{}` | | `postgresql.image.registry` | PostgreSQL image registry | `docker.io` | | `postgresql.image.repository` | PostgreSQL image repository | `bitnami/postgresql` | -| `postgresql.image.tag` | PostgreSQL image tag (immutable tags are recommended) | `13.12.0-debian-11-r46` | +| `postgresql.image.tag` | PostgreSQL image tag (immutable tags are recommended) | `13.12.0-debian-11-r56` | | `postgresql.image.digest` | PostgreSQL image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `externalDatabase.host` | Database host | `localhost` | | `externalDatabase.port` | Database port number | `5432` | @@ -1084,4 +1084,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/harbor/templates/jobservice/jobservice-dpl.yaml b/bitnami/harbor/templates/jobservice/jobservice-dpl.yaml index 81f3b0a8d2d2ad..a0a3c5c342d3ef 100644 --- a/bitnami/harbor/templates/jobservice/jobservice-dpl.yaml +++ b/bitnami/harbor/templates/jobservice/jobservice-dpl.yaml @@ -83,7 +83,11 @@ spec: - -ec - | mkdir -p /var/log/jobs + chown {{ .Values.jobservice.containerSecurityContext.runAsUser }}:{{ .Values.jobservice.podSecurityContext.fsGroup }} /var/log/jobs find /var/log/jobs -mindepth 1 -maxdepth 1 -not -name ".snapshot" -not -name "lost+found" | xargs -r chown -R {{ .Values.jobservice.containerSecurityContext.runAsUser }}:{{ .Values.jobservice.podSecurityContext.fsGroup }} + mkdir -p /var/scandata_exports + chown {{ .Values.jobservice.containerSecurityContext.runAsUser }}:{{ .Values.jobservice.podSecurityContext.fsGroup }} /var/scandata_exports + find /var/scandata_exports -mindepth 1 -maxdepth 1 -not -name ".snapshot" -not -name "lost+found" | xargs -r chown -R {{ .Values.jobservice.containerSecurityContext.runAsUser }}:{{ .Values.jobservice.podSecurityContext.fsGroup }} {{- if .Values.volumePermissions.containerSecurityContext.enabled }} securityContext: {{- omit .Values.volumePermissions.containerSecurityContext "enabled" | toYaml | nindent 12 }} {{- end }} @@ -94,6 +98,9 @@ spec: - name: job-logs mountPath: /var/log/jobs subPath: {{ .Values.persistence.persistentVolumeClaim.jobservice.subPath }} + - name: jobservice-scandata + mountPath: /var/scandata_exports + subPath: {{ .Values.persistence.persistentVolumeClaim.jobservice.scanData.subPath }} {{- end }} {{- if .Values.jobservice.initContainers }} {{- include "common.tplvalues.render" (dict "value" .Values.jobservice.initContainers "context" $) | nindent 8 }} diff --git a/bitnami/harbor/values.yaml b/bitnami/harbor/values.yaml index 269cc3b1f6cc01..a94841b7e42a65 100644 --- a/bitnami/harbor/values.yaml +++ b/bitnami/harbor/values.yaml @@ -615,7 +615,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -661,7 +661,7 @@ nginx: image: registry: docker.io repository: bitnami/nginx - tag: 1.25.2-debian-11-r37 + tag: 1.25.2-debian-11-r46 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -924,7 +924,7 @@ portal: image: registry: docker.io repository: bitnami/harbor-portal - tag: 2.9.0-debian-11-r26 + tag: 2.9.0-debian-11-r35 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1184,7 +1184,7 @@ core: image: registry: docker.io repository: bitnami/harbor-core - tag: 2.9.0-debian-11-r14 + tag: 2.9.0-debian-11-r21 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1505,7 +1505,7 @@ jobservice: image: registry: docker.io repository: bitnami/harbor-jobservice - tag: 2.9.0-debian-11-r11 + tag: 2.9.0-debian-11-r22 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1960,7 +1960,7 @@ registry: image: registry: docker.io repository: bitnami/harbor-registry - tag: 2.9.0-debian-11-r26 + tag: 2.9.0-debian-11-r33 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2107,7 +2107,7 @@ registry: image: registry: docker.io repository: bitnami/harbor-registryctl - tag: 2.9.0-debian-11-r11 + tag: 2.9.0-debian-11-r21 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2250,7 +2250,7 @@ trivy: image: registry: docker.io repository: bitnami/harbor-adapter-trivy - tag: 2.9.0-debian-11-r14 + tag: 2.9.0-debian-11-r24 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2558,7 +2558,7 @@ exporter: image: registry: docker.io repository: bitnami/harbor-exporter - tag: 2.9.0-debian-11-r14 + tag: 2.9.0-debian-11-r21 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2807,7 +2807,7 @@ postgresql: image: registry: docker.io repository: bitnami/postgresql - tag: 13.12.0-debian-11-r46 + tag: 13.12.0-debian-11-r56 digest: "" auth: enablePostgresUser: true diff --git a/bitnami/influxdb/Chart.lock b/bitnami/influxdb/Chart.lock index 58bc6e26a9b99d..c19bd31c25fb4f 100644 --- a/bitnami/influxdb/Chart.lock +++ b/bitnami/influxdb/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-29T10:57:21.706211+02:00" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T18:17:37.357080865Z" diff --git a/bitnami/influxdb/Chart.yaml b/bitnami/influxdb/Chart.yaml index a7ee17b98b9085..c1f6eb329bece6 100644 --- a/bitnami/influxdb/Chart.yaml +++ b/bitnami/influxdb/Chart.yaml @@ -8,13 +8,13 @@ annotations: - name: aws-cli image: docker.io/bitnami/aws-cli:2.13.20-debian-11-r11 - name: azure-cli - image: docker.io/bitnami/azure-cli:2.53.0-debian-11-r6 + image: docker.io/bitnami/azure-cli:2.53.0-debian-11-r8 - name: google-cloud-sdk - image: docker.io/bitnami/google-cloud-sdk:0.448.0-debian-11-r5 + image: docker.io/bitnami/google-cloud-sdk:0.450.0-debian-11-r0 - name: influxdb - image: docker.io/bitnami/influxdb:2.7.1-debian-11-r150 + image: docker.io/bitnami/influxdb:2.7.1-debian-11-r153 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 2.7.1 dependencies: @@ -37,4 +37,4 @@ maintainers: name: influxdb sources: - https://github.com/bitnami/charts/tree/main/bitnami/influxdb -version: 5.9.5 +version: 5.9.8 diff --git a/bitnami/influxdb/README.md b/bitnami/influxdb/README.md index 2594f496d5bf44..8f3adfea19d0e5 100644 --- a/bitnami/influxdb/README.md +++ b/bitnami/influxdb/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | InfluxDB™ image registry | `docker.io` | | `image.repository` | InfluxDB™ image repository | `bitnami/influxdb` | -| `image.tag` | InfluxDB™ image tag (immutable tags are recommended) | `2.7.1-debian-11-r150` | +| `image.tag` | InfluxDB™ image tag (immutable tags are recommended) | `2.7.1-debian-11-r153` | | `image.digest` | InfluxDB™ image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | InfluxDB™ image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -264,7 +264,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume mountpoint to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r86` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -305,7 +305,7 @@ The command removes all the Kubernetes components associated with the chart and | `backup.uploadProviders.google.bucketName` | google storage bucket name name | `gs://bucket/influxdb` | | `backup.uploadProviders.google.image.registry` | Google Cloud SDK image registry | `docker.io` | | `backup.uploadProviders.google.image.repository` | Google Cloud SDK image name | `bitnami/google-cloud-sdk` | -| `backup.uploadProviders.google.image.tag` | Google Cloud SDK image tag | `0.448.0-debian-11-r5` | +| `backup.uploadProviders.google.image.tag` | Google Cloud SDK image tag | `0.450.0-debian-11-r0` | | `backup.uploadProviders.google.image.digest` | Google Cloud SDK image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `backup.uploadProviders.google.image.pullPolicy` | Google Cloud SDK image pull policy | `IfNotPresent` | | `backup.uploadProviders.google.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -316,7 +316,7 @@ The command removes all the Kubernetes components associated with the chart and | `backup.uploadProviders.azure.containerName` | Destination container | `influxdb-container` | | `backup.uploadProviders.azure.image.registry` | Azure CLI image registry | `docker.io` | | `backup.uploadProviders.azure.image.repository` | Azure CLI image repository | `bitnami/azure-cli` | -| `backup.uploadProviders.azure.image.tag` | Azure CLI image tag (immutable tags are recommended) | `2.53.0-debian-11-r6` | +| `backup.uploadProviders.azure.image.tag` | Azure CLI image tag (immutable tags are recommended) | `2.53.0-debian-11-r8` | | `backup.uploadProviders.azure.image.digest` | Azure CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `backup.uploadProviders.azure.image.pullPolicy` | Azure CLI image pull policy | `IfNotPresent` | | `backup.uploadProviders.azure.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/influxdb/values.yaml b/bitnami/influxdb/values.yaml index 431ce2bdc286e4..6f9947f590bb49 100644 --- a/bitnami/influxdb/values.yaml +++ b/bitnami/influxdb/values.yaml @@ -73,7 +73,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/influxdb - tag: 2.7.1-debian-11-r150 + tag: 2.7.1-debian-11-r153 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -835,7 +835,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -986,7 +986,7 @@ backup: image: registry: docker.io repository: bitnami/google-cloud-sdk - tag: 0.448.0-debian-11-r5 + tag: 0.450.0-debian-11-r0 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -1025,7 +1025,7 @@ backup: image: registry: docker.io repository: bitnami/azure-cli - tag: 2.53.0-debian-11-r6 + tag: 2.53.0-debian-11-r8 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images diff --git a/bitnami/jaeger/Chart.lock b/bitnami/jaeger/Chart.lock index 174be1c93c1686..3a4f147356efdc 100644 --- a/bitnami/jaeger/Chart.lock +++ b/bitnami/jaeger/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 + version: 2.13.2 - name: cassandra repository: oci://registry-1.docker.io/bitnamicharts - version: 10.5.5 -digest: sha256:5004b3aad0e911fb48321e0d9245a1488dcf980690811d5262b2087cc156bd88 -generated: "2023-10-03T23:17:20.778382742Z" + version: 10.5.6 +digest: sha256:c7a40299bc7e1d0161742f16141f4c3a7f05f67f61d51851995cffba7830ddb4 +generated: "2023-10-09T17:50:21.879579572Z" diff --git a/bitnami/jaeger/Chart.yaml b/bitnami/jaeger/Chart.yaml index ac32577c67aece..08b597989758d8 100644 --- a/bitnami/jaeger/Chart.yaml +++ b/bitnami/jaeger/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: cassandra - image: docker.io/bitnami/cassandra:4.0.11-debian-11-r73 + image: docker.io/bitnami/cassandra:4.0.11-debian-11-r76 - name: jaeger - image: docker.io/bitnami/jaeger:1.49.0-debian-11-r25 + image: docker.io/bitnami/jaeger:1.50.0-debian-11-r1 apiVersion: v2 -appVersion: 1.49.0 +appVersion: 1.50.0 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -34,4 +34,4 @@ maintainers: name: jaeger sources: - https://github.com/bitnami/charts/tree/main/bitnami/jaeger -version: 1.3.3 +version: 1.3.5 diff --git a/bitnami/jaeger/README.md b/bitnami/jaeger/README.md index 1142e481be376b..06698d160d33ce 100644 --- a/bitnami/jaeger/README.md +++ b/bitnami/jaeger/README.md @@ -76,15 +76,15 @@ The command removes all the Kubernetes components associated with the chart and ### Jaeger parameters -| Name | Description | Value | -| ------------------- | ------------------------------------------------------------------------------------------------------ | ---------------------- | -| `image.registry` | Jaeger image registry | `docker.io` | -| `image.repository` | Jaeger image repository | `bitnami/jaeger` | -| `image.tag` | Jaeger image tag (immutable tags are recommended) | `1.49.0-debian-11-r25` | -| `image.digest` | Jaeger image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Jaeger image pull secrets | `[]` | -| `image.debug` | Enable image debug mode | `false` | +| Name | Description | Value | +| ------------------- | ------------------------------------------------------------------------------------------------------ | --------------------- | +| `image.registry` | Jaeger image registry | `docker.io` | +| `image.repository` | Jaeger image repository | `bitnami/jaeger` | +| `image.tag` | Jaeger image tag (immutable tags are recommended) | `1.50.0-debian-11-r1` | +| `image.digest` | Jaeger image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Jaeger image pull secrets | `[]` | +| `image.debug` | Enable image debug mode | `false` | ### Query deployment parameters @@ -356,7 +356,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------------------------------- | --------------------------------------------------------------------------------------------------------- | ---------------------- | | `cqlshImage.registry` | Cassandra image registry | `docker.io` | | `cqlshImage.repository` | Cassandra image repository | `bitnami/cassandra` | -| `cqlshImage.tag` | Cassandra image tag (immutable tags are recommended) | `4.0.11-debian-11-r73` | +| `cqlshImage.tag` | Cassandra image tag (immutable tags are recommended) | `4.0.11-debian-11-r76` | | `cqlshImage.digest` | Cassandra image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `cqlshImage.pullPolicy` | image pull policy | `IfNotPresent` | | `cqlshImage.pullSecrets` | Cassandra image pull secrets | `[]` | diff --git a/bitnami/jaeger/values.yaml b/bitnami/jaeger/values.yaml index e038e914bca84e..76ff38fe1c50f1 100644 --- a/bitnami/jaeger/values.yaml +++ b/bitnami/jaeger/values.yaml @@ -69,7 +69,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/jaeger - tag: 1.49.0-debian-11-r25 + tag: 1.50.0-debian-11-r1 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1104,7 +1104,7 @@ migration: cqlshImage: registry: docker.io repository: bitnami/cassandra - tag: 4.0.11-debian-11-r73 + tag: 4.0.11-debian-11-r76 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/jasperreports/Chart.lock b/bitnami/jasperreports/Chart.lock index e920f2123dcddf..960e83b0ad8c8a 100644 --- a/bitnami/jasperreports/Chart.lock +++ b/bitnami/jasperreports/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.3 + version: 14.0.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.1 -digest: sha256:69467d8dd7e86ae13efcd0c3a062ce856c88db1f4ffaf9b3e824435d336c59cc -generated: "2023-09-18T22:25:05.752179499Z" + version: 2.13.2 +digest: sha256:7617e01cd06d41043c65d55055935e5b34bfb7a55014a5c7d8da13a52b7f070c +generated: "2023-10-10T16:45:08.692744267+02:00" diff --git a/bitnami/jasperreports/Chart.yaml b/bitnami/jasperreports/Chart.yaml index 2320feb5406702..23405adfa0044d 100644 --- a/bitnami/jasperreports/Chart.yaml +++ b/bitnami/jasperreports/Chart.yaml @@ -6,14 +6,14 @@ annotations: licenses: Apache-2.0 images: | - name: jasperreports - image: docker.io/bitnami/jasperreports:8.2.0-debian-11-r76 + image: docker.io/bitnami/jasperreports:8.2.0-debian-11-r92 apiVersion: v2 appVersion: 8.2.0 dependencies: - condition: mariadb.enabled name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.x.x + version: 14.x.x - name: common repository: oci://registry-1.docker.io/bitnamicharts tags: @@ -35,4 +35,4 @@ maintainers: name: jasperreports sources: - https://github.com/bitnami/charts/tree/main/bitnami/jasperreports -version: 16.1.2 +version: 17.0.0 diff --git a/bitnami/jasperreports/README.md b/bitnami/jasperreports/README.md index 2b2d50adcb29bc..975805b588a403 100644 --- a/bitnami/jasperreports/README.md +++ b/bitnami/jasperreports/README.md @@ -81,7 +81,7 @@ The command removes all the Kubernetes components associated with the chart and | ----------------------------- | ------------------------------------------------------------------------------------------------------------- | ----------------------- | | `image.registry` | JasperReports image registry | `docker.io` | | `image.repository` | JasperReports image repository | `bitnami/jasperreports` | -| `image.tag` | JasperReports image tag (immutable tags are recommended) | `8.2.0-debian-11-r76` | +| `image.tag` | JasperReports image tag (immutable tags are recommended) | `8.2.0-debian-11-r92` | | `image.digest` | JasperReports image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | JasperReports image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -323,6 +323,10 @@ Find more information about how to deal with common errors related to Bitnami's ## Upgrading +### To 17.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 16.0.0 This major release bumps the MariaDB version to 11.0. Follow the [upstream instructions](https://mariadb.com/kb/en/upgrading-from-mariadb-10-11-to-mariadb-11-0/) for upgrading from MariaDB 10.11 to 11.0. No major issues are expected during the upgrade. @@ -494,4 +498,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License. diff --git a/bitnami/jasperreports/values.yaml b/bitnami/jasperreports/values.yaml index 5e8266a332454a..a07e3b4af89e20 100644 --- a/bitnami/jasperreports/values.yaml +++ b/bitnami/jasperreports/values.yaml @@ -60,7 +60,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/jasperreports - tag: 8.2.0-debian-11-r76 + tag: 8.2.0-debian-11-r92 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/jenkins/Chart.lock b/bitnami/jenkins/Chart.lock index bb1c3b550165a8..379d20a495101e 100644 --- a/bitnami/jenkins/Chart.lock +++ b/bitnami/jenkins/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-29T21:37:39.508861879Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T18:12:59.624568491Z" diff --git a/bitnami/jenkins/Chart.yaml b/bitnami/jenkins/Chart.yaml index 381ac42c31915f..135e578a756234 100644 --- a/bitnami/jenkins/Chart.yaml +++ b/bitnami/jenkins/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: jenkins-agent - image: docker.io/bitnami/jenkins-agent:0.3148.0-debian-11-r35 + image: docker.io/bitnami/jenkins-agent:0.3148.0-debian-11-r43 - name: jenkins - image: docker.io/bitnami/jenkins:2.414.2-debian-11-r10 + image: docker.io/bitnami/jenkins:2.414.2-debian-11-r16 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r83 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 2.414.2 dependencies: @@ -35,4 +35,4 @@ maintainers: name: jenkins sources: - https://github.com/bitnami/charts/tree/main/bitnami/jenkins -version: 12.3.5 +version: 12.3.7 diff --git a/bitnami/jenkins/README.md b/bitnami/jenkins/README.md index a2fe85360cecbd..f8b2e6eb01c756 100644 --- a/bitnami/jenkins/README.md +++ b/bitnami/jenkins/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------- | ------------------------------------------------------------------------------------------------------- | ----------------------- | | `image.registry` | Jenkins image registry | `docker.io` | | `image.repository` | Jenkins image repository | `bitnami/jenkins` | -| `image.tag` | Jenkins image tag (immutable tags are recommended) | `2.414.2-debian-11-r10` | +| `image.tag` | Jenkins image tag (immutable tags are recommended) | `2.414.2-debian-11-r16` | | `image.digest` | Jenkins image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Jenkins image pull policy | `IfNotPresent` | | `image.pullSecrets` | Jenkins image pull secrets | `[]` | @@ -160,7 +160,7 @@ The command removes all the Kubernetes components associated with the chart and | `agent.enabled` | Set to true to enable the configuration of Jenkins kubernetes agents | `false` | | `agent.image.registry` | Jenkins image registry | `docker.io` | | `agent.image.repository` | Jenkins image repository | `bitnami/jenkins-agent` | -| `agent.image.tag` | Jenkins image tag (immutable tags are recommended) | `0.3148.0-debian-11-r35` | +| `agent.image.tag` | Jenkins image tag (immutable tags are recommended) | `0.3148.0-debian-11-r43` | | `agent.image.digest` | Jenkins image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `agent.image.pullPolicy` | Jenkins image pull policy | `IfNotPresent` | | `agent.image.pullSecrets` | Jenkins image pull secrets | `[]` | @@ -296,7 +296,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r83` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | diff --git a/bitnami/jenkins/values.yaml b/bitnami/jenkins/values.yaml index a3242c5cd600bf..56ffccc7a5c724 100644 --- a/bitnami/jenkins/values.yaml +++ b/bitnami/jenkins/values.yaml @@ -72,7 +72,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/jenkins - tag: 2.414.2-debian-11-r10 + tag: 2.414.2-debian-11-r16 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -344,7 +344,7 @@ agent: image: registry: docker.io repository: bitnami/jenkins-agent - tag: 0.3148.0-debian-11-r35 + tag: 0.3148.0-debian-11-r43 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -898,7 +898,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r83 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/joomla/Chart.yaml b/bitnami/joomla/Chart.yaml index fffb724e1f6c3e..9408ff3597f82e 100644 --- a/bitnami/joomla/Chart.yaml +++ b/bitnami/joomla/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r5 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: joomla image: docker.io/bitnami/joomla:4.3.4-debian-11-r34 apiVersion: v2 @@ -36,4 +36,4 @@ maintainers: name: joomla sources: - https://github.com/bitnami/charts/tree/main/bitnami/joomla -version: 15.1.4 +version: 15.1.5 diff --git a/bitnami/joomla/README.md b/bitnami/joomla/README.md index 1084d61202fc66..21f3158d9e98bb 100644 --- a/bitnami/joomla/README.md +++ b/bitnami/joomla/README.md @@ -221,7 +221,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image name | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag | `1.0.2-debian-11-r5` | +| `metrics.image.tag` | Apache exporter image tag | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/joomla/values.yaml b/bitnami/joomla/values.yaml index 8d1f00b8ce6901..c4c71509c7004f 100644 --- a/bitnami/joomla/values.yaml +++ b/bitnami/joomla/values.yaml @@ -621,7 +621,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.2-debian-11-r5 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/jupyterhub/Chart.lock b/bitnami/jupyterhub/Chart.lock index d216e29b8f5dd7..8230e4715d6025 100644 --- a/bitnami/jupyterhub/Chart.lock +++ b/bitnami/jupyterhub/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.0.0 + version: 13.1.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.1 -digest: sha256:10376f14af550041b2735d1e33cc3adfec90f704169222c5a0e0076f2c2ee277 -generated: "2023-09-29T10:37:45.684242+02:00" + version: 2.13.2 +digest: sha256:e5ced9197fb01928d7faeff7f41e320149cbc634bd8423a217e5a4f4e9b571f9 +generated: "2023-10-09T21:21:24.649186266Z" diff --git a/bitnami/jupyterhub/Chart.yaml b/bitnami/jupyterhub/Chart.yaml index e98b7af6ea1ca3..ed9c4198e72fe7 100644 --- a/bitnami/jupyterhub/Chart.yaml +++ b/bitnami/jupyterhub/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: configurable-http-proxy - image: docker.io/bitnami/configurable-http-proxy:4.6.0-debian-11-r5 + image: docker.io/bitnami/configurable-http-proxy:4.6.0-debian-11-r14 - name: jupyter-base-notebook - image: docker.io/bitnami/jupyter-base-notebook:4.0.2-debian-11-r45 + image: docker.io/bitnami/jupyter-base-notebook:4.0.2-debian-11-r53 - name: jupyterhub - image: docker.io/bitnami/jupyterhub:4.0.2-debian-11-r44 + image: docker.io/bitnami/jupyterhub:4.0.2-debian-11-r52 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 4.0.2 dependencies: @@ -37,4 +37,4 @@ maintainers: name: jupyterhub sources: - https://github.com/bitnami/charts/tree/main/bitnami/jupyterhub -version: 5.0.0 +version: 5.0.1 diff --git a/bitnami/jupyterhub/README.md b/bitnami/jupyterhub/README.md index ef00c25ab9b99f..2d2a6f0699b82d 100644 --- a/bitnami/jupyterhub/README.md +++ b/bitnami/jupyterhub/README.md @@ -85,7 +85,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | --------------------- | | `hub.image.registry` | Hub image registry | `docker.io` | | `hub.image.repository` | Hub image repository | `bitnami/jupyterhub` | -| `hub.image.tag` | Hub image tag (immutable tags are recommended) | `4.0.2-debian-11-r44` | +| `hub.image.tag` | Hub image tag (immutable tags are recommended) | `4.0.2-debian-11-r52` | | `hub.image.digest` | Hub image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `hub.image.pullPolicy` | Hub image pull policy | `IfNotPresent` | | `hub.image.pullSecrets` | Hub image pull secrets | `[]` | @@ -209,7 +209,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | --------------------------------- | | `proxy.image.registry` | Proxy image registry | `docker.io` | | `proxy.image.repository` | Proxy image repository | `bitnami/configurable-http-proxy` | -| `proxy.image.tag` | Proxy image tag (immutable tags are recommended) | `4.6.0-debian-11-r5` | +| `proxy.image.tag` | Proxy image tag (immutable tags are recommended) | `4.6.0-debian-11-r14` | | `proxy.image.digest` | Proxy image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `proxy.image.pullPolicy` | Proxy image pull policy | `IfNotPresent` | | `proxy.image.pullSecrets` | Proxy image pull secrets | `[]` | @@ -407,7 +407,7 @@ The command removes all the Kubernetes components associated with the chart and | ----------------------------------------------- | ----------------------------------------------------------------------------------------------------------- | ------------------------------------ | | `singleuser.image.registry` | Single User image registry | `docker.io` | | `singleuser.image.repository` | Single User image repository | `bitnami/jupyter-base-notebook` | -| `singleuser.image.tag` | Single User image tag (immutabe tags are recommended) | `4.0.2-debian-11-r45` | +| `singleuser.image.tag` | Single User image tag (immutabe tags are recommended) | `4.0.2-debian-11-r53` | | `singleuser.image.digest` | Single User image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `singleuser.image.pullPolicy` | Single User image pull policy | `IfNotPresent` | | `singleuser.image.pullSecrets` | Single User image pull secrets | `[]` | @@ -467,7 +467,7 @@ The command removes all the Kubernetes components associated with the chart and | ---------------------------- | --------------------------------------------------------------------------------------------------------- | ------------------ | | `auxiliaryImage.registry` | Auxiliary image registry | `docker.io` | | `auxiliaryImage.repository` | Auxiliary image repository | `bitnami/os-shell` | -| `auxiliaryImage.tag` | Auxiliary image tag (immutabe tags are recommended) | `11-debian-11-r77` | +| `auxiliaryImage.tag` | Auxiliary image tag (immutabe tags are recommended) | `11-debian-11-r89` | | `auxiliaryImage.digest` | Auxiliary image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `auxiliaryImage.pullPolicy` | Auxiliary image pull policy | `IfNotPresent` | | `auxiliaryImage.pullSecrets` | Auxiliary image pull secrets | `[]` | @@ -599,4 +599,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/jupyterhub/values.yaml b/bitnami/jupyterhub/values.yaml index a934da179e391d..184666e1fe1041 100644 --- a/bitnami/jupyterhub/values.yaml +++ b/bitnami/jupyterhub/values.yaml @@ -71,7 +71,7 @@ hub: image: registry: docker.io repository: bitnami/jupyterhub - tag: 4.0.2-debian-11-r44 + tag: 4.0.2-debian-11-r52 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -636,7 +636,7 @@ proxy: image: registry: docker.io repository: bitnami/configurable-http-proxy - tag: 4.6.0-debian-11-r5 + tag: 4.6.0-debian-11-r14 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1413,7 +1413,7 @@ singleuser: image: registry: docker.io repository: bitnami/jupyter-base-notebook - tag: 4.0.2-debian-11-r45 + tag: 4.0.2-debian-11-r53 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1597,7 +1597,7 @@ singleuser: auxiliaryImage: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/kafka/Chart.lock b/bitnami/kafka/Chart.lock index 376437bc160e27..0010734cef7a1f 100644 --- a/bitnami/kafka/Chart.lock +++ b/bitnami/kafka/Chart.lock @@ -4,6 +4,6 @@ dependencies: version: 12.1.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:0b84be95360f0dd7a8a9a425127b0c6f95d7722250838f7999e564bf0d6317e3 -generated: "2023-09-25T13:09:11.905474945Z" + version: 2.13.2 +digest: sha256:014815aff273844f34be8506ddc386d70779c46590d9899f756d141eb6285acd +generated: "2023-10-09T18:35:01.517634728Z" diff --git a/bitnami/kafka/Chart.yaml b/bitnami/kafka/Chart.yaml index a67cdbad246df5..517f5282d5f4c7 100644 --- a/bitnami/kafka/Chart.yaml +++ b/bitnami/kafka/Chart.yaml @@ -6,15 +6,15 @@ annotations: licenses: Apache-2.0 images: | - name: jmx-exporter - image: docker.io/bitnami/jmx-exporter:0.19.0-debian-11-r84 + image: docker.io/bitnami/jmx-exporter:0.19.0-debian-11-r92 - name: kafka-exporter - image: docker.io/bitnami/kafka-exporter:1.7.0-debian-11-r120 + image: docker.io/bitnami/kafka-exporter:1.7.0-debian-11-r130 - name: kafka - image: docker.io/bitnami/kafka:3.5.1-debian-11-r61 + image: docker.io/bitnami/kafka:3.5.1-debian-11-r71 - name: kubectl - image: docker.io/bitnami/kubectl:1.28.2-debian-11-r2 + image: docker.io/bitnami/kubectl:1.28.2-debian-11-r14 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 3.5.1 dependencies: @@ -42,4 +42,4 @@ maintainers: name: kafka sources: - https://github.com/bitnami/charts/tree/main/bitnami/kafka -version: 25.3.1 +version: 25.3.3 diff --git a/bitnami/kafka/README.md b/bitnami/kafka/README.md index a4b1b8c75384c5..3825a401ca27fb 100644 --- a/bitnami/kafka/README.md +++ b/bitnami/kafka/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | Kafka image registry | `docker.io` | | `image.repository` | Kafka image repository | `bitnami/kafka` | -| `image.tag` | Kafka image tag (immutable tags are recommended) | `3.5.1-debian-11-r61` | +| `image.tag` | Kafka image tag (immutable tags are recommended) | `3.5.1-debian-11-r71` | | `image.digest` | Kafka image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Kafka image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -379,73 +379,73 @@ The command removes all the Kubernetes components associated with the chart and ### Traffic Exposure parameters -| Name | Description | Value | -| ------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------- | --------------------- | -| `service.type` | Kubernetes Service type | `ClusterIP` | -| `service.ports.client` | Kafka svc port for client connections | `9092` | -| `service.ports.controller` | Kafka svc port for controller connections. It is used if "kraft.enabled: true" | `9093` | -| `service.ports.interbroker` | Kafka svc port for inter-broker connections | `9094` | -| `service.ports.external` | Kafka svc port for external connections | `9095` | -| `service.extraPorts` | Extra ports to expose in the Kafka service (normally used with the `sidecar` value) | `[]` | -| `service.nodePorts.client` | Node port for the Kafka client connections | `""` | -| `service.nodePorts.external` | Node port for the Kafka external connections | `""` | -| `service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | -| `service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | -| `service.clusterIP` | Kafka service Cluster IP | `""` | -| `service.loadBalancerIP` | Kafka service Load Balancer IP | `""` | -| `service.loadBalancerSourceRanges` | Kafka service Load Balancer sources | `[]` | -| `service.externalTrafficPolicy` | Kafka service external traffic policy | `Cluster` | -| `service.annotations` | Additional custom annotations for Kafka service | `{}` | -| `service.headless.controller.annotations` | Annotations for the controller-eligible headless service. | `{}` | -| `service.headless.controller.labels` | Labels for the controller-eligible headless service. | `{}` | -| `service.headless.broker.annotations` | Annotations for the broker-only headless service. | `{}` | -| `service.headless.broker.labels` | Labels for the broker-only headless service. | `{}` | -| `externalAccess.enabled` | Enable Kubernetes external cluster access to Kafka brokers | `false` | -| `externalAccess.autoDiscovery.enabled` | Enable using an init container to auto-detect external IPs/ports by querying the K8s API | `false` | -| `externalAccess.autoDiscovery.image.registry` | Init container auto-discovery image registry | `docker.io` | -| `externalAccess.autoDiscovery.image.repository` | Init container auto-discovery image repository | `bitnami/kubectl` | -| `externalAccess.autoDiscovery.image.tag` | Init container auto-discovery image tag (immutable tags are recommended) | `1.28.2-debian-11-r2` | -| `externalAccess.autoDiscovery.image.digest` | Kubectl image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `externalAccess.autoDiscovery.image.pullPolicy` | Init container auto-discovery image pull policy | `IfNotPresent` | -| `externalAccess.autoDiscovery.image.pullSecrets` | Init container auto-discovery image pull secrets | `[]` | -| `externalAccess.autoDiscovery.resources.limits` | The resources limits for the auto-discovery init container | `{}` | -| `externalAccess.autoDiscovery.resources.requests` | The requested resources for the auto-discovery init container | `{}` | -| `externalAccess.controller.forceExpose` | If set to true, force exposing controller-eligible nodes although they are configured as controller-only nodes | `false` | -| `externalAccess.controller.service.type` | Kubernetes Service type for external access. It can be NodePort, LoadBalancer or ClusterIP | `LoadBalancer` | -| `externalAccess.controller.service.ports.external` | Kafka port used for external access when service type is LoadBalancer | `9094` | -| `externalAccess.controller.service.loadBalancerIPs` | Array of load balancer IPs for each Kafka broker. Length must be the same as replicaCount | `[]` | -| `externalAccess.controller.service.loadBalancerNames` | Array of load balancer Names for each Kafka broker. Length must be the same as replicaCount | `[]` | -| `externalAccess.controller.service.loadBalancerAnnotations` | Array of load balancer annotations for each Kafka broker. Length must be the same as replicaCount | `[]` | -| `externalAccess.controller.service.loadBalancerSourceRanges` | Address(es) that are allowed when service is LoadBalancer | `[]` | -| `externalAccess.controller.service.nodePorts` | Array of node ports used for each Kafka broker. Length must be the same as replicaCount | `[]` | -| `externalAccess.controller.service.externalIPs` | Use distinct service host IPs to configure Kafka external listener when service type is NodePort. Length must be the same as replicaCount | `[]` | -| `externalAccess.controller.service.useHostIPs` | Use service host IPs to configure Kafka external listener when service type is NodePort | `false` | -| `externalAccess.controller.service.usePodIPs` | using the MY_POD_IP address for external access. | `false` | -| `externalAccess.controller.service.domain` | Domain or external ip used to configure Kafka external listener when service type is NodePort or ClusterIP | `""` | -| `externalAccess.controller.service.publishNotReadyAddresses` | Indicates that any agent which deals with endpoints for this Service should disregard any indications of ready/not-ready | `false` | -| `externalAccess.controller.service.labels` | Service labels for external access | `{}` | -| `externalAccess.controller.service.annotations` | Service annotations for external access | `{}` | -| `externalAccess.controller.service.extraPorts` | Extra ports to expose in the Kafka external service | `[]` | -| `externalAccess.broker.service.type` | Kubernetes Service type for external access. It can be NodePort, LoadBalancer or ClusterIP | `LoadBalancer` | -| `externalAccess.broker.service.ports.external` | Kafka port used for external access when service type is LoadBalancer | `9094` | -| `externalAccess.broker.service.loadBalancerIPs` | Array of load balancer IPs for each Kafka broker. Length must be the same as replicaCount | `[]` | -| `externalAccess.broker.service.loadBalancerNames` | Array of load balancer Names for each Kafka broker. Length must be the same as replicaCount | `[]` | -| `externalAccess.broker.service.loadBalancerAnnotations` | Array of load balancer annotations for each Kafka broker. Length must be the same as replicaCount | `[]` | -| `externalAccess.broker.service.loadBalancerSourceRanges` | Address(es) that are allowed when service is LoadBalancer | `[]` | -| `externalAccess.broker.service.nodePorts` | Array of node ports used for each Kafka broker. Length must be the same as replicaCount | `[]` | -| `externalAccess.broker.service.externalIPs` | Use distinct service host IPs to configure Kafka external listener when service type is NodePort. Length must be the same as replicaCount | `[]` | -| `externalAccess.broker.service.useHostIPs` | Use service host IPs to configure Kafka external listener when service type is NodePort | `false` | -| `externalAccess.broker.service.usePodIPs` | using the MY_POD_IP address for external access. | `false` | -| `externalAccess.broker.service.domain` | Domain or external ip used to configure Kafka external listener when service type is NodePort or ClusterIP | `""` | -| `externalAccess.broker.service.publishNotReadyAddresses` | Indicates that any agent which deals with endpoints for this Service should disregard any indications of ready/not-ready | `false` | -| `externalAccess.broker.service.labels` | Service labels for external access | `{}` | -| `externalAccess.broker.service.annotations` | Service annotations for external access | `{}` | -| `externalAccess.broker.service.extraPorts` | Extra ports to expose in the Kafka external service | `[]` | -| `networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `false` | -| `networkPolicy.allowExternal` | Don't require client label for connections | `true` | -| `networkPolicy.explicitNamespacesSelector` | A Kubernetes LabelSelector to explicitly select namespaces from which traffic could be allowed | `{}` | -| `networkPolicy.externalAccess.from` | customize the from section for External Access on tcp-external port | `[]` | -| `networkPolicy.egressRules.customRules` | Custom network policy rule | `{}` | +| Name | Description | Value | +| ------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | +| `service.type` | Kubernetes Service type | `ClusterIP` | +| `service.ports.client` | Kafka svc port for client connections | `9092` | +| `service.ports.controller` | Kafka svc port for controller connections. It is used if "kraft.enabled: true" | `9093` | +| `service.ports.interbroker` | Kafka svc port for inter-broker connections | `9094` | +| `service.ports.external` | Kafka svc port for external connections | `9095` | +| `service.extraPorts` | Extra ports to expose in the Kafka service (normally used with the `sidecar` value) | `[]` | +| `service.nodePorts.client` | Node port for the Kafka client connections | `""` | +| `service.nodePorts.external` | Node port for the Kafka external connections | `""` | +| `service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | +| `service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | +| `service.clusterIP` | Kafka service Cluster IP | `""` | +| `service.loadBalancerIP` | Kafka service Load Balancer IP | `""` | +| `service.loadBalancerSourceRanges` | Kafka service Load Balancer sources | `[]` | +| `service.externalTrafficPolicy` | Kafka service external traffic policy | `Cluster` | +| `service.annotations` | Additional custom annotations for Kafka service | `{}` | +| `service.headless.controller.annotations` | Annotations for the controller-eligible headless service. | `{}` | +| `service.headless.controller.labels` | Labels for the controller-eligible headless service. | `{}` | +| `service.headless.broker.annotations` | Annotations for the broker-only headless service. | `{}` | +| `service.headless.broker.labels` | Labels for the broker-only headless service. | `{}` | +| `externalAccess.enabled` | Enable Kubernetes external cluster access to Kafka brokers | `false` | +| `externalAccess.autoDiscovery.enabled` | Enable using an init container to auto-detect external IPs/ports by querying the K8s API | `false` | +| `externalAccess.autoDiscovery.image.registry` | Init container auto-discovery image registry | `docker.io` | +| `externalAccess.autoDiscovery.image.repository` | Init container auto-discovery image repository | `bitnami/kubectl` | +| `externalAccess.autoDiscovery.image.tag` | Init container auto-discovery image tag (immutable tags are recommended) | `1.28.2-debian-11-r14` | +| `externalAccess.autoDiscovery.image.digest` | Kubectl image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `externalAccess.autoDiscovery.image.pullPolicy` | Init container auto-discovery image pull policy | `IfNotPresent` | +| `externalAccess.autoDiscovery.image.pullSecrets` | Init container auto-discovery image pull secrets | `[]` | +| `externalAccess.autoDiscovery.resources.limits` | The resources limits for the auto-discovery init container | `{}` | +| `externalAccess.autoDiscovery.resources.requests` | The requested resources for the auto-discovery init container | `{}` | +| `externalAccess.controller.forceExpose` | If set to true, force exposing controller-eligible nodes although they are configured as controller-only nodes | `false` | +| `externalAccess.controller.service.type` | Kubernetes Service type for external access. It can be NodePort, LoadBalancer or ClusterIP | `LoadBalancer` | +| `externalAccess.controller.service.ports.external` | Kafka port used for external access when service type is LoadBalancer | `9094` | +| `externalAccess.controller.service.loadBalancerIPs` | Array of load balancer IPs for each Kafka broker. Length must be the same as replicaCount | `[]` | +| `externalAccess.controller.service.loadBalancerNames` | Array of load balancer Names for each Kafka broker. Length must be the same as replicaCount | `[]` | +| `externalAccess.controller.service.loadBalancerAnnotations` | Array of load balancer annotations for each Kafka broker. Length must be the same as replicaCount | `[]` | +| `externalAccess.controller.service.loadBalancerSourceRanges` | Address(es) that are allowed when service is LoadBalancer | `[]` | +| `externalAccess.controller.service.nodePorts` | Array of node ports used for each Kafka broker. Length must be the same as replicaCount | `[]` | +| `externalAccess.controller.service.externalIPs` | Use distinct service host IPs to configure Kafka external listener when service type is NodePort. Length must be the same as replicaCount | `[]` | +| `externalAccess.controller.service.useHostIPs` | Use service host IPs to configure Kafka external listener when service type is NodePort | `false` | +| `externalAccess.controller.service.usePodIPs` | using the MY_POD_IP address for external access. | `false` | +| `externalAccess.controller.service.domain` | Domain or external ip used to configure Kafka external listener when service type is NodePort or ClusterIP | `""` | +| `externalAccess.controller.service.publishNotReadyAddresses` | Indicates that any agent which deals with endpoints for this Service should disregard any indications of ready/not-ready | `false` | +| `externalAccess.controller.service.labels` | Service labels for external access | `{}` | +| `externalAccess.controller.service.annotations` | Service annotations for external access | `{}` | +| `externalAccess.controller.service.extraPorts` | Extra ports to expose in the Kafka external service | `[]` | +| `externalAccess.broker.service.type` | Kubernetes Service type for external access. It can be NodePort, LoadBalancer or ClusterIP | `LoadBalancer` | +| `externalAccess.broker.service.ports.external` | Kafka port used for external access when service type is LoadBalancer | `9094` | +| `externalAccess.broker.service.loadBalancerIPs` | Array of load balancer IPs for each Kafka broker. Length must be the same as replicaCount | `[]` | +| `externalAccess.broker.service.loadBalancerNames` | Array of load balancer Names for each Kafka broker. Length must be the same as replicaCount | `[]` | +| `externalAccess.broker.service.loadBalancerAnnotations` | Array of load balancer annotations for each Kafka broker. Length must be the same as replicaCount | `[]` | +| `externalAccess.broker.service.loadBalancerSourceRanges` | Address(es) that are allowed when service is LoadBalancer | `[]` | +| `externalAccess.broker.service.nodePorts` | Array of node ports used for each Kafka broker. Length must be the same as replicaCount | `[]` | +| `externalAccess.broker.service.externalIPs` | Use distinct service host IPs to configure Kafka external listener when service type is NodePort. Length must be the same as replicaCount | `[]` | +| `externalAccess.broker.service.useHostIPs` | Use service host IPs to configure Kafka external listener when service type is NodePort | `false` | +| `externalAccess.broker.service.usePodIPs` | using the MY_POD_IP address for external access. | `false` | +| `externalAccess.broker.service.domain` | Domain or external ip used to configure Kafka external listener when service type is NodePort or ClusterIP | `""` | +| `externalAccess.broker.service.publishNotReadyAddresses` | Indicates that any agent which deals with endpoints for this Service should disregard any indications of ready/not-ready | `false` | +| `externalAccess.broker.service.labels` | Service labels for external access | `{}` | +| `externalAccess.broker.service.annotations` | Service annotations for external access | `{}` | +| `externalAccess.broker.service.extraPorts` | Extra ports to expose in the Kafka external service | `[]` | +| `networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `false` | +| `networkPolicy.allowExternal` | Don't require client label for connections | `true` | +| `networkPolicy.explicitNamespacesSelector` | A Kubernetes LabelSelector to explicitly select namespaces from which traffic could be allowed | `{}` | +| `networkPolicy.externalAccess.from` | customize the from section for External Access on tcp-external port | `[]` | +| `networkPolicy.egressRules.customRules` | Custom network policy rule | `{}` | ### Volume Permissions parameters @@ -454,7 +454,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | @@ -479,7 +479,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.kafka.enabled` | Whether or not to create a standalone Kafka exporter to expose Kafka metrics | `false` | | `metrics.kafka.image.registry` | Kafka exporter image registry | `docker.io` | | `metrics.kafka.image.repository` | Kafka exporter image repository | `bitnami/kafka-exporter` | -| `metrics.kafka.image.tag` | Kafka exporter image tag (immutable tags are recommended) | `1.7.0-debian-11-r120` | +| `metrics.kafka.image.tag` | Kafka exporter image tag (immutable tags are recommended) | `1.7.0-debian-11-r130` | | `metrics.kafka.image.digest` | Kafka exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.kafka.image.pullPolicy` | Kafka exporter image pull policy | `IfNotPresent` | | `metrics.kafka.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -533,7 +533,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.jmx.kafkaJmxPort` | JMX port where the exporter will collect metrics, exposed in the Kafka container. | `5555` | | `metrics.jmx.image.registry` | JMX exporter image registry | `docker.io` | | `metrics.jmx.image.repository` | JMX exporter image repository | `bitnami/jmx-exporter` | -| `metrics.jmx.image.tag` | JMX exporter image tag (immutable tags are recommended) | `0.19.0-debian-11-r84` | +| `metrics.jmx.image.tag` | JMX exporter image tag (immutable tags are recommended) | `0.19.0-debian-11-r92` | | `metrics.jmx.image.digest` | JMX exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.jmx.image.pullPolicy` | JMX exporter image pull policy | `IfNotPresent` | | `metrics.jmx.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -677,13 +677,6 @@ It is strongly recommended to use immutable tags in a production environment. Th Bitnami will release a new chart updating its containers if a new version of the main container, significant changes, or critical vulnerabilities exist. -### Setting custom parameters - -Any environment variable beginning with `KAFKA_CFG_` will be mapped to its corresponding Kafka key. For example, use `KAFKA_CFG_BACKGROUND_THREADS` in order to set `background.threads`. In order to pass custom environment variables use the `extraEnvVars` property. - -Using `extraEnvVars` with `KAFKA_CFG_` is the preferred and simplest way to add custom Kafka parameters not otherwise specified in this chart. Alternatively, you can provide a *full* Kafka configuration using `config` or `existingConfigmap`. -Setting either `config` or `existingConfigmap` will cause the chart to disregard `KAFKA_CFG_` settings, which are used by many other Kafka-related chart values described above, as well as dynamically generated parameters such as `zookeeper.connect`. This can cause unexpected behavior. - ### Listeners configuration This chart allows you to automatically configure Kafka with 3 listeners: diff --git a/bitnami/kafka/values.yaml b/bitnami/kafka/values.yaml index 6faaf4740021b9..b299ec4dc06237 100644 --- a/bitnami/kafka/values.yaml +++ b/bitnami/kafka/values.yaml @@ -80,7 +80,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/kafka - tag: 3.5.1-debian-11-r61 + tag: 3.5.1-debian-11-r71 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1303,7 +1303,7 @@ externalAccess: image: registry: docker.io repository: bitnami/kubectl - tag: 1.28.2-debian-11-r2 + tag: 1.28.2-debian-11-r14 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1553,7 +1553,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -1635,7 +1635,7 @@ metrics: image: registry: docker.io repository: bitnami/kafka-exporter - tag: 1.7.0-debian-11-r120 + tag: 1.7.0-debian-11-r130 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1889,7 +1889,7 @@ metrics: image: registry: docker.io repository: bitnami/jmx-exporter - tag: 0.19.0-debian-11-r84 + tag: 0.19.0-debian-11-r92 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/keycloak/Chart.lock b/bitnami/keycloak/Chart.lock index 34f75c31241c20..b2ac9fc074dd41 100644 --- a/bitnami/keycloak/Chart.lock +++ b/bitnami/keycloak/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.0.0 + version: 13.1.2 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:d1f49f32f25061a835d77707aaa01d410748b4c5d47f5ed28a5276f28a90c547 -generated: "2023-10-04T19:32:57.880499364Z" + version: 2.13.2 +digest: sha256:7231bbd9aede608b96afd7cb87bd478830dd36c5eebca4a38cc4a7a90d5f7e11 +generated: "2023-10-09T23:59:45.563706716Z" diff --git a/bitnami/keycloak/Chart.yaml b/bitnami/keycloak/Chart.yaml index da487e2a78e5e6..77eee6f8af7719 100644 --- a/bitnami/keycloak/Chart.yaml +++ b/bitnami/keycloak/Chart.yaml @@ -8,7 +8,7 @@ annotations: - name: keycloak-config-cli image: docker.io/bitnami/keycloak-config-cli:5.8.0-debian-11-r65 - name: keycloak - image: docker.io/bitnami/keycloak:22.0.4-debian-11-r0 + image: docker.io/bitnami/keycloak:22.0.4-debian-11-r2 apiVersion: v2 appVersion: 22.0.4 dependencies: @@ -33,4 +33,4 @@ maintainers: name: keycloak sources: - https://github.com/bitnami/charts/tree/main/bitnami/keycloak -version: 17.0.1 +version: 17.0.3 diff --git a/bitnami/keycloak/README.md b/bitnami/keycloak/README.md index 4e3caaff26a26e..4e2a957ff3178a 100644 --- a/bitnami/keycloak/README.md +++ b/bitnami/keycloak/README.md @@ -86,7 +86,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------------------- | ---------------------------------------------------------------------------------------------------------------------------- | ----------------------------- | | `image.registry` | Keycloak image registry | `docker.io` | | `image.repository` | Keycloak image repository | `bitnami/keycloak` | -| `image.tag` | Keycloak image tag (immutable tags are recommended) | `22.0.4-debian-11-r0` | +| `image.tag` | Keycloak image tag (immutable tags are recommended) | `22.0.4-debian-11-r2` | | `image.digest` | Keycloak image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Keycloak image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/keycloak/values.yaml b/bitnami/keycloak/values.yaml index c32171aea48fcd..da6d2f634361f3 100644 --- a/bitnami/keycloak/values.yaml +++ b/bitnami/keycloak/values.yaml @@ -94,7 +94,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/keycloak - tag: 22.0.4-debian-11-r0 + tag: 22.0.4-debian-11-r2 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/kiam/Chart.lock b/bitnami/kiam/Chart.lock index d9794a19c3f18d..8a8357a00b51fd 100644 --- a/bitnami/kiam/Chart.lock +++ b/bitnami/kiam/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-29T11:00:37.932969+02:00" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T18:18:33.659708538Z" diff --git a/bitnami/kiam/Chart.yaml b/bitnami/kiam/Chart.yaml index b88dbdf7e6f569..a25612f4d2c561 100644 --- a/bitnami/kiam/Chart.yaml +++ b/bitnami/kiam/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: kiam - image: docker.io/bitnami/kiam:4.2.0-debian-11-r418 + image: docker.io/bitnami/kiam:4.2.0-debian-11-r421 apiVersion: v2 appVersion: 4.2.0 dependencies: @@ -28,4 +28,4 @@ maintainers: name: kiam sources: - https://github.com/bitnami/charts/tree/main/bitnami/kiam -version: 1.4.4 +version: 1.4.6 diff --git a/bitnami/kiam/README.md b/bitnami/kiam/README.md index e1627e8530f993..c7f981434cdda4 100644 --- a/bitnami/kiam/README.md +++ b/bitnami/kiam/README.md @@ -83,7 +83,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | kiam image registry | `docker.io` | | `image.repository` | kiam image name | `bitnami/kiam` | -| `image.tag` | kiam image tag | `4.2.0-debian-11-r418` | +| `image.tag` | kiam image tag | `4.2.0-debian-11-r421` | | `image.digest` | kiam image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | kiam image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/kiam/values.yaml b/bitnami/kiam/values.yaml index fbcf150cdb64c2..9ad07449301403 100644 --- a/bitnami/kiam/values.yaml +++ b/bitnami/kiam/values.yaml @@ -67,7 +67,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/kiam - tag: 4.2.0-debian-11-r418 + tag: 4.2.0-debian-11-r421 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/kibana/Chart.lock b/bitnami/kibana/Chart.lock index bf6dae479f034f..a957962369af2d 100644 --- a/bitnami/kibana/Chart.lock +++ b/bitnami/kibana/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.1 -digest: sha256:ead8f26c76a9ec082f23629a358e8efd8f88d87aaed734bf41febcb8a7bc5d4c -generated: "2023-09-18T22:25:16.671402011Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T21:23:18.237112375Z" diff --git a/bitnami/kibana/Chart.yaml b/bitnami/kibana/Chart.yaml index 1299c6512597b6..e77286247fc2b4 100644 --- a/bitnami/kibana/Chart.yaml +++ b/bitnami/kibana/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: kibana - image: docker.io/bitnami/kibana:8.10.2-debian-11-r0 + image: docker.io/bitnami/kibana:8.10.3-debian-11-r0 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r72 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 -appVersion: 8.10.2 +appVersion: 8.10.3 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -32,4 +32,4 @@ maintainers: name: kibana sources: - https://github.com/bitnami/charts/tree/main/bitnami/kibana -version: 10.5.5 +version: 10.5.7 diff --git a/bitnami/kibana/README.md b/bitnami/kibana/README.md index d8f9915176c5c6..4f57c95bc180f8 100644 --- a/bitnami/kibana/README.md +++ b/bitnami/kibana/README.md @@ -84,7 +84,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | | `image.registry` | Kibana image registry | `docker.io` | | `image.repository` | Kibana image repository | `bitnami/kibana` | -| `image.tag` | Kibana image tag (immutable tags are recommended) | `8.10.2-debian-11-r0` | +| `image.tag` | Kibana image tag (immutable tags are recommended) | `8.10.3-debian-11-r0` | | `image.digest` | Kibana image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Kibana image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -112,7 +112,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r72` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | diff --git a/bitnami/kibana/values.yaml b/bitnami/kibana/values.yaml index 3e2762a9bdcdea..e67a36ff289287 100644 --- a/bitnami/kibana/values.yaml +++ b/bitnami/kibana/values.yaml @@ -73,7 +73,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/kibana - tag: 8.10.2-debian-11-r0 + tag: 8.10.3-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -195,7 +195,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r72 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/kube-prometheus/Chart.lock b/bitnami/kube-prometheus/Chart.lock index de29e3a6d66f8d..3850071dd87ed4 100644 --- a/bitnami/kube-prometheus/Chart.lock +++ b/bitnami/kube-prometheus/Chart.lock @@ -7,6 +7,6 @@ dependencies: version: 3.7.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:91296ae38d6b7f2599d05f59ad5ed344dd35014e7f23ab37f4a0cdb5a3f95dd0 -generated: "2023-10-04T07:10:18.057410732Z" + version: 2.13.2 +digest: sha256:f701e6dd0b19986049e2a05a094535926ffaa311a77453f8afdd395ebd5fbcae +generated: "2023-10-09T20:43:19.449342757Z" diff --git a/bitnami/kube-prometheus/Chart.yaml b/bitnami/kube-prometheus/Chart.yaml index e22119bf9ecaa1..0019063dbb6b71 100644 --- a/bitnami/kube-prometheus/Chart.yaml +++ b/bitnami/kube-prometheus/Chart.yaml @@ -6,15 +6,15 @@ annotations: licenses: Apache-2.0 images: | - name: alertmanager - image: docker.io/bitnami/alertmanager:0.26.0-debian-11-r38 + image: docker.io/bitnami/alertmanager:0.26.0-debian-11-r41 - name: blackbox-exporter image: docker.io/bitnami/blackbox-exporter:0.24.0-debian-11-r135 - name: prometheus-operator image: docker.io/bitnami/prometheus-operator:0.68.0-debian-11-r24 - name: prometheus - image: docker.io/bitnami/prometheus:2.47.0-debian-11-r26 + image: docker.io/bitnami/prometheus:2.47.1-debian-11-r1 - name: thanos - image: docker.io/bitnami/thanos:0.32.3-debian-11-r11 + image: docker.io/bitnami/thanos:0.32.4-debian-11-r0 apiVersion: v2 appVersion: 0.68.0 dependencies: @@ -46,4 +46,4 @@ maintainers: name: kube-prometheus sources: - https://github.com/bitnami/charts/tree/main/bitnami/kube-prometheus -version: 8.21.2 +version: 8.21.4 diff --git a/bitnami/kube-prometheus/README.md b/bitnami/kube-prometheus/README.md index ba0d6c4156eb01..9a97fe143b7a3d 100644 --- a/bitnami/kube-prometheus/README.md +++ b/bitnami/kube-prometheus/README.md @@ -209,7 +209,7 @@ The command removes all the Kubernetes components associated with the chart and | `prometheus.enabled` | Deploy Prometheus to the cluster | `true` | | `prometheus.image.registry` | Prometheus image registry | `docker.io` | | `prometheus.image.repository` | Prometheus image repository | `bitnami/prometheus` | -| `prometheus.image.tag` | Prometheus image tag (immutable tags are recommended) | `2.47.0-debian-11-r26` | +| `prometheus.image.tag` | Prometheus image tag (immutable tags are recommended) | `2.47.1-debian-11-r1` | | `prometheus.image.digest` | Prometheus image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `prometheus.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | | `prometheus.serviceAccount.create` | Specify whether to create a ServiceAccount for Prometheus | `true` | @@ -363,7 +363,7 @@ The command removes all the Kubernetes components associated with the chart and | `prometheus.thanos.create` | Create a Thanos sidecar container | `false` | | `prometheus.thanos.image.registry` | Thanos image registry | `docker.io` | | `prometheus.thanos.image.repository` | Thanos image name | `bitnami/thanos` | -| `prometheus.thanos.image.tag` | Thanos image tag | `0.32.3-debian-11-r11` | +| `prometheus.thanos.image.tag` | Thanos image tag | `0.32.4-debian-11-r0` | | `prometheus.thanos.image.digest` | Thanos image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `prometheus.thanos.image.pullPolicy` | Thanos image pull policy | `IfNotPresent` | | `prometheus.thanos.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -450,7 +450,7 @@ The command removes all the Kubernetes components associated with the chart and | `alertmanager.enabled` | Deploy Alertmanager to the cluster | `true` | | `alertmanager.image.registry` | Prometheus image registry | `docker.io` | | `alertmanager.image.repository` | Prometheus image repository | `bitnami/alertmanager` | -| `alertmanager.image.tag` | Prometheus image tag (immutable tags are recommended) | `0.26.0-debian-11-r38` | +| `alertmanager.image.tag` | Prometheus image tag (immutable tags are recommended) | `0.26.0-debian-11-r41` | | `alertmanager.image.digest` | Prometheus image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `alertmanager.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | | `alertmanager.serviceAccount.create` | Specify whether to create a ServiceAccount for Alertmanager | `true` | diff --git a/bitnami/kube-prometheus/templates/alertmanager/psp-clusterrole.yaml b/bitnami/kube-prometheus/templates/alertmanager/psp-clusterrole.yaml index dd9cd813a1bba6..26808a9d8b2c9c 100644 --- a/bitnami/kube-prometheus/templates/alertmanager/psp-clusterrole.yaml +++ b/bitnami/kube-prometheus/templates/alertmanager/psp-clusterrole.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.alertmanager.enabled .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.alertmanager.enabled .Values.rbac.create .Values.rbac.pspEnabled }} kind: ClusterRole apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }} metadata: diff --git a/bitnami/kube-prometheus/templates/alertmanager/psp-clusterrolebinding.yaml b/bitnami/kube-prometheus/templates/alertmanager/psp-clusterrolebinding.yaml index 38ab2052325182..689d9c0831b14e 100644 --- a/bitnami/kube-prometheus/templates/alertmanager/psp-clusterrolebinding.yaml +++ b/bitnami/kube-prometheus/templates/alertmanager/psp-clusterrolebinding.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.alertmanager.enabled .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.alertmanager.enabled .Values.rbac.create .Values.rbac.pspEnabled }} apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }} kind: ClusterRoleBinding metadata: diff --git a/bitnami/kube-prometheus/templates/alertmanager/psp.yaml b/bitnami/kube-prometheus/templates/alertmanager/psp.yaml index ca3e04998d016e..3fa184534d7618 100644 --- a/bitnami/kube-prometheus/templates/alertmanager/psp.yaml +++ b/bitnami/kube-prometheus/templates/alertmanager/psp.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.alertmanager.enabled .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.alertmanager.enabled .Values.rbac.create .Values.rbac.pspEnabled }} apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: diff --git a/bitnami/kube-prometheus/templates/prometheus-operator/psp-clusterrole.yaml b/bitnami/kube-prometheus/templates/prometheus-operator/psp-clusterrole.yaml index 4050e1748979fd..c9ef82d0dfe64b 100644 --- a/bitnami/kube-prometheus/templates/prometheus-operator/psp-clusterrole.yaml +++ b/bitnami/kube-prometheus/templates/prometheus-operator/psp-clusterrole.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.operator.enabled .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.operator.enabled .Values.rbac.create .Values.rbac.pspEnabled }} kind: ClusterRole apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }} metadata: diff --git a/bitnami/kube-prometheus/templates/prometheus-operator/psp-clusterrolebinding.yaml b/bitnami/kube-prometheus/templates/prometheus-operator/psp-clusterrolebinding.yaml index 4952ebffb1ead6..730f83bd97a834 100644 --- a/bitnami/kube-prometheus/templates/prometheus-operator/psp-clusterrolebinding.yaml +++ b/bitnami/kube-prometheus/templates/prometheus-operator/psp-clusterrolebinding.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.operator.enabled .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.operator.enabled .Values.rbac.create .Values.rbac.pspEnabled }} apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }} kind: ClusterRoleBinding metadata: diff --git a/bitnami/kube-prometheus/templates/prometheus-operator/psp.yaml b/bitnami/kube-prometheus/templates/prometheus-operator/psp.yaml index 85617afe6e8561..7d11eef9f619bd 100644 --- a/bitnami/kube-prometheus/templates/prometheus-operator/psp.yaml +++ b/bitnami/kube-prometheus/templates/prometheus-operator/psp.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.operator.enabled .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.operator.enabled .Values.rbac.create .Values.rbac.pspEnabled }} apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: diff --git a/bitnami/kube-prometheus/templates/prometheus/psp-clusterrole.yaml b/bitnami/kube-prometheus/templates/prometheus/psp-clusterrole.yaml index 86144bfb44c6e0..4bbb6625d68148 100644 --- a/bitnami/kube-prometheus/templates/prometheus/psp-clusterrole.yaml +++ b/bitnami/kube-prometheus/templates/prometheus/psp-clusterrole.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) }} -{{- if and $pspAvailable .Values.prometheus.enabled .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.prometheus.enabled .Values.rbac.create .Values.rbac.pspEnabled }} kind: ClusterRole apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }} metadata: diff --git a/bitnami/kube-prometheus/templates/prometheus/psp-clusterrolebinding.yaml b/bitnami/kube-prometheus/templates/prometheus/psp-clusterrolebinding.yaml index 828c06ce48540e..dc7746898aa3fa 100644 --- a/bitnami/kube-prometheus/templates/prometheus/psp-clusterrolebinding.yaml +++ b/bitnami/kube-prometheus/templates/prometheus/psp-clusterrolebinding.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.prometheus.enabled .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.prometheus.enabled .Values.rbac.create .Values.rbac.pspEnabled }} apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }} kind: ClusterRoleBinding metadata: diff --git a/bitnami/kube-prometheus/templates/prometheus/psp.yaml b/bitnami/kube-prometheus/templates/prometheus/psp.yaml index 65416981cce758..77c24bdcfa64d2 100644 --- a/bitnami/kube-prometheus/templates/prometheus/psp.yaml +++ b/bitnami/kube-prometheus/templates/prometheus/psp.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.prometheus.enabled .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.prometheus.enabled .Values.rbac.create .Values.rbac.pspEnabled }} apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: diff --git a/bitnami/kube-prometheus/values.yaml b/bitnami/kube-prometheus/values.yaml index 07cb92efa693d7..57ead7c3c7d3d7 100644 --- a/bitnami/kube-prometheus/values.yaml +++ b/bitnami/kube-prometheus/values.yaml @@ -524,7 +524,7 @@ prometheus: image: registry: docker.io repository: bitnami/prometheus - tag: 2.47.0-debian-11-r26 + tag: 2.47.1-debian-11-r1 digest: "" ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. @@ -1202,7 +1202,7 @@ prometheus: image: registry: docker.io repository: bitnami/thanos - tag: 0.32.3-debian-11-r11 + tag: 0.32.4-debian-11-r0 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -1601,7 +1601,7 @@ alertmanager: image: registry: docker.io repository: bitnami/alertmanager - tag: 0.26.0-debian-11-r38 + tag: 0.26.0-debian-11-r41 digest: "" ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. diff --git a/bitnami/kube-state-metrics/Chart.lock b/bitnami/kube-state-metrics/Chart.lock index 9c9ac17d35c6a9..b7d9ecb0d75559 100644 --- a/bitnami/kube-state-metrics/Chart.lock +++ b/bitnami/kube-state-metrics/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-30T21:22:13.413051871Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-11T07:16:28.609540414Z" diff --git a/bitnami/kube-state-metrics/Chart.yaml b/bitnami/kube-state-metrics/Chart.yaml index 0f9eb8156c9d66..d2bf8a1055c559 100644 --- a/bitnami/kube-state-metrics/Chart.yaml +++ b/bitnami/kube-state-metrics/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: kube-state-metrics - image: docker.io/bitnami/kube-state-metrics:2.10.0-debian-11-r31 + image: docker.io/bitnami/kube-state-metrics:2.10.0-debian-11-r34 apiVersion: v2 appVersion: 2.10.0 dependencies: @@ -28,4 +28,4 @@ maintainers: name: kube-state-metrics sources: - https://github.com/bitnami/charts/tree/main/bitnami/kube-state-metrics -version: 3.7.3 +version: 3.7.4 diff --git a/bitnami/kube-state-metrics/README.md b/bitnami/kube-state-metrics/README.md index b6721789b68f6f..af99b27eb5e882 100644 --- a/bitnami/kube-state-metrics/README.md +++ b/bitnami/kube-state-metrics/README.md @@ -85,7 +85,7 @@ The command removes all the Kubernetes components associated with the chart and | `serviceAccount.annotations` | Annotations for service account. Evaluated as a template. Only used if `create` is `true`. | `{}` | | `image.registry` | kube-state-metrics image registry | `docker.io` | | `image.repository` | kube-state-metrics image repository | `bitnami/kube-state-metrics` | -| `image.tag` | kube-state-metrics image tag (immutable tags are recommended) | `2.10.0-debian-11-r31` | +| `image.tag` | kube-state-metrics image tag (immutable tags are recommended) | `2.10.0-debian-11-r34` | | `image.digest` | kube-state-metrics image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | kube-state-metrics image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/kube-state-metrics/values.yaml b/bitnami/kube-state-metrics/values.yaml index 98614d2cf90fa2..c7e2ea04f9c992 100644 --- a/bitnami/kube-state-metrics/values.yaml +++ b/bitnami/kube-state-metrics/values.yaml @@ -101,7 +101,7 @@ serviceAccount: image: registry: docker.io repository: bitnami/kube-state-metrics - tag: 2.10.0-debian-11-r31 + tag: 2.10.0-debian-11-r34 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/kubernetes-event-exporter/Chart.lock b/bitnami/kubernetes-event-exporter/Chart.lock index e44654e4cc7654..df1d4920073bda 100644 --- a/bitnami/kubernetes-event-exporter/Chart.lock +++ b/bitnami/kubernetes-event-exporter/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-04T00:27:31.349527616Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T18:34:58.769203678Z" diff --git a/bitnami/kubernetes-event-exporter/Chart.yaml b/bitnami/kubernetes-event-exporter/Chart.yaml index f9d148608c91aa..2224a6b645adc2 100644 --- a/bitnami/kubernetes-event-exporter/Chart.yaml +++ b/bitnami/kubernetes-event-exporter/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: kubernetes-event-exporter - image: docker.io/bitnami/kubernetes-event-exporter:1.4.0-debian-11-r57 + image: docker.io/bitnami/kubernetes-event-exporter:1.4.0-debian-11-r60 apiVersion: v2 appVersion: 1.4.0 dependencies: @@ -31,4 +31,4 @@ maintainers: name: kubernetes-event-exporter sources: - https://github.com/bitnami/charts/tree/main/bitnami/kubernetes-event-exporter -version: 2.7.3 +version: 2.7.5 diff --git a/bitnami/kubernetes-event-exporter/README.md b/bitnami/kubernetes-event-exporter/README.md index d488e0d3b98a15..eabdc6314b5f02 100644 --- a/bitnami/kubernetes-event-exporter/README.md +++ b/bitnami/kubernetes-event-exporter/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | `extraContainerPorts` | Optionally specify extra list of additional port-mappings for the container | `[]` | | `image.registry` | Container image registry | `docker.io` | | `image.repository` | Container image name | `bitnami/kubernetes-event-exporter` | -| `image.tag` | Container image tag | `1.4.0-debian-11-r57` | +| `image.tag` | Container image tag | `1.4.0-debian-11-r60` | | `image.digest` | Container image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Container image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/kubernetes-event-exporter/values.yaml b/bitnami/kubernetes-event-exporter/values.yaml index 8e4e3f5ffea64d..b97232df9c1fdc 100644 --- a/bitnami/kubernetes-event-exporter/values.yaml +++ b/bitnami/kubernetes-event-exporter/values.yaml @@ -79,7 +79,7 @@ image: ## registry: docker.io repository: bitnami/kubernetes-event-exporter - tag: 1.4.0-debian-11-r57 + tag: 1.4.0-debian-11-r60 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/logstash/Chart.lock b/bitnami/logstash/Chart.lock index 60d2dcad54e62b..002a9d3346e0d3 100644 --- a/bitnami/logstash/Chart.lock +++ b/bitnami/logstash/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.1 -digest: sha256:ead8f26c76a9ec082f23629a358e8efd8f88d87aaed734bf41febcb8a7bc5d4c -generated: "2023-09-18T22:44:41.76408047Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T18:58:04.240567051Z" diff --git a/bitnami/logstash/Chart.yaml b/bitnami/logstash/Chart.yaml index 3c0b2d4e45793b..fd1dc306d8880e 100644 --- a/bitnami/logstash/Chart.yaml +++ b/bitnami/logstash/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: logstash - image: docker.io/bitnami/logstash:8.10.2-debian-11-r0 + image: docker.io/bitnami/logstash:8.10.3-debian-11-r0 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r72 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 -appVersion: 8.10.2 +appVersion: 8.10.3 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -30,4 +30,4 @@ maintainers: name: logstash sources: - https://github.com/bitnami/charts/tree/main/bitnami/logstash -version: 5.5.6 +version: 5.5.9 diff --git a/bitnami/logstash/README.md b/bitnami/logstash/README.md index aec816b3f1ccab..0ea0d738cc9078 100644 --- a/bitnami/logstash/README.md +++ b/bitnami/logstash/README.md @@ -80,7 +80,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | | `image.registry` | Logstash image registry | `docker.io` | | `image.repository` | Logstash image repository | `bitnami/logstash` | -| `image.tag` | Logstash image tag (immutable tags are recommended) | `8.10.2-debian-11-r0` | +| `image.tag` | Logstash image tag (immutable tags are recommended) | `8.10.3-debian-11-r0` | | `image.digest` | Logstash image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Logstash image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -176,7 +176,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.securityContext.runAsUser` | User ID for the volumePermissions init container | `0` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r72` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/logstash/values.yaml b/bitnami/logstash/values.yaml index 18ab52d78d1337..ad2ad3bb0427c8 100644 --- a/bitnami/logstash/values.yaml +++ b/bitnami/logstash/values.yaml @@ -73,7 +73,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/logstash - tag: 8.10.2-debian-11-r0 + tag: 8.10.3-debian-11-r0 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -535,7 +535,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r72 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/magento/Chart.lock b/bitnami/magento/Chart.lock index b8059c32b73ba7..b038c76e42c2c8 100644 --- a/bitnami/magento/Chart.lock +++ b/bitnami/magento/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.2 + version: 14.0.1 - name: elasticsearch repository: oci://registry-1.docker.io/bitnamicharts - version: 19.11.0 + version: 19.13.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.10.0 -digest: sha256:fa78bf436be6f3f9a288e20d63c2b6efc9667d2ab95861f5a52c5e7787684694 -generated: "2023-09-05T11:34:01.99799+02:00" + version: 2.13.2 +digest: sha256:83026cbeef6dc30aed7710bfc92331494796fb6a8367104920dd7ab9bf12a923 +generated: "2023-10-10T16:50:00.129217117+02:00" diff --git a/bitnami/magento/Chart.yaml b/bitnami/magento/Chart.yaml index 62229dd7a82f15..21d6b9b76f450a 100644 --- a/bitnami/magento/Chart.yaml +++ b/bitnami/magento/Chart.yaml @@ -6,46 +6,46 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r21 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: elasticsearch - image: docker.io/bitnami/elasticsearch:7.17.12-debian-11-r21 + image: docker.io/bitnami/elasticsearch:7.17.13-debian-11-r25 - name: magento - image: docker.io/bitnami/magento:2.4.6-debian-11-r69 + image: docker.io/bitnami/magento:2.4.6-debian-11-r113 - name: mariadb - image: docker.io/bitnami/mariadb:10.6.15-debian-11-r2 + image: docker.io/bitnami/mariadb:10.6.15-debian-11-r49 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r43 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 2.4.6 dependencies: - - condition: mariadb.enabled - name: mariadb - repository: oci://registry-1.docker.io/bitnamicharts - tags: - - magento-database - version: 13.x.x - - condition: elasticsearch.enabled - name: elasticsearch - repository: oci://registry-1.docker.io/bitnamicharts - version: 19.x.x - - name: common - repository: oci://registry-1.docker.io/bitnamicharts - tags: - - bitnami-common - version: 2.x.x +- condition: mariadb.enabled + name: mariadb + repository: oci://registry-1.docker.io/bitnamicharts + tags: + - magento-database + version: 14.x.x +- condition: elasticsearch.enabled + name: elasticsearch + repository: oci://registry-1.docker.io/bitnamicharts + version: 19.x.x +- name: common + repository: oci://registry-1.docker.io/bitnamicharts + tags: + - bitnami-common + version: 2.x.x description: Magento is a powerful open source e-commerce platform. With easy customizations and rich features, it allows retailers to grow their online businesses in a cost-effective way. home: https://bitnami.com icon: https://bitnami.com/assets/stacks/magento/img/magento-stack-220x234.png keywords: - - magento - - e-commerce - - http - - web - - php +- magento +- e-commerce +- http +- web +- php maintainers: - - name: VMware, Inc. - url: https://github.com/bitnami/charts +- name: VMware, Inc. + url: https://github.com/bitnami/charts name: magento sources: - - https://github.com/bitnami/charts/tree/main/bitnami/magento -version: 23.1.2 +- https://github.com/bitnami/charts/tree/main/bitnami/magento +version: 24.0.0 diff --git a/bitnami/magento/README.md b/bitnami/magento/README.md index 07fcd6bcfc7dc5..863fd40999432e 100644 --- a/bitnami/magento/README.md +++ b/bitnami/magento/README.md @@ -80,88 +80,88 @@ The command removes all the Kubernetes components associated with the chart and ### Magento parameters -| Name | Description | Value | -| --------------------------------------- | -------------------------------------------------------------------------------------------------------------------- | --------------------- | -| `image.registry` | Magento image registry | `docker.io` | -| `image.repository` | Magento image repository | `bitnami/magento` | -| `image.tag` | Magento image tag (immutable tags are recommended) | `2.4.6-debian-11-r69` | -| `image.digest` | Magento image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | Magento image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `image.debug` | Specify if debug logs should be enabled | `false` | -| `hostAliases` | Add deployment host aliases | `[]` | -| `replicaCount` | Number of Magento Pods to run | `1` | -| `magentoSkipInstall` | Skip Magento installation wizard. Useful for migrations and restoring from SQL dump | `false` | -| `magentoHost` | Magento host to create application URLs | `""` | -| `magentoUsername` | User of the application | `user` | -| `magentoPassword` | Application password | `""` | -| `magentoEmail` | Admin email | `user@example.com` | -| `magentoFirstName` | Magento Admin First Name | `""` | -| `magentoLastName` | Magento Admin Last Name | `""` | -| `magentoAdminUri` | Magento prefix to access Magento Admin | `""` | -| `magentoMode` | Magento mode | `""` | -| `magentoExtraInstallArgs` | Magento extra install args | `""` | -| `magentoDeployStaticContent` | Deploy static content during the first deployment, to optimize page load time | `false` | -| `magentoUseHttps` | Use SSL to access the Magento Store. Valid values: `true`, `false` | `false` | -| `magentoUseSecureAdmin` | Use SSL to access the Magento Admin. Valid values: `true`, `false` | `false` | -| `magentoSkipReindex` | Skip Magento Indexer reindex step during the initialization. Valid values: `true`, `false` | `false` | -| `allowEmptyPassword` | Allow DB blank passwords | `false` | -| `command` | Override default container command (useful when using custom images) | `[]` | -| `args` | Override default container args (useful when using custom images) | `[]` | -| `updateStrategy.type` | Update strategy - only really applicable for deployments with RWO PVs attached | `RollingUpdate` | -| `extraEnvVars` | Extra environment variables | `[]` | -| `extraEnvVarsCM` | ConfigMap containing extra env vars | `""` | -| `extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `""` | -| `extraVolumes` | Array of extra volumes to be added to the deployment (evaluated as template). Requires setting `extraVolumeMounts` | `[]` | -| `extraVolumeMounts` | Array of extra volume mounts to be added to the container (evaluated as template). Normally used with `extraVolumes` | `[]` | -| `extraContainerPorts` | Array of additional container ports for the Magento container | `[]` | -| `initContainers` | Add additional init containers to the pod (evaluated as a template) | `[]` | -| `sidecars` | Attach additional containers to the pod (evaluated as a template) | `[]` | -| `tolerations` | Tolerations for pod assignment | `[]` | -| `priorityClassName` | %%MAIN_CONTAINER_NAME%% pods' priorityClassName | `""` | -| `schedulerName` | Name of the k8s scheduler (other than default) | `""` | -| `terminationGracePeriodSeconds` | In seconds, time the given to the %%MAIN_CONTAINER_NAME%% pod needs to terminate gracefully | `""` | -| `topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` | -| `existingSecret` | Name of a secret with the application password | `""` | -| `containerPorts` | Container ports | `{}` | -| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | -| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | -| `affinity` | Affinity for pod assignment | `{}` | -| `nodeSelector` | Node labels for pod assignment | `{}` | -| `resources.limits` | The resources limits for the Magento container | `{}` | -| `resources.requests` | The requested resourcesc for the Magento container | `{}` | -| `podSecurityContext.enabled` | Enable Magento pods' Security Context | `true` | -| `podSecurityContext.fsGroup` | Magento pods' group ID | `1001` | -| `containerSecurityContext.enabled` | Enable Magento containers' Security Context | `true` | -| `containerSecurityContext.runAsUser` | Magento containers' Security Context | `1001` | -| `containerSecurityContext.runAsNonRoot` | Set %%MAIN_CONTAINER_NAME%% container's Security Context runAsNonRoot | `true` | -| `livenessProbe.enabled` | Enable livenessProbe | `true` | -| `livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `300` | -| `livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | -| `livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `readinessProbe.enabled` | Enable readinessProbe | `true` | -| `readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | -| `readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `3` | -| `readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `startupProbe.enabled` | Enable startupProbe | `false` | -| `startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | -| `startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | -| `startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `3` | -| `startupProbe.failureThreshold` | Failure threshold for startupProbe | `60` | -| `startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `customLivenessProbe` | Override default liveness probe | `{}` | -| `customReadinessProbe` | Override default readiness probe | `{}` | -| `customStartupProbe` | Override default startup probe | `{}` | -| `lifecycleHooks` | LifecycleHook to set additional configuration at startup Evaluated as a template | `{}` | -| `podAnnotations` | Pod annotations | `{}` | -| `podLabels` | Add additional labels to the pod (evaluated as a template) | `{}` | +| Name | Description | Value | +| --------------------------------------- | -------------------------------------------------------------------------------------------------------------------- | ---------------------- | +| `image.registry` | Magento image registry | `docker.io` | +| `image.repository` | Magento image repository | `bitnami/magento` | +| `image.tag` | Magento image tag (immutable tags are recommended) | `2.4.6-debian-11-r113` | +| `image.digest` | Magento image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | Magento image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `image.debug` | Specify if debug logs should be enabled | `false` | +| `hostAliases` | Add deployment host aliases | `[]` | +| `replicaCount` | Number of Magento Pods to run | `1` | +| `magentoSkipInstall` | Skip Magento installation wizard. Useful for migrations and restoring from SQL dump | `false` | +| `magentoHost` | Magento host to create application URLs | `""` | +| `magentoUsername` | User of the application | `user` | +| `magentoPassword` | Application password | `""` | +| `magentoEmail` | Admin email | `user@example.com` | +| `magentoFirstName` | Magento Admin First Name | `""` | +| `magentoLastName` | Magento Admin Last Name | `""` | +| `magentoAdminUri` | Magento prefix to access Magento Admin | `""` | +| `magentoMode` | Magento mode | `""` | +| `magentoExtraInstallArgs` | Magento extra install args | `""` | +| `magentoDeployStaticContent` | Deploy static content during the first deployment, to optimize page load time | `false` | +| `magentoUseHttps` | Use SSL to access the Magento Store. Valid values: `true`, `false` | `false` | +| `magentoUseSecureAdmin` | Use SSL to access the Magento Admin. Valid values: `true`, `false` | `false` | +| `magentoSkipReindex` | Skip Magento Indexer reindex step during the initialization. Valid values: `true`, `false` | `false` | +| `allowEmptyPassword` | Allow DB blank passwords | `false` | +| `command` | Override default container command (useful when using custom images) | `[]` | +| `args` | Override default container args (useful when using custom images) | `[]` | +| `updateStrategy.type` | Update strategy - only really applicable for deployments with RWO PVs attached | `RollingUpdate` | +| `extraEnvVars` | Extra environment variables | `[]` | +| `extraEnvVarsCM` | ConfigMap containing extra env vars | `""` | +| `extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `""` | +| `extraVolumes` | Array of extra volumes to be added to the deployment (evaluated as template). Requires setting `extraVolumeMounts` | `[]` | +| `extraVolumeMounts` | Array of extra volume mounts to be added to the container (evaluated as template). Normally used with `extraVolumes` | `[]` | +| `extraContainerPorts` | Array of additional container ports for the Magento container | `[]` | +| `initContainers` | Add additional init containers to the pod (evaluated as a template) | `[]` | +| `sidecars` | Attach additional containers to the pod (evaluated as a template) | `[]` | +| `tolerations` | Tolerations for pod assignment | `[]` | +| `priorityClassName` | %%MAIN_CONTAINER_NAME%% pods' priorityClassName | `""` | +| `schedulerName` | Name of the k8s scheduler (other than default) | `""` | +| `terminationGracePeriodSeconds` | In seconds, time the given to the %%MAIN_CONTAINER_NAME%% pod needs to terminate gracefully | `""` | +| `topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` | +| `existingSecret` | Name of a secret with the application password | `""` | +| `containerPorts` | Container ports | `{}` | +| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | +| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | +| `affinity` | Affinity for pod assignment | `{}` | +| `nodeSelector` | Node labels for pod assignment | `{}` | +| `resources.limits` | The resources limits for the Magento container | `{}` | +| `resources.requests` | The requested resourcesc for the Magento container | `{}` | +| `podSecurityContext.enabled` | Enable Magento pods' Security Context | `true` | +| `podSecurityContext.fsGroup` | Magento pods' group ID | `1001` | +| `containerSecurityContext.enabled` | Enable Magento containers' Security Context | `true` | +| `containerSecurityContext.runAsUser` | Magento containers' Security Context | `1001` | +| `containerSecurityContext.runAsNonRoot` | Set %%MAIN_CONTAINER_NAME%% container's Security Context runAsNonRoot | `true` | +| `livenessProbe.enabled` | Enable livenessProbe | `true` | +| `livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `300` | +| `livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | +| `livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `readinessProbe.enabled` | Enable readinessProbe | `true` | +| `readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | +| `readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `3` | +| `readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `startupProbe.enabled` | Enable startupProbe | `false` | +| `startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | +| `startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | +| `startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `3` | +| `startupProbe.failureThreshold` | Failure threshold for startupProbe | `60` | +| `startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `customLivenessProbe` | Override default liveness probe | `{}` | +| `customReadinessProbe` | Override default readiness probe | `{}` | +| `customStartupProbe` | Override default startup probe | `{}` | +| `lifecycleHooks` | LifecycleHook to set additional configuration at startup Evaluated as a template | `{}` | +| `podAnnotations` | Pod annotations | `{}` | +| `podLabels` | Add additional labels to the pod (evaluated as a template) | `{}` | ### NetworkPolicy parameters @@ -185,30 +185,30 @@ The command removes all the Kubernetes components associated with the chart and ### Database parameters -| Name | Description | Value | -| ------------------------------------------- | ------------------------------------------------------------------------------------------------------- | ---------------------- | -| `mariadb.enabled` | Whether to deploy a mariadb server to satisfy the applications database requirements. | `true` | -| `mariadb.image.registry` | MariaDB image registry | `docker.io` | -| `mariadb.image.repository` | MariaDB image repository | `bitnami/mariadb` | -| `mariadb.image.tag` | MariaDB image tag (immutable tags are recommended) | `10.6.15-debian-11-r2` | -| `mariadb.image.digest` | MariaDB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `mariadb.architecture` | MariaDB architecture. Allowed values: `standalone` or `replication` | `standalone` | -| `mariadb.auth.rootPassword` | Password for the MariaDB `root` user | `""` | -| `mariadb.auth.database` | Database name to create | `bitnami_magento` | -| `mariadb.auth.username` | Database user to create | `bn_magento` | -| `mariadb.auth.password` | Password for the database | `""` | -| `mariadb.primary.persistence.enabled` | Enable database persistence using PVC | `true` | -| `mariadb.primary.persistence.storageClass` | MariaDB primary persistent volume storage Class | `""` | -| `mariadb.primary.persistence.accessModes` | Database Persistent Volume Access Modes | `["ReadWriteOnce"]` | -| `mariadb.primary.persistence.size` | Database Persistent Volume Size | `8Gi` | -| `mariadb.primary.persistence.hostPath` | Set path in case you want to use local host path volumes (not recommended in production) | `""` | -| `mariadb.primary.persistence.existingClaim` | Name of an existing `PersistentVolumeClaim` for MariaDB primary replicas | `""` | -| `externalDatabase.host` | Host of the existing database | `""` | -| `externalDatabase.port` | Port of the existing database | `3306` | -| `externalDatabase.user` | Existing username in the external db | `bn_magento` | -| `externalDatabase.password` | Password for the above username | `""` | -| `externalDatabase.database` | Name of the existing database | `bitnami_magento` | -| `externalDatabase.existingSecret` | Name of an existing secret resource containing the DB password | `""` | +| Name | Description | Value | +| ------------------------------------------- | ------------------------------------------------------------------------------------------------------- | ----------------------- | +| `mariadb.enabled` | Whether to deploy a mariadb server to satisfy the applications database requirements. | `true` | +| `mariadb.image.registry` | MariaDB image registry | `docker.io` | +| `mariadb.image.repository` | MariaDB image repository | `bitnami/mariadb` | +| `mariadb.image.tag` | MariaDB image tag (immutable tags are recommended) | `10.6.15-debian-11-r49` | +| `mariadb.image.digest` | MariaDB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `mariadb.architecture` | MariaDB architecture. Allowed values: `standalone` or `replication` | `standalone` | +| `mariadb.auth.rootPassword` | Password for the MariaDB `root` user | `""` | +| `mariadb.auth.database` | Database name to create | `bitnami_magento` | +| `mariadb.auth.username` | Database user to create | `bn_magento` | +| `mariadb.auth.password` | Password for the database | `""` | +| `mariadb.primary.persistence.enabled` | Enable database persistence using PVC | `true` | +| `mariadb.primary.persistence.storageClass` | MariaDB primary persistent volume storage Class | `""` | +| `mariadb.primary.persistence.accessModes` | Database Persistent Volume Access Modes | `["ReadWriteOnce"]` | +| `mariadb.primary.persistence.size` | Database Persistent Volume Size | `8Gi` | +| `mariadb.primary.persistence.hostPath` | Set path in case you want to use local host path volumes (not recommended in production) | `""` | +| `mariadb.primary.persistence.existingClaim` | Name of an existing `PersistentVolumeClaim` for MariaDB primary replicas | `""` | +| `externalDatabase.host` | Host of the existing database | `""` | +| `externalDatabase.port` | Port of the existing database | `3306` | +| `externalDatabase.user` | Existing username in the external db | `bn_magento` | +| `externalDatabase.password` | Password for the above username | `""` | +| `externalDatabase.database` | Name of the existing database | `bitnami_magento` | +| `externalDatabase.existingSecret` | Name of an existing secret resource containing the DB password | `""` | ### Elasticsearch parameters @@ -217,7 +217,7 @@ The command removes all the Kubernetes components associated with the chart and | `elasticsearch.enabled` | Whether to deploy a elasticsearch server to use as magento's search engine | `true` | | `elasticsearch.image.registry` | Elasticsearch image registry | `docker.io` | | `elasticsearch.image.repository` | Elasticsearch image repository | `bitnami/elasticsearch` | -| `elasticsearch.image.tag` | Elasticsearch image tag (immutable tags are recommended) | `7.17.12-debian-11-r21` | +| `elasticsearch.image.tag` | Elasticsearch image tag (immutable tags are recommended) | `7.17.13-debian-11-r25` | | `elasticsearch.image.digest` | Elasticsearch image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `elasticsearch.sysctlImage.enabled` | Enable kernel settings modifier image for Elasticsearch | `true` | | `elasticsearch.master.replicaCount` | Desired number of Elasticsearch master-eligible nodes | `1` | @@ -249,7 +249,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r43` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -295,7 +295,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.1-debian-11-r21` | +| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -323,7 +323,7 @@ The command removes all the Kubernetes components associated with the chart and | `certificates.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `""` | | `certificates.image.registry` | Container sidecar registry | `docker.io` | | `certificates.image.repository` | Container sidecar image | `bitnami/os-shell` | -| `certificates.image.tag` | Container sidecar image tag (immutable tags are recommended) | `11-debian-11-r43` | +| `certificates.image.tag` | Container sidecar image tag (immutable tags are recommended) | `11-debian-11-r89` | | `certificates.image.digest` | Container sidecar image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `certificates.image.pullPolicy` | Container sidecar image pull policy | `IfNotPresent` | | `certificates.image.pullSecrets` | Container sidecar image pull secrets | `[]` | @@ -653,6 +653,10 @@ You can disable the initContainer using the `elasticsearch.sysctlImage.enabled=f ## Upgrading +### To 24.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 22.0.0 This major release bumps the MariaDB version to 10.11. Follow the [upstream instructions](https://mariadb.com/kb/en/upgrading-from-mariadb-10-6-to-mariadb-10-11/) for upgrading from MariaDB 10.6 to 10.11. No major issues are expected during the upgrade. @@ -821,4 +825,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License. diff --git a/bitnami/magento/values.yaml b/bitnami/magento/values.yaml index 8f8030ef0e3301..b2337659adcd77 100644 --- a/bitnami/magento/values.yaml +++ b/bitnami/magento/values.yaml @@ -72,7 +72,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/magento - tag: 2.4.6-debian-11-r69 + tag: 2.4.6-debian-11-r113 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -494,7 +494,7 @@ mariadb: image: registry: docker.io repository: bitnami/mariadb - tag: 10.6.15-debian-11-r2 + tag: 10.6.15-debian-11-r49 digest: "" ## @param mariadb.architecture MariaDB architecture. Allowed values: `standalone` or `replication` ## @@ -588,7 +588,7 @@ elasticsearch: image: registry: docker.io repository: bitnami/elasticsearch - tag: 7.17.12-debian-11-r21 + tag: 7.17.13-debian-11-r25 digest: "" ## @param elasticsearch.sysctlImage.enabled Enable kernel settings modifier image for Elasticsearch ## @@ -698,7 +698,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r43 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace) @@ -899,7 +899,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.1-debian-11-r21 + tag: 1.0.2-debian-11-r8 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -999,7 +999,7 @@ certificates: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r43 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/mariadb-galera/Chart.lock b/bitnami/mariadb-galera/Chart.lock index 98ea9861e94b78..75d0ef07ae0358 100644 --- a/bitnami/mariadb-galera/Chart.lock +++ b/bitnami/mariadb-galera/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.1 -digest: sha256:ead8f26c76a9ec082f23629a358e8efd8f88d87aaed734bf41febcb8a7bc5d4c -generated: "2023-09-20T22:01:42.996017457Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-10T02:27:15.700953063Z" diff --git a/bitnami/mariadb-galera/Chart.yaml b/bitnami/mariadb-galera/Chart.yaml index 67447449c44529..9e4139d1455fdf 100644 --- a/bitnami/mariadb-galera/Chart.yaml +++ b/bitnami/mariadb-galera/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: mariadb-galera - image: docker.io/bitnami/mariadb-galera:11.0.3-debian-11-r33 + image: docker.io/bitnami/mariadb-galera:11.1.2-debian-11-r0 - name: mysqld-exporter - image: docker.io/bitnami/mysqld-exporter:0.15.0-debian-11-r53 + image: docker.io/bitnami/mysqld-exporter:0.15.0-debian-11-r69 apiVersion: v2 -appVersion: 11.0.3 +appVersion: 11.1.2 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -33,4 +33,4 @@ maintainers: name: mariadb-galera sources: - https://github.com/bitnami/charts/tree/main/bitnami/mariadb-galera -version: 9.2.1 +version: 10.0.0 diff --git a/bitnami/mariadb-galera/README.md b/bitnami/mariadb-galera/README.md index 50a580a236405a..386842043895ec 100644 --- a/bitnami/mariadb-galera/README.md +++ b/bitnami/mariadb-galera/README.md @@ -89,7 +89,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------- | | `image.registry` | MariaDB Galera image registry | `docker.io` | | `image.repository` | MariaDB Galera image repository | `bitnami/mariadb-galera` | -| `image.tag` | MariaDB Galera image tag (immutable tags are recommended) | `11.0.3-debian-11-r33` | +| `image.tag` | MariaDB Galera image tag (immutable tags are recommended) | `11.1.2-debian-11-r0` | | `image.digest` | MariaDB Galera image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | MariaDB Galera image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -227,7 +227,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | MariaDB Prometheus exporter image registry | `docker.io` | | `metrics.image.repository` | MariaDB Prometheus exporter image repository | `bitnami/mysqld-exporter` | -| `metrics.image.tag` | MariaDB Prometheus exporter image tag (immutable tags are recommended) | `0.15.0-debian-11-r53` | +| `metrics.image.tag` | MariaDB Prometheus exporter image tag (immutable tags are recommended) | `0.15.0-debian-11-r69` | | `metrics.image.digest` | MariaDB Prometheus exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | MariaDB Prometheus exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | MariaDB Prometheus exporter image pull secrets | `[]` | diff --git a/bitnami/mariadb-galera/values.yaml b/bitnami/mariadb-galera/values.yaml index 6de884dcc63310..edba5a14562e54 100644 --- a/bitnami/mariadb-galera/values.yaml +++ b/bitnami/mariadb-galera/values.yaml @@ -80,7 +80,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/mariadb-galera - tag: 11.0.3-debian-11-r33 + tag: 11.1.2-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -799,7 +799,7 @@ metrics: image: registry: docker.io repository: bitnami/mysqld-exporter - tag: 0.15.0-debian-11-r53 + tag: 0.15.0-debian-11-r69 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace) diff --git a/bitnami/mariadb/Chart.lock b/bitnami/mariadb/Chart.lock index cbd91b0e8392e7..efed5b49b04875 100644 --- a/bitnami/mariadb/Chart.lock +++ b/bitnami/mariadb/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.1 -digest: sha256:ead8f26c76a9ec082f23629a358e8efd8f88d87aaed734bf41febcb8a7bc5d4c -generated: "2023-09-19T07:38:45.78942734Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T16:37:07.817204798Z" diff --git a/bitnami/mariadb/Chart.yaml b/bitnami/mariadb/Chart.yaml index cb2dd764219726..5fea7015fd1233 100644 --- a/bitnami/mariadb/Chart.yaml +++ b/bitnami/mariadb/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: mariadb - image: docker.io/bitnami/mariadb:11.0.3-debian-11-r30 + image: docker.io/bitnami/mariadb:11.1.2-debian-11-r0 - name: mysqld-exporter - image: docker.io/bitnami/mysqld-exporter:0.15.0-debian-11-r50 + image: docker.io/bitnami/mysqld-exporter:0.15.0-debian-11-r69 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r72 + image: docker.io/bitnami/os-shell:11-debian-11-r86 apiVersion: v2 -appVersion: 11.0.3 +appVersion: 11.1.2 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -34,4 +34,4 @@ maintainers: name: mariadb sources: - https://github.com/bitnami/charts/tree/main/bitnami/mariadb -version: 13.1.4 +version: 14.0.1 diff --git a/bitnami/mariadb/README.md b/bitnami/mariadb/README.md index a0f7d89126e537..a94313bfb1a4fd 100644 --- a/bitnami/mariadb/README.md +++ b/bitnami/mariadb/README.md @@ -82,28 +82,28 @@ The command removes all the Kubernetes components associated with the chart and ### MariaDB common parameters -| Name | Description | Value | -| -------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | -| `image.registry` | MariaDB image registry | `docker.io` | -| `image.repository` | MariaDB image repository | `bitnami/mariadb` | -| `image.tag` | MariaDB image tag (immutable tags are recommended) | `11.0.3-debian-11-r30` | -| `image.digest` | MariaDB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | MariaDB image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `image.debug` | Specify if debug logs should be enabled | `false` | -| `architecture` | MariaDB architecture (`standalone` or `replication`) | `standalone` | -| `auth.rootPassword` | Password for the `root` user. Ignored if existing secret is provided. | `""` | -| `auth.database` | Name for a custom database to create | `my_database` | -| `auth.username` | Name for a custom user to create | `""` | -| `auth.password` | Password for the new user. Ignored if existing secret is provided | `""` | -| `auth.replicationUser` | MariaDB replication user | `replicator` | -| `auth.replicationPassword` | MariaDB replication user password. Ignored if existing secret is provided | `""` | -| `auth.existingSecret` | Use existing secret for password details (`auth.rootPassword`, `auth.password`, `auth.replicationPassword` will be ignored and picked up from this secret). The secret has to contain the keys `mariadb-root-password`, `mariadb-replication-password` and `mariadb-password` | `""` | -| `auth.forcePassword` | Force users to specify required passwords | `false` | -| `auth.usePasswordFiles` | Mount credentials as files instead of using environment variables | `false` | -| `auth.customPasswordFiles` | Use custom password files when `auth.usePasswordFiles` is set to `true`. Define path for keys `root` and `user`, also define `replicator` if `architecture` is set to `replication` | `{}` | -| `initdbScripts` | Dictionary of initdb scripts | `{}` | -| `initdbScriptsConfigMap` | ConfigMap with the initdb scripts (Note: Overrides `initdbScripts`) | `""` | +| Name | Description | Value | +| -------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- | +| `image.registry` | MariaDB image registry | `docker.io` | +| `image.repository` | MariaDB image repository | `bitnami/mariadb` | +| `image.tag` | MariaDB image tag (immutable tags are recommended) | `11.1.2-debian-11-r0` | +| `image.digest` | MariaDB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | MariaDB image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `image.debug` | Specify if debug logs should be enabled | `false` | +| `architecture` | MariaDB architecture (`standalone` or `replication`) | `standalone` | +| `auth.rootPassword` | Password for the `root` user. Ignored if existing secret is provided. | `""` | +| `auth.database` | Name for a custom database to create | `my_database` | +| `auth.username` | Name for a custom user to create | `""` | +| `auth.password` | Password for the new user. Ignored if existing secret is provided | `""` | +| `auth.replicationUser` | MariaDB replication user | `replicator` | +| `auth.replicationPassword` | MariaDB replication user password. Ignored if existing secret is provided | `""` | +| `auth.existingSecret` | Use existing secret for password details (`auth.rootPassword`, `auth.password`, `auth.replicationPassword` will be ignored and picked up from this secret). The secret has to contain the keys `mariadb-root-password`, `mariadb-replication-password` and `mariadb-password` | `""` | +| `auth.forcePassword` | Force users to specify required passwords | `false` | +| `auth.usePasswordFiles` | Mount credentials as files instead of using environment variables | `false` | +| `auth.customPasswordFiles` | Use custom password files when `auth.usePasswordFiles` is set to `true`. Define path for keys `root` and `user`, also define `replicator` if `architecture` is set to `replication` | `{}` | +| `initdbScripts` | Dictionary of initdb scripts | `{}` | +| `initdbScriptsConfigMap` | ConfigMap with the initdb scripts (Note: Overrides `initdbScripts`) | `""` | ### MariaDB Primary parameters @@ -308,7 +308,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r72` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r86` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -322,7 +322,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Exporter image registry | `docker.io` | | `metrics.image.repository` | Exporter image repository | `bitnami/mysqld-exporter` | -| `metrics.image.tag` | Exporter image tag (immutable tags are recommended) | `0.15.0-debian-11-r50` | +| `metrics.image.tag` | Exporter image tag (immutable tags are recommended) | `0.15.0-debian-11-r69` | | `metrics.image.digest` | Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/mariadb/values.yaml b/bitnami/mariadb/values.yaml index b1e4e8259ec821..10221d451af472 100644 --- a/bitnami/mariadb/values.yaml +++ b/bitnami/mariadb/values.yaml @@ -90,7 +90,7 @@ serviceBindings: image: registry: docker.io repository: bitnami/mariadb - tag: 11.0.3-debian-11-r30 + tag: 11.1.2-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1004,7 +1004,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r72 + tag: 11-debian-11-r86 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace) @@ -1040,7 +1040,7 @@ metrics: image: registry: docker.io repository: bitnami/mysqld-exporter - tag: 0.15.0-debian-11-r50 + tag: 0.15.0-debian-11-r69 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace) diff --git a/bitnami/mastodon/Chart.lock b/bitnami/mastodon/Chart.lock index 687bbb39be0db2..d57012eaf4d775 100644 --- a/bitnami/mastodon/Chart.lock +++ b/bitnami/mastodon/Chart.lock @@ -1,21 +1,21 @@ dependencies: - name: redis repository: oci://registry-1.docker.io/bitnamicharts - version: 18.1.0 + version: 18.1.3 - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.0.0 + version: 13.1.2 - name: elasticsearch repository: oci://registry-1.docker.io/bitnamicharts - version: 19.12.0 + version: 19.13.2 - name: minio repository: oci://registry-1.docker.io/bitnamicharts - version: 12.8.9 + version: 12.8.12 - name: apache repository: oci://registry-1.docker.io/bitnamicharts version: 9.6.5 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.1 -digest: sha256:fc2a5b1730f6caf2f4bff04d3a3fae3f18582c71b739de1e6169ad7737f85ebf -generated: "2023-09-29T10:40:56.803572+02:00" + version: 2.13.2 +digest: sha256:99a5cd66089533733c894211fceac2b2c19e6ab60512c8eed80bc37c33ca9cd1 +generated: "2023-10-11T08:15:15.390631931Z" diff --git a/bitnami/mastodon/Chart.yaml b/bitnami/mastodon/Chart.yaml index 57389e238a2cfe..9125b730578272 100644 --- a/bitnami/mastodon/Chart.yaml +++ b/bitnami/mastodon/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: mastodon - image: docker.io/bitnami/mastodon:4.2.0-debian-11-r0 + image: docker.io/bitnami/mastodon:4.2.1-debian-11-r0 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 -appVersion: 4.2.0 +appVersion: 4.2.1 dependencies: - condition: redis.enabled name: redis @@ -49,4 +49,4 @@ maintainers: name: mastodon sources: - https://github.com/bitnami/charts/tree/main/bitnami/mastodon -version: 3.0.0 +version: 3.0.4 diff --git a/bitnami/mastodon/README.md b/bitnami/mastodon/README.md index f9b68d51317b15..5a87b9a10f017b 100644 --- a/bitnami/mastodon/README.md +++ b/bitnami/mastodon/README.md @@ -81,7 +81,7 @@ The command removes all the Kubernetes components associated with the chart and | `diagnosticMode.args` | Args to override all containers in the deployment | `["infinity"]` | | `image.registry` | Mastodon image registry | `docker.io` | | `image.repository` | Mastodon image repository | `bitnami/mastodon` | -| `image.tag` | Mastodon image tag (immutable tags are recommended) | `4.2.0-debian-11-r0` | +| `image.tag` | Mastodon image tag (immutable tags are recommended) | `4.2.1-debian-11-r0` | | `image.digest` | Mastodon image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `image.pullPolicy` | Mastodon image pull policy | `IfNotPresent` | | `image.pullSecrets` | Mastodon image pull secrets | `[]` | @@ -428,7 +428,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | | `volumePermissions.resources.limits` | The resources limits for the init container | `{}` | @@ -704,4 +704,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/mastodon/values.yaml b/bitnami/mastodon/values.yaml index 69df425a2c031f..9d5dffabb4d198 100644 --- a/bitnami/mastodon/values.yaml +++ b/bitnami/mastodon/values.yaml @@ -76,7 +76,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/mastodon - tag: 4.2.0-debian-11-r0 + tag: 4.2.1-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1256,7 +1256,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. diff --git a/bitnami/matomo/Chart.lock b/bitnami/matomo/Chart.lock index c1ddbc92fe4d1e..9cc62633d95b13 100644 --- a/bitnami/matomo/Chart.lock +++ b/bitnami/matomo/Chart.lock @@ -4,6 +4,6 @@ dependencies: version: 13.1.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.1 -digest: sha256:69467d8dd7e86ae13efcd0c3a062ce856c88db1f4ffaf9b3e824435d336c59cc -generated: "2023-09-18T13:25:06.793542026Z" + version: 2.13.2 +digest: sha256:c6e65edbabef9c25d383071a222186fd74d56e72e3f930d0b64273624470477d +generated: "2023-10-06T04:04:10.924462615Z" diff --git a/bitnami/matomo/Chart.yaml b/bitnami/matomo/Chart.yaml index de21a7fb0f4fc5..09ab3d25e0f9c8 100644 --- a/bitnami/matomo/Chart.yaml +++ b/bitnami/matomo/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r50 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: matomo - image: docker.io/bitnami/matomo:4.15.1-debian-11-r42 + image: docker.io/bitnami/matomo:4.15.1-debian-11-r62 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r69 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 4.15.1 dependencies: @@ -39,4 +39,4 @@ maintainers: name: matomo sources: - https://github.com/bitnami/charts/tree/main/bitnami/matomo -version: 2.3.0 +version: 2.3.3 diff --git a/bitnami/matomo/README.md b/bitnami/matomo/README.md index ca4b3d447f1235..37501fc395bf81 100644 --- a/bitnami/matomo/README.md +++ b/bitnami/matomo/README.md @@ -81,7 +81,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------- | --------------------------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | Matomo image registry | `docker.io` | | `image.repository` | Matomo Image name | `bitnami/matomo` | -| `image.tag` | Matomo Image tag | `4.15.1-debian-11-r42` | +| `image.tag` | Matomo Image tag | `4.15.1-debian-11-r62` | | `image.digest` | Matomo image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Matomo image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -234,7 +234,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r69` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -248,7 +248,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a exporter side-car | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag | `1.0.1-debian-11-r50` | +| `metrics.image.tag` | Apache exporter image tag | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -273,7 +273,7 @@ The command removes all the Kubernetes components associated with the chart and | `certificates.extraEnvVarsSecret` | Secret containing extra env vars (in case of sensitive data) | `""` | | `certificates.image.registry` | Container sidecar registry | `docker.io` | | `certificates.image.repository` | Container sidecar image | `bitnami/os-shell` | -| `certificates.image.tag` | Container sidecar image tag | `11-debian-11-r69` | +| `certificates.image.tag` | Container sidecar image tag | `11-debian-11-r89` | | `certificates.image.digest` | Container sidecar image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `certificates.image.pullPolicy` | Container sidecar image pull policy | `IfNotPresent` | | `certificates.image.pullSecrets` | Container sidecar image pull secrets | `[]` | diff --git a/bitnami/matomo/values.yaml b/bitnami/matomo/values.yaml index 5a426278c5a68e..58d4a9f920468e 100644 --- a/bitnami/matomo/values.yaml +++ b/bitnami/matomo/values.yaml @@ -62,7 +62,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/matomo - tag: 4.15.1-debian-11-r42 + tag: 4.15.1-debian-11-r62 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -686,7 +686,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r69 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -739,7 +739,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.1-debian-11-r50 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -810,7 +810,7 @@ certificates: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r69 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/mediawiki/Chart.lock b/bitnami/mediawiki/Chart.lock index 21154c3ac74210..f26124e0e0fe57 100644 --- a/bitnami/mediawiki/Chart.lock +++ b/bitnami/mediawiki/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.3 + version: 14.0.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts version: 2.13.2 -digest: sha256:6f8a722a292328ebd96724185620ce9f202b980040ef6c9f26a651fd2f0d597e -generated: "2023-10-06T04:07:55.487135363Z" +digest: sha256:c314e0a70f16a40021a3d1b66194d128025951f37a9a53bea531a38daae93e89 +generated: "2023-10-10T18:39:38.237637475+02:00" diff --git a/bitnami/mediawiki/Chart.yaml b/bitnami/mediawiki/Chart.yaml index da565236e4b8b0..dbde9dbfe6e856 100644 --- a/bitnami/mediawiki/Chart.yaml +++ b/bitnami/mediawiki/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r5 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: mediawiki - image: docker.io/bitnami/mediawiki:1.40.1-debian-11-r2 + image: docker.io/bitnami/mediawiki:1.40.1-debian-11-r3 apiVersion: v2 appVersion: 1.40.1 dependencies: @@ -17,7 +17,7 @@ dependencies: repository: oci://registry-1.docker.io/bitnamicharts tags: - mediawiki-database - version: 13.x.x + version: 14.x.x - name: common repository: oci://registry-1.docker.io/bitnamicharts tags: @@ -39,4 +39,4 @@ maintainers: name: mediawiki sources: - https://github.com/bitnami/charts/tree/main/bitnami/mediawiki -version: 16.1.4 +version: 17.0.0 diff --git a/bitnami/mediawiki/README.md b/bitnami/mediawiki/README.md index b5890cd9f73a0f..b355c7d9a07159 100644 --- a/bitnami/mediawiki/README.md +++ b/bitnami/mediawiki/README.md @@ -81,7 +81,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | MediaWiki image registry | `docker.io` | | `image.repository` | MediaWiki image repository | `bitnami/mediawiki` | -| `image.tag` | MediaWiki image tag (immutable tags are recommended) | `1.40.1-debian-11-r2` | +| `image.tag` | MediaWiki image tag (immutable tags are recommended) | `1.40.1-debian-11-r3` | | `image.digest` | MediaWiki image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -233,7 +233,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r5` | +| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -365,6 +365,10 @@ Find more information about how to deal with common errors related to Bitnami's ## Upgrading +### To 17.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 16.0.0 This major release bumps the MariaDB version to 11.0. Follow the [upstream instructions](https://mariadb.com/kb/en/upgrading-from-mariadb-10-11-to-mariadb-11-0/) for upgrading from MariaDB 10.11 to 11.0. No major issues are expected during the upgrade. @@ -531,4 +535,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License. diff --git a/bitnami/mediawiki/values.yaml b/bitnami/mediawiki/values.yaml index e473fb9029e092..db2a904494587e 100644 --- a/bitnami/mediawiki/values.yaml +++ b/bitnami/mediawiki/values.yaml @@ -58,7 +58,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/mediawiki - tag: 1.40.1-debian-11-r2 + tag: 1.40.1-debian-11-r3 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -665,7 +665,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.2-debian-11-r5 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/memcached/Chart.lock b/bitnami/memcached/Chart.lock index ccaeac25198938..12fa2542b38c1f 100644 --- a/bitnami/memcached/Chart.lock +++ b/bitnami/memcached/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.10.1 -digest: sha256:daa1b58d8ebece125719a584651716f45f3b32268d691e449da396b34ae89c27 -generated: "2023-09-11T10:07:22.644113008Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T19:41:32.648573352Z" diff --git a/bitnami/memcached/Chart.yaml b/bitnami/memcached/Chart.yaml index c226a678247a83..af07b165bdaa1f 100644 --- a/bitnami/memcached/Chart.yaml +++ b/bitnami/memcached/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: memcached-exporter - image: docker.io/bitnami/memcached-exporter:0.13.0-debian-11-r95 + image: docker.io/bitnami/memcached-exporter:0.13.0-debian-11-r120 - name: memcached - image: docker.io/bitnami/memcached:1.6.21-debian-11-r84 + image: docker.io/bitnami/memcached:1.6.21-debian-11-r107 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r63 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 1.6.21 dependencies: @@ -31,4 +31,4 @@ maintainers: name: memcached sources: - https://github.com/bitnami/charts/tree/main/bitnami/memcached -version: 6.6.2 +version: 6.6.5 diff --git a/bitnami/memcached/README.md b/bitnami/memcached/README.md index 82f7596ad62162..f4555ba1c279aa 100644 --- a/bitnami/memcached/README.md +++ b/bitnami/memcached/README.md @@ -76,25 +76,25 @@ The command removes all the Kubernetes components associated with the chart and ### Memcached parameters -| Name | Description | Value | -| ----------------------------- | --------------------------------------------------------------------------------------------------------- | ---------------------- | -| `image.registry` | Memcached image registry | `docker.io` | -| `image.repository` | Memcached image repository | `bitnami/memcached` | -| `image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r84` | -| `image.digest` | Memcached image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | Memcached image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `image.debug` | Specify if debug values should be set | `false` | -| `architecture` | Memcached architecture. Allowed values: standalone or high-availability | `standalone` | -| `auth.enabled` | Enable Memcached authentication | `false` | -| `auth.username` | Memcached admin user | `""` | -| `auth.password` | Memcached admin password | `""` | -| `auth.existingPasswordSecret` | Existing secret with Memcached credentials (must contain a value for `memcached-password` key) | `""` | -| `command` | Override default container command (useful when using custom images) | `[]` | -| `args` | Override default container args (useful when using custom images) | `[]` | -| `extraEnvVars` | Array with extra environment variables to add to Memcached nodes | `[]` | -| `extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Memcached nodes | `""` | -| `extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Memcached nodes | `""` | +| Name | Description | Value | +| ----------------------------- | --------------------------------------------------------------------------------------------------------- | ----------------------- | +| `image.registry` | Memcached image registry | `docker.io` | +| `image.repository` | Memcached image repository | `bitnami/memcached` | +| `image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r107` | +| `image.digest` | Memcached image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | Memcached image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `image.debug` | Specify if debug values should be set | `false` | +| `architecture` | Memcached architecture. Allowed values: standalone or high-availability | `standalone` | +| `auth.enabled` | Enable Memcached authentication | `false` | +| `auth.username` | Memcached admin user | `""` | +| `auth.password` | Memcached admin password | `""` | +| `auth.existingPasswordSecret` | Existing secret with Memcached credentials (must contain a value for `memcached-password` key) | `""` | +| `command` | Override default container command (useful when using custom images) | `[]` | +| `args` | Override default container args (useful when using custom images) | `[]` | +| `extraEnvVars` | Array with extra environment variables to add to Memcached nodes | `[]` | +| `extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Memcached nodes | `""` | +| `extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Memcached nodes | `""` | ### Deployment/Statefulset parameters @@ -207,7 +207,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r63` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | @@ -217,7 +217,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Memcached exporter image registry | `docker.io` | | `metrics.image.repository` | Memcached exporter image repository | `bitnami/memcached-exporter` | -| `metrics.image.tag` | Memcached exporter image tag (immutable tags are recommended) | `0.13.0-debian-11-r95` | +| `metrics.image.tag` | Memcached exporter image tag (immutable tags are recommended) | `0.13.0-debian-11-r120` | | `metrics.image.digest` | Memcached exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/memcached/values.yaml b/bitnami/memcached/values.yaml index 40a3304109abba..345bee68c7fcae 100644 --- a/bitnami/memcached/values.yaml +++ b/bitnami/memcached/values.yaml @@ -73,7 +73,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/memcached - tag: 1.6.21-debian-11-r84 + tag: 1.6.21-debian-11-r107 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -515,7 +515,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r63 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -560,7 +560,7 @@ metrics: image: registry: docker.io repository: bitnami/memcached-exporter - tag: 0.13.0-debian-11-r95 + tag: 0.13.0-debian-11-r120 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/metallb/Chart.lock b/bitnami/metallb/Chart.lock index dccf8a76aac4a9..be83adb3828e37 100644 --- a/bitnami/metallb/Chart.lock +++ b/bitnami/metallb/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-29T11:02:24.606057+02:00" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T19:21:21.556775555Z" diff --git a/bitnami/metallb/Chart.yaml b/bitnami/metallb/Chart.yaml index b9dc95e3e124f9..1ff1b86e32c5fe 100644 --- a/bitnami/metallb/Chart.yaml +++ b/bitnami/metallb/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: metallb-speaker - image: docker.io/bitnami/metallb-speaker:0.13.11-debian-11-r28 + image: docker.io/bitnami/metallb-speaker:0.13.11-debian-11-r31 - name: metallb-controller - image: docker.io/bitnami/metallb-controller:0.13.11-debian-11-r26 + image: docker.io/bitnami/metallb-controller:0.13.11-debian-11-r29 apiVersion: v2 appVersion: 0.13.11 dependencies: @@ -35,4 +35,4 @@ maintainers: name: metallb sources: - https://github.com/bitnami/charts/tree/main/bitnami/metallb -version: 4.7.6 +version: 4.7.9 diff --git a/bitnami/metallb/README.md b/bitnami/metallb/README.md index d82bd0cfe01214..bf88c1e34bbe32 100644 --- a/bitnami/metallb/README.md +++ b/bitnami/metallb/README.md @@ -93,7 +93,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------- | | `controller.image.registry` | MetalLB Controller image registry | `docker.io` | | `controller.image.repository` | MetalLB Controller image repository | `bitnami/metallb-controller` | -| `controller.image.tag` | MetalLB Controller image tag (immutable tags are recommended) | `0.13.11-debian-11-r26` | +| `controller.image.tag` | MetalLB Controller image tag (immutable tags are recommended) | `0.13.11-debian-11-r29` | | `controller.image.digest` | MetalLB Controller image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `controller.image.pullPolicy` | MetalLB Controller image pull policy | `IfNotPresent` | | `controller.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -189,7 +189,7 @@ The command removes all the Kubernetes components associated with the chart and | `speaker.enabled` | Whether to enable BGP speakers or not | `true` | | `speaker.image.registry` | MetalLB Speaker image registry | `docker.io` | | `speaker.image.repository` | MetalLB Speaker image repository | `bitnami/metallb-speaker` | -| `speaker.image.tag` | MetalLB Speaker image tag (immutable tags are recommended) | `0.13.11-debian-11-r28` | +| `speaker.image.tag` | MetalLB Speaker image tag (immutable tags are recommended) | `0.13.11-debian-11-r31` | | `speaker.image.digest` | MetalLB Speaker image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `speaker.image.pullPolicy` | MetalLB Speaker image pull policy | `IfNotPresent` | | `speaker.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/metallb/values.yaml b/bitnami/metallb/values.yaml index 522bf803b841fd..6c2721a10f004e 100644 --- a/bitnami/metallb/values.yaml +++ b/bitnami/metallb/values.yaml @@ -104,7 +104,7 @@ controller: image: registry: docker.io repository: bitnami/metallb-controller - tag: 0.13.11-debian-11-r26 + tag: 0.13.11-debian-11-r29 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -470,7 +470,7 @@ speaker: image: registry: docker.io repository: bitnami/metallb-speaker - tag: 0.13.11-debian-11-r28 + tag: 0.13.11-debian-11-r31 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/metrics-server/Chart.lock b/bitnami/metrics-server/Chart.lock index cf88e1a5dd3e4f..af7bd62c981984 100644 --- a/bitnami/metrics-server/Chart.lock +++ b/bitnami/metrics-server/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-04T02:54:01.391967693Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T19:41:37.621916636Z" diff --git a/bitnami/metrics-server/Chart.yaml b/bitnami/metrics-server/Chart.yaml index ab650e10270bdc..1271547c0b8637 100644 --- a/bitnami/metrics-server/Chart.yaml +++ b/bitnami/metrics-server/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: metrics-server - image: docker.io/bitnami/metrics-server:0.6.4-debian-11-r67 + image: docker.io/bitnami/metrics-server:0.6.4-debian-11-r70 apiVersion: v2 appVersion: 0.6.4 dependencies: @@ -28,4 +28,4 @@ maintainers: name: metrics-server sources: - https://github.com/bitnami/charts/tree/main/bitnami/metrics-server -version: 6.5.3 +version: 6.5.5 diff --git a/bitnami/metrics-server/README.md b/bitnami/metrics-server/README.md index 1026cd9581ea0f..c822fe976e02c1 100644 --- a/bitnami/metrics-server/README.md +++ b/bitnami/metrics-server/README.md @@ -79,7 +79,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------------ | | `image.registry` | Metrics Server image registry | `docker.io` | | `image.repository` | Metrics Server image repository | `bitnami/metrics-server` | -| `image.tag` | Metrics Server image tag (immutable tags are recommended) | `0.6.4-debian-11-r67` | +| `image.tag` | Metrics Server image tag (immutable tags are recommended) | `0.6.4-debian-11-r70` | | `image.digest` | Metrics Server image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Metrics Server image pull policy | `IfNotPresent` | | `image.pullSecrets` | Metrics Server image pull secrets | `[]` | diff --git a/bitnami/metrics-server/values.yaml b/bitnami/metrics-server/values.yaml index faa034df3a7d3a..535b584f4394de 100644 --- a/bitnami/metrics-server/values.yaml +++ b/bitnami/metrics-server/values.yaml @@ -69,7 +69,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/metrics-server - tag: 0.6.4-debian-11-r67 + tag: 0.6.4-debian-11-r70 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/milvus/Chart.lock b/bitnami/milvus/Chart.lock index 4ff3b12e6a3095..0ece88d050d604 100644 --- a/bitnami/milvus/Chart.lock +++ b/bitnami/milvus/Chart.lock @@ -1,15 +1,15 @@ dependencies: - name: etcd repository: oci://registry-1.docker.io/bitnamicharts - version: 9.5.0 + version: 9.5.3 - name: kafka repository: oci://registry-1.docker.io/bitnamicharts - version: 25.1.11 + version: 25.3.1 - name: minio repository: oci://registry-1.docker.io/bitnamicharts - version: 12.8.9 + version: 12.8.12 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:9c8f4da41a1cbbffcc7a23591e38fff613b6c6f3f61e2f292f82b6e77733aa17 -generated: "2023-09-25T13:09:20.396814425Z" + version: 2.13.2 +digest: sha256:2fd9f962ffc39c7d9e8cc8d05b9d37cee0fc9b3f884c192e5deb2cf277329960 +generated: "2023-10-09T21:27:00.395114034Z" diff --git a/bitnami/milvus/Chart.yaml b/bitnami/milvus/Chart.yaml index af1e35e294f237..e5db5c6a7b17c9 100644 --- a/bitnami/milvus/Chart.yaml +++ b/bitnami/milvus/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: attu - image: docker.io/bitnami/attu:2.3.1-debian-11-r8 + image: docker.io/bitnami/attu:2.3.1-debian-11-r20 - name: milvus - image: docker.io/bitnami/milvus:2.2.14-debian-11-r26 + image: docker.io/bitnami/milvus:2.2.14-debian-11-r35 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: pymilvus - image: docker.io/bitnami/pymilvus:2.3.1-debian-11-r0 + image: docker.io/bitnami/pymilvus:2.3.1-debian-11-r12 apiVersion: v2 appVersion: 2.2.14 dependencies: @@ -48,4 +48,4 @@ maintainers: name: milvus sources: - https://github.com/bitnami/charts/tree/main/bitnami/milvus -version: 3.1.5 +version: 3.1.6 diff --git a/bitnami/milvus/README.md b/bitnami/milvus/README.md index 66315f027cfd87..4b51484cdf8b5b 100644 --- a/bitnami/milvus/README.md +++ b/bitnami/milvus/README.md @@ -85,7 +85,7 @@ The command removes all the Kubernetes components associated with the chart and | ----------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | | `milvus.image.registry` | Milvus image registry | `docker.io` | | `milvus.image.repository` | Milvus image repository | `bitnami/milvus` | -| `milvus.image.tag` | Milvus image tag (immutable tags are recommended) | `2.2.14-debian-11-r26` | +| `milvus.image.tag` | Milvus image tag (immutable tags are recommended) | `2.2.14-debian-11-r35` | | `milvus.image.digest` | Milvus image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `milvus.image.pullPolicy` | Milvus image pull policy | `IfNotPresent` | | `milvus.image.pullSecrets` | Milvus image pull secrets | `[]` | @@ -103,7 +103,7 @@ The command removes all the Kubernetes components associated with the chart and | `initJob.forceRun` | Force the run of the credential job | `false` | | `initJob.image.registry` | PyMilvus image registry | `docker.io` | | `initJob.image.repository` | PyMilvus image repository | `bitnami/pymilvus` | -| `initJob.image.tag` | PyMilvus image tag (immutable tags are recommended) | `2.3.1-debian-11-r0` | +| `initJob.image.tag` | PyMilvus image tag (immutable tags are recommended) | `2.3.1-debian-11-r12` | | `initJob.image.digest` | PyMilvus image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `initJob.image.pullPolicy` | PyMilvus image pull policy | `IfNotPresent` | | `initJob.image.pullSecrets` | PyMilvus image pull secrets | `[]` | @@ -1246,85 +1246,85 @@ The command removes all the Kubernetes components associated with the chart and ### Attu Deployment Parameters -| Name | Description | Value | -| -------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | -------------------- | -| `attu.enabled` | Enable Attu deployment | `true` | -| `attu.image.registry` | Attu image registry | `docker.io` | -| `attu.image.repository` | Attu image repository | `bitnami/attu` | -| `attu.image.tag` | Attu image tag (immutable tags are recommended) | `2.3.1-debian-11-r8` | -| `attu.image.digest` | Attu image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `attu.image.pullPolicy` | Attu image pull policy | `IfNotPresent` | -| `attu.image.pullSecrets` | Attu image pull secrets | `[]` | -| `attu.image.debug` | Enable debug mode | `false` | -| `attu.extraEnvVars` | Array with extra environment variables to add to attu nodes | `[]` | -| `attu.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for attu nodes | `""` | -| `attu.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for attu nodes | `""` | -| `attu.command` | Override default container command (useful when using custom images) | `[]` | -| `attu.args` | Override default container args (useful when using custom images) | `[]` | -| `attu.replicaCount` | Number of Attu replicas to deploy | `1` | -| `attu.containerPorts.http` | HTTP port for Attu | `3000` | -| `attu.livenessProbe.enabled` | Enable livenessProbe on Attu nodes | `true` | -| `attu.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` | -| `attu.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `attu.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | -| `attu.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` | -| `attu.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `attu.readinessProbe.enabled` | Enable readinessProbe on Attu nodes | `true` | -| `attu.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` | -| `attu.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | -| `attu.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` | -| `attu.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` | -| `attu.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `attu.startupProbe.enabled` | Enable startupProbe on Attu containers | `false` | -| `attu.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | -| `attu.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | -| `attu.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | -| `attu.startupProbe.failureThreshold` | Failure threshold for startupProbe | `5` | -| `attu.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `attu.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `attu.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `attu.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `attu.resources.limits` | The resources limits for the attu containers | `{}` | -| `attu.resources.requests` | The requested resources for the attu containers | `{}` | -| `attu.podSecurityContext.enabled` | Enabled Attu pods' Security Context | `true` | -| `attu.podSecurityContext.fsGroup` | Set Attu pod's Security Context fsGroup | `1001` | -| `attu.podSecurityContext.seccompProfile.type` | Set Attu container's Security Context seccomp profile | `RuntimeDefault` | -| `attu.containerSecurityContext.enabled` | Enabled Attu containers' Security Context | `true` | -| `attu.containerSecurityContext.runAsUser` | Set Attu containers' Security Context runAsUser | `1001` | -| `attu.containerSecurityContext.runAsNonRoot` | Set Attu containers' Security Context runAsNonRoot | `true` | -| `attu.containerSecurityContext.readOnlyRootFilesystem` | Set Attu containers' Security Context runAsNonRoot | `true` | -| `attu.containerSecurityContext.allowPrivilegeEscalation` | Set Attu container's privilege escalation | `false` | -| `attu.containerSecurityContext.capabilities.drop` | Set Attu container's Security Context runAsNonRoot | `["ALL"]` | -| `attu.lifecycleHooks` | for the attu container(s) to automate configuration before or after startup | `{}` | -| `attu.runtimeClassName` | Name of the runtime class to be used by pod(s) | `""` | -| `attu.hostAliases` | attu pods host aliases | `[]` | -| `attu.podLabels` | Extra labels for attu pods | `{}` | -| `attu.podAnnotations` | Annotations for attu pods | `{}` | -| `attu.podAffinityPreset` | Pod affinity preset. Ignored if `attu.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `attu.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `attu.affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `attu.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `attu.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `attu.nodeAffinityPreset.key` | Node label key to match. Ignored if `attu.affinity` is set | `""` | -| `attu.nodeAffinityPreset.values` | Node label values to match. Ignored if `attu.affinity` is set | `[]` | -| `attu.affinity` | Affinity for Attu pods assignment | `{}` | -| `attu.nodeSelector` | Node labels for Attu pods assignment | `{}` | -| `attu.tolerations` | Tolerations for Attu pods assignment | `[]` | -| `attu.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains | `[]` | -| `attu.priorityClassName` | Attu pods' priorityClassName | `""` | -| `attu.schedulerName` | Kubernetes pod scheduler registry | `""` | -| `attu.updateStrategy.type` | Attu statefulset strategy type | `RollingUpdate` | -| `attu.updateStrategy.rollingUpdate` | Attu statefulset rolling update configuration parameters | `{}` | -| `attu.extraVolumes` | Optionally specify extra list of additional volumes for the Attu pod(s) | `[]` | -| `attu.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Attu container(s) | `[]` | -| `attu.sidecars` | Add additional sidecar containers to the Attu pod(s) | `[]` | -| `attu.enableDefaultInitContainers` | Deploy default init containers | `true` | -| `attu.initContainers` | Add additional init containers to the Attu pod(s) | `[]` | -| `attu.serviceAccount.create` | Enable creation of ServiceAccount for Attu pods | `false` | -| `attu.serviceAccount.name` | The name of the ServiceAccount to use | `""` | -| `attu.serviceAccount.automountServiceAccountToken` | Allows auto mount of ServiceAccountToken on the serviceAccount created | `false` | -| `attu.serviceAccount.annotations` | Additional custom annotations for the ServiceAccount | `{}` | -| `attu.pdb.create` | Enable/disable a Pod Disruption Budget creation | `false` | -| `attu.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | -| `attu.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | +| Name | Description | Value | +| -------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | --------------------- | +| `attu.enabled` | Enable Attu deployment | `true` | +| `attu.image.registry` | Attu image registry | `docker.io` | +| `attu.image.repository` | Attu image repository | `bitnami/attu` | +| `attu.image.tag` | Attu image tag (immutable tags are recommended) | `2.3.1-debian-11-r20` | +| `attu.image.digest` | Attu image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `attu.image.pullPolicy` | Attu image pull policy | `IfNotPresent` | +| `attu.image.pullSecrets` | Attu image pull secrets | `[]` | +| `attu.image.debug` | Enable debug mode | `false` | +| `attu.extraEnvVars` | Array with extra environment variables to add to attu nodes | `[]` | +| `attu.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for attu nodes | `""` | +| `attu.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for attu nodes | `""` | +| `attu.command` | Override default container command (useful when using custom images) | `[]` | +| `attu.args` | Override default container args (useful when using custom images) | `[]` | +| `attu.replicaCount` | Number of Attu replicas to deploy | `1` | +| `attu.containerPorts.http` | HTTP port for Attu | `3000` | +| `attu.livenessProbe.enabled` | Enable livenessProbe on Attu nodes | `true` | +| `attu.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` | +| `attu.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `attu.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | +| `attu.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` | +| `attu.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `attu.readinessProbe.enabled` | Enable readinessProbe on Attu nodes | `true` | +| `attu.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` | +| `attu.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | +| `attu.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` | +| `attu.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` | +| `attu.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `attu.startupProbe.enabled` | Enable startupProbe on Attu containers | `false` | +| `attu.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | +| `attu.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | +| `attu.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | +| `attu.startupProbe.failureThreshold` | Failure threshold for startupProbe | `5` | +| `attu.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `attu.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `attu.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `attu.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `attu.resources.limits` | The resources limits for the attu containers | `{}` | +| `attu.resources.requests` | The requested resources for the attu containers | `{}` | +| `attu.podSecurityContext.enabled` | Enabled Attu pods' Security Context | `true` | +| `attu.podSecurityContext.fsGroup` | Set Attu pod's Security Context fsGroup | `1001` | +| `attu.podSecurityContext.seccompProfile.type` | Set Attu container's Security Context seccomp profile | `RuntimeDefault` | +| `attu.containerSecurityContext.enabled` | Enabled Attu containers' Security Context | `true` | +| `attu.containerSecurityContext.runAsUser` | Set Attu containers' Security Context runAsUser | `1001` | +| `attu.containerSecurityContext.runAsNonRoot` | Set Attu containers' Security Context runAsNonRoot | `true` | +| `attu.containerSecurityContext.readOnlyRootFilesystem` | Set Attu containers' Security Context runAsNonRoot | `true` | +| `attu.containerSecurityContext.allowPrivilegeEscalation` | Set Attu container's privilege escalation | `false` | +| `attu.containerSecurityContext.capabilities.drop` | Set Attu container's Security Context runAsNonRoot | `["ALL"]` | +| `attu.lifecycleHooks` | for the attu container(s) to automate configuration before or after startup | `{}` | +| `attu.runtimeClassName` | Name of the runtime class to be used by pod(s) | `""` | +| `attu.hostAliases` | attu pods host aliases | `[]` | +| `attu.podLabels` | Extra labels for attu pods | `{}` | +| `attu.podAnnotations` | Annotations for attu pods | `{}` | +| `attu.podAffinityPreset` | Pod affinity preset. Ignored if `attu.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `attu.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `attu.affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `attu.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `attu.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `attu.nodeAffinityPreset.key` | Node label key to match. Ignored if `attu.affinity` is set | `""` | +| `attu.nodeAffinityPreset.values` | Node label values to match. Ignored if `attu.affinity` is set | `[]` | +| `attu.affinity` | Affinity for Attu pods assignment | `{}` | +| `attu.nodeSelector` | Node labels for Attu pods assignment | `{}` | +| `attu.tolerations` | Tolerations for Attu pods assignment | `[]` | +| `attu.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains | `[]` | +| `attu.priorityClassName` | Attu pods' priorityClassName | `""` | +| `attu.schedulerName` | Kubernetes pod scheduler registry | `""` | +| `attu.updateStrategy.type` | Attu statefulset strategy type | `RollingUpdate` | +| `attu.updateStrategy.rollingUpdate` | Attu statefulset rolling update configuration parameters | `{}` | +| `attu.extraVolumes` | Optionally specify extra list of additional volumes for the Attu pod(s) | `[]` | +| `attu.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Attu container(s) | `[]` | +| `attu.sidecars` | Add additional sidecar containers to the Attu pod(s) | `[]` | +| `attu.enableDefaultInitContainers` | Deploy default init containers | `true` | +| `attu.initContainers` | Add additional init containers to the Attu pod(s) | `[]` | +| `attu.serviceAccount.create` | Enable creation of ServiceAccount for Attu pods | `false` | +| `attu.serviceAccount.name` | The name of the ServiceAccount to use | `""` | +| `attu.serviceAccount.automountServiceAccountToken` | Allows auto mount of ServiceAccountToken on the serviceAccount created | `false` | +| `attu.serviceAccount.annotations` | Additional custom annotations for the ServiceAccount | `{}` | +| `attu.pdb.create` | Enable/disable a Pod Disruption Budget creation | `false` | +| `attu.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | +| `attu.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | ### Attu Autoscaling configuration @@ -1385,7 +1385,7 @@ The command removes all the Kubernetes components associated with the chart and | ----------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------- | ------------------ | | `waitContainer.image.registry` | Init container wait-container image registry | `docker.io` | | `waitContainer.image.repository` | Init container wait-container image name | `bitnami/os-shell` | -| `waitContainer.image.tag` | Init container wait-container image tag | `11-debian-11-r77` | +| `waitContainer.image.tag` | Init container wait-container image tag | `11-debian-11-r89` | | `waitContainer.image.digest` | Init container wait-container image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `waitContainer.image.pullPolicy` | Init container wait-container image pull policy | `IfNotPresent` | | `waitContainer.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/milvus/values.yaml b/bitnami/milvus/values.yaml index 67fc5a1b351b5c..8085441a5b957c 100644 --- a/bitnami/milvus/values.yaml +++ b/bitnami/milvus/values.yaml @@ -76,7 +76,7 @@ milvus: image: registry: docker.io repository: bitnami/milvus - tag: 2.2.14-debian-11-r26 + tag: 2.2.14-debian-11-r35 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -255,7 +255,7 @@ initJob: image: registry: docker.io repository: bitnami/pymilvus - tag: 2.3.1-debian-11-r0 + tag: 2.3.1-debian-11-r12 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -4264,7 +4264,7 @@ attu: image: registry: docker.io repository: bitnami/attu - tag: 2.3.1-debian-11-r8 + tag: 2.3.1-debian-11-r20 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -4803,7 +4803,7 @@ waitContainer: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" ## @param waitContainer.image.pullPolicy Init container wait-container image pull policy ## diff --git a/bitnami/mongodb-sharded/Chart.lock b/bitnami/mongodb-sharded/Chart.lock index 90c943c8aa1637..4e556148c88f99 100644 --- a/bitnami/mongodb-sharded/Chart.lock +++ b/bitnami/mongodb-sharded/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-30T03:35:43.612350432Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T19:29:11.848981827Z" diff --git a/bitnami/mongodb-sharded/Chart.yaml b/bitnami/mongodb-sharded/Chart.yaml index 26d5e9b00416e5..2be6a0ba0c787a 100644 --- a/bitnami/mongodb-sharded/Chart.yaml +++ b/bitnami/mongodb-sharded/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: mongodb-exporter - image: docker.io/bitnami/mongodb-exporter:0.39.0-debian-11-r115 + image: docker.io/bitnami/mongodb-exporter:0.39.0-debian-11-r122 - name: mongodb-sharded - image: docker.io/bitnami/mongodb-sharded:7.0.2-debian-11-r0 + image: docker.io/bitnami/mongodb-sharded:7.0.2-debian-11-r5 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r83 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 7.0.2 dependencies: @@ -35,4 +35,4 @@ maintainers: name: mongodb-sharded sources: - https://github.com/bitnami/charts/tree/main/bitnami/mongodb-sharded -version: 7.0.1 +version: 7.0.3 diff --git a/bitnami/mongodb-sharded/README.md b/bitnami/mongodb-sharded/README.md index 1007c7b930c2d7..4333dc9f2e9eee 100644 --- a/bitnami/mongodb-sharded/README.md +++ b/bitnami/mongodb-sharded/README.md @@ -87,7 +87,7 @@ The command removes all the Kubernetes components associated with the chart and | ---------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------- | | `image.registry` | MongoDB(®) Sharded image registry | `docker.io` | | `image.repository` | MongoDB(®) Sharded Image name | `bitnami/mongodb-sharded` | -| `image.tag` | MongoDB(®) Sharded image tag (immutable tags are recommended) | `7.0.2-debian-11-r0` | +| `image.tag` | MongoDB(®) Sharded image tag (immutable tags are recommended) | `7.0.2-debian-11-r5` | | `image.digest` | MongoDB(®) Sharded image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | MongoDB(®) Sharded image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -125,7 +125,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r83` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | @@ -472,7 +472,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | MongoDB® exporter image registry | `docker.io` | | `metrics.image.repository` | MongoDB® exporter image name | `bitnami/mongodb-exporter` | -| `metrics.image.tag` | MongoDB® exporter image tag | `0.39.0-debian-11-r115` | +| `metrics.image.tag` | MongoDB® exporter image tag | `0.39.0-debian-11-r122` | | `metrics.image.digest` | MongoDB® exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | MongoDB® exporter image pull policy | `Always` | | `metrics.image.pullSecrets` | MongoDB® exporter image pull secrets | `[]` | diff --git a/bitnami/mongodb-sharded/values.yaml b/bitnami/mongodb-sharded/values.yaml index 6d4044bacab5cd..4f887afbb828af 100644 --- a/bitnami/mongodb-sharded/values.yaml +++ b/bitnami/mongodb-sharded/values.yaml @@ -79,7 +79,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/mongodb-sharded - tag: 7.0.2-debian-11-r0 + tag: 7.0.2-debian-11-r5 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -248,7 +248,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r83 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -1550,7 +1550,7 @@ metrics: image: registry: docker.io repository: bitnami/mongodb-exporter - tag: 0.39.0-debian-11-r115 + tag: 0.39.0-debian-11-r122 digest: "" pullPolicy: Always ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/mongodb/Chart.lock b/bitnami/mongodb/Chart.lock index 3fc2d720fe2021..ea08dc87ae53f4 100644 --- a/bitnami/mongodb/Chart.lock +++ b/bitnami/mongodb/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-29T11:02:58.010461+02:00" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T18:35:14.963926057Z" diff --git a/bitnami/mongodb/Chart.yaml b/bitnami/mongodb/Chart.yaml index aa818b3020bfd0..48a0deada7685b 100644 --- a/bitnami/mongodb/Chart.yaml +++ b/bitnami/mongodb/Chart.yaml @@ -6,15 +6,15 @@ annotations: licenses: Apache-2.0 images: | - name: kubectl - image: docker.io/bitnami/kubectl:1.28.2-debian-11-r8 + image: docker.io/bitnami/kubectl:1.28.2-debian-11-r14 - name: mongodb-exporter - image: docker.io/bitnami/mongodb-exporter:0.39.0-debian-11-r115 + image: docker.io/bitnami/mongodb-exporter:0.39.0-debian-11-r122 - name: mongodb - image: docker.io/bitnami/mongodb:7.0.2-debian-11-r0 + image: docker.io/bitnami/mongodb:7.0.2-debian-11-r5 - name: nginx - image: docker.io/bitnami/nginx:1.25.2-debian-11-r40 + image: docker.io/bitnami/nginx:1.25.2-debian-11-r46 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r83 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 7.0.2 dependencies: @@ -39,4 +39,4 @@ maintainers: name: mongodb sources: - https://github.com/bitnami/charts/tree/main/bitnami/mongodb -version: 14.0.5 +version: 14.0.9 diff --git a/bitnami/mongodb/README.md b/bitnami/mongodb/README.md index 3c664dff6e03dc..4d2590c0bef641 100644 --- a/bitnami/mongodb/README.md +++ b/bitnami/mongodb/README.md @@ -96,7 +96,7 @@ Refer to the [chart documentation for more information on each of these architec | -------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | MongoDB(®) image registry | `docker.io` | | `image.repository` | MongoDB(®) image registry | `bitnami/mongodb` | -| `image.tag` | MongoDB(®) image tag (immutable tags are recommended) | `7.0.2-debian-11-r0` | +| `image.tag` | MongoDB(®) image tag (immutable tags are recommended) | `7.0.2-debian-11-r5` | | `image.digest` | MongoDB(®) image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | MongoDB(®) image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -127,7 +127,7 @@ Refer to the [chart documentation for more information on each of these architec | `tls.arbiter.existingSecret` | Existing secret with TLS certificates (`tls.key`, `tls.crt`, `ca.crt`) or (`tls.key`, `tls.crt`) with tls.pemChainIncluded set as enabled. | `""` | | `tls.image.registry` | Init container TLS certs setup image registry | `docker.io` | | `tls.image.repository` | Init container TLS certs setup image repository | `bitnami/nginx` | -| `tls.image.tag` | Init container TLS certs setup image tag (immutable tags are recommended) | `1.25.2-debian-11-r40` | +| `tls.image.tag` | Init container TLS certs setup image tag (immutable tags are recommended) | `1.25.2-debian-11-r46` | | `tls.image.digest` | Init container TLS certs setup image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `tls.image.pullPolicy` | Init container TLS certs setup image pull policy | `IfNotPresent` | | `tls.image.pullSecrets` | Init container TLS certs specify docker-registry secret names as an array | `[]` | @@ -230,67 +230,67 @@ Refer to the [chart documentation for more information on each of these architec ### Traffic exposure parameters -| Name | Description | Value | -| ------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- | -| `service.nameOverride` | MongoDB(®) service name | `""` | -| `service.type` | Kubernetes Service type (only for standalone architecture) | `ClusterIP` | -| `service.portName` | MongoDB(®) service port name (only for standalone architecture) | `mongodb` | -| `service.ports.mongodb` | MongoDB(®) service port. | `27017` | -| `service.nodePorts.mongodb` | Port to bind to for NodePort and LoadBalancer service types (only for standalone architecture) | `""` | -| `service.clusterIP` | MongoDB(®) service cluster IP (only for standalone architecture) | `""` | -| `service.externalIPs` | Specify the externalIP value ClusterIP service type (only for standalone architecture) | `[]` | -| `service.loadBalancerIP` | loadBalancerIP for MongoDB(®) Service (only for standalone architecture) | `""` | -| `service.loadBalancerClass` | loadBalancerClass for MongoDB(®) Service (only for standalone architecture) | `""` | -| `service.loadBalancerSourceRanges` | Address(es) that are allowed when service is LoadBalancer (only for standalone architecture) | `[]` | -| `service.allocateLoadBalancerNodePorts` | Wheter to allocate node ports when service type is LoadBalancer | `true` | -| `service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` | -| `service.annotations` | Provide any additional annotations that may be required | `{}` | -| `service.externalTrafficPolicy` | service external traffic policy (only for standalone architecture) | `Local` | -| `service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | -| `service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | -| `service.headless.annotations` | Annotations for the headless service. | `{}` | -| `externalAccess.enabled` | Enable Kubernetes external cluster access to MongoDB(®) nodes (only for replicaset architecture) | `false` | -| `externalAccess.autoDiscovery.enabled` | Enable using an init container to auto-detect external IPs by querying the K8s API | `false` | -| `externalAccess.autoDiscovery.image.registry` | Init container auto-discovery image registry | `docker.io` | -| `externalAccess.autoDiscovery.image.repository` | Init container auto-discovery image repository | `bitnami/kubectl` | -| `externalAccess.autoDiscovery.image.tag` | Init container auto-discovery image tag (immutable tags are recommended) | `1.28.2-debian-11-r8` | -| `externalAccess.autoDiscovery.image.digest` | Init container auto-discovery image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `externalAccess.autoDiscovery.image.pullPolicy` | Init container auto-discovery image pull policy | `IfNotPresent` | -| `externalAccess.autoDiscovery.image.pullSecrets` | Init container auto-discovery image pull secrets | `[]` | -| `externalAccess.autoDiscovery.resources.limits` | Init container auto-discovery resource limits | `{}` | -| `externalAccess.autoDiscovery.resources.requests` | Init container auto-discovery resource requests | `{}` | -| `externalAccess.externalMaster.enabled` | Use external master for bootstrapping | `false` | -| `externalAccess.externalMaster.host` | External master host to bootstrap from | `""` | -| `externalAccess.externalMaster.port` | Port for MongoDB(®) service external master host | `27017` | -| `externalAccess.service.type` | Kubernetes Service type for external access. Allowed values: NodePort, LoadBalancer or ClusterIP | `LoadBalancer` | -| `externalAccess.service.portName` | MongoDB(®) port name used for external access when service type is LoadBalancer | `mongodb` | -| `externalAccess.service.ports.mongodb` | MongoDB(®) port used for external access when service type is LoadBalancer | `27017` | -| `externalAccess.service.loadBalancerIPs` | Array of load balancer IPs for MongoDB(®) nodes | `[]` | -| `externalAccess.service.loadBalancerClass` | loadBalancerClass when service type is LoadBalancer | `""` | -| `externalAccess.service.loadBalancerSourceRanges` | Address(es) that are allowed when service is LoadBalancer | `[]` | -| `externalAccess.service.allocateLoadBalancerNodePorts` | Wheter to allocate node ports when service type is LoadBalancer | `true` | -| `externalAccess.service.externalTrafficPolicy` | MongoDB(®) service external traffic policy | `Local` | -| `externalAccess.service.nodePorts` | Array of node ports used to configure MongoDB(®) advertised hostname when service type is NodePort | `[]` | -| `externalAccess.service.domain` | Domain or external IP used to configure MongoDB(®) advertised hostname when service type is NodePort | `""` | -| `externalAccess.service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` | -| `externalAccess.service.annotations` | Service annotations for external access | `{}` | -| `externalAccess.service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | -| `externalAccess.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | -| `externalAccess.hidden.enabled` | Enable Kubernetes external cluster access to MongoDB(®) hidden nodes | `false` | -| `externalAccess.hidden.service.type` | Kubernetes Service type for external access. Allowed values: NodePort or LoadBalancer | `LoadBalancer` | -| `externalAccess.hidden.service.portName` | MongoDB(®) port name used for external access when service type is LoadBalancer | `mongodb` | -| `externalAccess.hidden.service.ports.mongodb` | MongoDB(®) port used for external access when service type is LoadBalancer | `27017` | -| `externalAccess.hidden.service.loadBalancerIPs` | Array of load balancer IPs for MongoDB(®) nodes | `[]` | -| `externalAccess.hidden.service.loadBalancerClass` | loadBalancerClass when service type is LoadBalancer | `""` | -| `externalAccess.hidden.service.loadBalancerSourceRanges` | Address(es) that are allowed when service is LoadBalancer | `[]` | -| `externalAccess.hidden.service.allocateLoadBalancerNodePorts` | Wheter to allocate node ports when service type is LoadBalancer | `true` | -| `externalAccess.hidden.service.externalTrafficPolicy` | MongoDB(®) service external traffic policy | `Local` | -| `externalAccess.hidden.service.nodePorts` | Array of node ports used to configure MongoDB(®) advertised hostname when service type is NodePort. Length must be the same as replicaCount | `[]` | -| `externalAccess.hidden.service.domain` | Domain or external IP used to configure MongoDB(®) advertised hostname when service type is NodePort | `""` | -| `externalAccess.hidden.service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` | -| `externalAccess.hidden.service.annotations` | Service annotations for external access | `{}` | -| `externalAccess.hidden.service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | -| `externalAccess.hidden.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | +| Name | Description | Value | +| ------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | +| `service.nameOverride` | MongoDB(®) service name | `""` | +| `service.type` | Kubernetes Service type (only for standalone architecture) | `ClusterIP` | +| `service.portName` | MongoDB(®) service port name (only for standalone architecture) | `mongodb` | +| `service.ports.mongodb` | MongoDB(®) service port. | `27017` | +| `service.nodePorts.mongodb` | Port to bind to for NodePort and LoadBalancer service types (only for standalone architecture) | `""` | +| `service.clusterIP` | MongoDB(®) service cluster IP (only for standalone architecture) | `""` | +| `service.externalIPs` | Specify the externalIP value ClusterIP service type (only for standalone architecture) | `[]` | +| `service.loadBalancerIP` | loadBalancerIP for MongoDB(®) Service (only for standalone architecture) | `""` | +| `service.loadBalancerClass` | loadBalancerClass for MongoDB(®) Service (only for standalone architecture) | `""` | +| `service.loadBalancerSourceRanges` | Address(es) that are allowed when service is LoadBalancer (only for standalone architecture) | `[]` | +| `service.allocateLoadBalancerNodePorts` | Wheter to allocate node ports when service type is LoadBalancer | `true` | +| `service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` | +| `service.annotations` | Provide any additional annotations that may be required | `{}` | +| `service.externalTrafficPolicy` | service external traffic policy (only for standalone architecture) | `Local` | +| `service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | +| `service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | +| `service.headless.annotations` | Annotations for the headless service. | `{}` | +| `externalAccess.enabled` | Enable Kubernetes external cluster access to MongoDB(®) nodes (only for replicaset architecture) | `false` | +| `externalAccess.autoDiscovery.enabled` | Enable using an init container to auto-detect external IPs by querying the K8s API | `false` | +| `externalAccess.autoDiscovery.image.registry` | Init container auto-discovery image registry | `docker.io` | +| `externalAccess.autoDiscovery.image.repository` | Init container auto-discovery image repository | `bitnami/kubectl` | +| `externalAccess.autoDiscovery.image.tag` | Init container auto-discovery image tag (immutable tags are recommended) | `1.28.2-debian-11-r14` | +| `externalAccess.autoDiscovery.image.digest` | Init container auto-discovery image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `externalAccess.autoDiscovery.image.pullPolicy` | Init container auto-discovery image pull policy | `IfNotPresent` | +| `externalAccess.autoDiscovery.image.pullSecrets` | Init container auto-discovery image pull secrets | `[]` | +| `externalAccess.autoDiscovery.resources.limits` | Init container auto-discovery resource limits | `{}` | +| `externalAccess.autoDiscovery.resources.requests` | Init container auto-discovery resource requests | `{}` | +| `externalAccess.externalMaster.enabled` | Use external master for bootstrapping | `false` | +| `externalAccess.externalMaster.host` | External master host to bootstrap from | `""` | +| `externalAccess.externalMaster.port` | Port for MongoDB(®) service external master host | `27017` | +| `externalAccess.service.type` | Kubernetes Service type for external access. Allowed values: NodePort, LoadBalancer or ClusterIP | `LoadBalancer` | +| `externalAccess.service.portName` | MongoDB(®) port name used for external access when service type is LoadBalancer | `mongodb` | +| `externalAccess.service.ports.mongodb` | MongoDB(®) port used for external access when service type is LoadBalancer | `27017` | +| `externalAccess.service.loadBalancerIPs` | Array of load balancer IPs for MongoDB(®) nodes | `[]` | +| `externalAccess.service.loadBalancerClass` | loadBalancerClass when service type is LoadBalancer | `""` | +| `externalAccess.service.loadBalancerSourceRanges` | Address(es) that are allowed when service is LoadBalancer | `[]` | +| `externalAccess.service.allocateLoadBalancerNodePorts` | Wheter to allocate node ports when service type is LoadBalancer | `true` | +| `externalAccess.service.externalTrafficPolicy` | MongoDB(®) service external traffic policy | `Local` | +| `externalAccess.service.nodePorts` | Array of node ports used to configure MongoDB(®) advertised hostname when service type is NodePort | `[]` | +| `externalAccess.service.domain` | Domain or external IP used to configure MongoDB(®) advertised hostname when service type is NodePort | `""` | +| `externalAccess.service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` | +| `externalAccess.service.annotations` | Service annotations for external access | `{}` | +| `externalAccess.service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | +| `externalAccess.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | +| `externalAccess.hidden.enabled` | Enable Kubernetes external cluster access to MongoDB(®) hidden nodes | `false` | +| `externalAccess.hidden.service.type` | Kubernetes Service type for external access. Allowed values: NodePort or LoadBalancer | `LoadBalancer` | +| `externalAccess.hidden.service.portName` | MongoDB(®) port name used for external access when service type is LoadBalancer | `mongodb` | +| `externalAccess.hidden.service.ports.mongodb` | MongoDB(®) port used for external access when service type is LoadBalancer | `27017` | +| `externalAccess.hidden.service.loadBalancerIPs` | Array of load balancer IPs for MongoDB(®) nodes | `[]` | +| `externalAccess.hidden.service.loadBalancerClass` | loadBalancerClass when service type is LoadBalancer | `""` | +| `externalAccess.hidden.service.loadBalancerSourceRanges` | Address(es) that are allowed when service is LoadBalancer | `[]` | +| `externalAccess.hidden.service.allocateLoadBalancerNodePorts` | Wheter to allocate node ports when service type is LoadBalancer | `true` | +| `externalAccess.hidden.service.externalTrafficPolicy` | MongoDB(®) service external traffic policy | `Local` | +| `externalAccess.hidden.service.nodePorts` | Array of node ports used to configure MongoDB(®) advertised hostname when service type is NodePort. Length must be the same as replicaCount | `[]` | +| `externalAccess.hidden.service.domain` | Domain or external IP used to configure MongoDB(®) advertised hostname when service type is NodePort | `""` | +| `externalAccess.hidden.service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` | +| `externalAccess.hidden.service.annotations` | Service annotations for external access | `{}` | +| `externalAccess.hidden.service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | +| `externalAccess.hidden.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | ### Persistence parameters @@ -364,7 +364,7 @@ Refer to the [chart documentation for more information on each of these architec | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r83` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -553,7 +553,7 @@ Refer to the [chart documentation for more information on each of these architec | `metrics.enabled` | Enable using a sidecar Prometheus exporter | `false` | | `metrics.image.registry` | MongoDB(®) Prometheus exporter image registry | `docker.io` | | `metrics.image.repository` | MongoDB(®) Prometheus exporter image repository | `bitnami/mongodb-exporter` | -| `metrics.image.tag` | MongoDB(®) Prometheus exporter image tag (immutable tags are recommended) | `0.39.0-debian-11-r115` | +| `metrics.image.tag` | MongoDB(®) Prometheus exporter image tag (immutable tags are recommended) | `0.39.0-debian-11-r122` | | `metrics.image.digest` | MongoDB(®) image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | MongoDB(®) Prometheus exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/mongodb/values.yaml b/bitnami/mongodb/values.yaml index d46d008efc609c..fcaae5ba47dc2d 100644 --- a/bitnami/mongodb/values.yaml +++ b/bitnami/mongodb/values.yaml @@ -120,7 +120,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/mongodb - tag: 7.0.2-debian-11-r0 + tag: 7.0.2-debian-11-r5 digest: "" ## Specify a imagePullPolicy ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -244,7 +244,7 @@ tls: image: registry: docker.io repository: bitnami/nginx - tag: 1.25.2-debian-11-r40 + tag: 1.25.2-debian-11-r46 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -809,7 +809,7 @@ externalAccess: image: registry: docker.io repository: bitnami/kubectl - tag: 1.28.2-debian-11-r8 + tag: 1.28.2-debian-11-r14 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1289,7 +1289,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r83 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2070,7 +2070,7 @@ metrics: image: registry: docker.io repository: bitnami/mongodb-exporter - tag: 0.39.0-debian-11-r115 + tag: 0.39.0-debian-11-r122 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/moodle/Chart.lock b/bitnami/moodle/Chart.lock index aa1dba72dc2673..f1f6ed6f9be5d3 100644 --- a/bitnami/moodle/Chart.lock +++ b/bitnami/moodle/Chart.lock @@ -4,6 +4,6 @@ dependencies: version: 13.1.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:b145f91c2b65c5e6f6656b67d903893bdb7e02c8ca7c623ec4d718a674d73e40 -generated: "2023-09-29T21:59:35.409612784Z" + version: 2.13.2 +digest: sha256:c6e65edbabef9c25d383071a222186fd74d56e72e3f930d0b64273624470477d +generated: "2023-10-06T04:29:38.010515637Z" diff --git a/bitnami/moodle/Chart.yaml b/bitnami/moodle/Chart.yaml index a3461c2f493772..75a7e7632dddfd 100644 --- a/bitnami/moodle/Chart.yaml +++ b/bitnami/moodle/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r0 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: moodle - image: docker.io/bitnami/moodle:4.2.2-debian-11-r44 + image: docker.io/bitnami/moodle:4.2.2-debian-11-r49 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r83 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 4.2.2 dependencies: @@ -36,4 +36,4 @@ maintainers: name: moodle sources: - https://github.com/bitnami/charts/tree/main/bitnami/moodle -version: 17.1.3 +version: 17.1.5 diff --git a/bitnami/moodle/README.md b/bitnami/moodle/README.md index d4f1adbe75b855..8304adb8df82d7 100644 --- a/bitnami/moodle/README.md +++ b/bitnami/moodle/README.md @@ -80,7 +80,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------- | --------------------------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | Moodle image registry | `docker.io` | | `image.repository` | Moodle image repository | `bitnami/moodle` | -| `image.tag` | Moodle image tag (immutable tags are recommended) | `4.2.2-debian-11-r44` | +| `image.tag` | Moodle image tag (immutable tags are recommended) | `4.2.2-debian-11-r49` | | `image.digest` | Moodle image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Moodle image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -228,7 +228,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r83` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -242,7 +242,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r0` | +| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -276,7 +276,7 @@ The command removes all the Kubernetes components associated with the chart and | `certificates.extraEnvVarsSecret` | Secret with extra environment variables | `""` | | `certificates.image.registry` | Container sidecar registry | `docker.io` | | `certificates.image.repository` | Container sidecar image repository | `bitnami/os-shell` | -| `certificates.image.tag` | Container sidecar image tag (immutable tags are recommended) | `11-debian-11-r83` | +| `certificates.image.tag` | Container sidecar image tag (immutable tags are recommended) | `11-debian-11-r89` | | `certificates.image.digest` | Container sidecar image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `certificates.image.pullPolicy` | Container sidecar image pull policy | `IfNotPresent` | | `certificates.image.pullSecrets` | Container sidecar image pull secrets | `[]` | diff --git a/bitnami/moodle/values.yaml b/bitnami/moodle/values.yaml index b51bf45f459c4b..d1a0405364422d 100644 --- a/bitnami/moodle/values.yaml +++ b/bitnami/moodle/values.yaml @@ -55,7 +55,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/moodle - tag: 4.2.2-debian-11-r44 + tag: 4.2.2-debian-11-r49 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -649,7 +649,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r83 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -695,7 +695,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.2-debian-11-r0 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -812,7 +812,7 @@ certificates: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r83 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/multus-cni/Chart.lock b/bitnami/multus-cni/Chart.lock index fb0c2bd6b482d7..9fdd55d1b2c7fa 100644 --- a/bitnami/multus-cni/Chart.lock +++ b/bitnami/multus-cni/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-04T04:26:02.595372361Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T19:29:08.042423288Z" diff --git a/bitnami/multus-cni/Chart.yaml b/bitnami/multus-cni/Chart.yaml index 7044649d3cd2f8..0f33e69093c053 100644 --- a/bitnami/multus-cni/Chart.yaml +++ b/bitnami/multus-cni/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: multus-cni - image: docker.io/bitnami/multus-cni:4.0.2-debian-11-r124 + image: docker.io/bitnami/multus-cni:4.0.2-debian-11-r127 apiVersion: v2 appVersion: 4.0.2 dependencies: @@ -29,4 +29,4 @@ maintainers: name: multus-cni sources: - https://github.com/bitnami/charts/tree/main/bitnami/multus-cni -version: 1.1.3 +version: 1.1.5 diff --git a/bitnami/multus-cni/README.md b/bitnami/multus-cni/README.md index c756af657bc5ee..71aa1ebca7fd3c 100644 --- a/bitnami/multus-cni/README.md +++ b/bitnami/multus-cni/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------- | --------------------------------------------------------------------------------------------------------------------- | -------------------------- | | `image.registry` | Multus CNI image registry | `docker.io` | | `image.repository` | Multus CNI Image name | `bitnami/multus-cni` | -| `image.tag` | Multus CNI Image tag | `4.0.2-debian-11-r124` | +| `image.tag` | Multus CNI Image tag | `4.0.2-debian-11-r127` | | `image.digest` | Multus CNI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Multus CNI image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/multus-cni/values.yaml b/bitnami/multus-cni/values.yaml index 534566e6bb02df..3d572d5efd1dc9 100644 --- a/bitnami/multus-cni/values.yaml +++ b/bitnami/multus-cni/values.yaml @@ -77,7 +77,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/multus-cni - tag: 4.0.2-debian-11-r124 + tag: 4.0.2-debian-11-r127 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/mxnet/Chart.yaml b/bitnami/mxnet/Chart.yaml index f34e30fedf3181..35b203221ba37b 100644 --- a/bitnami/mxnet/Chart.yaml +++ b/bitnami/mxnet/Chart.yaml @@ -8,9 +8,9 @@ annotations: - name: git image: docker.io/bitnami/git:2.42.0-debian-11-r41 - name: mxnet - image: docker.io/bitnami/mxnet:1.9.1-debian-11-r408 + image: docker.io/bitnami/mxnet:1.9.1-debian-11-r409 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 1.9.1 dependencies: @@ -33,4 +33,4 @@ maintainers: name: mxnet sources: - https://github.com/bitnami/charts/tree/main/bitnami/mxnet -version: 3.4.4 +version: 3.4.6 diff --git a/bitnami/mxnet/README.md b/bitnami/mxnet/README.md index 9d2759ef836379..256906092b9aaf 100644 --- a/bitnami/mxnet/README.md +++ b/bitnami/mxnet/README.md @@ -83,7 +83,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------------- | ------------------------------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | Apache MXNet (Incubating) image registry | `docker.io` | | `image.repository` | Apache MXNet (Incubating) image repository | `bitnami/mxnet` | -| `image.tag` | Apache MXNet (Incubating) image tag (immutable tags are recommended) | `1.9.1-debian-11-r408` | +| `image.tag` | Apache MXNet (Incubating) image tag (immutable tags are recommended) | `1.9.1-debian-11-r409` | | `image.digest` | Apache MXNet (Incubating) image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Apache MXNet (Incubating) image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -377,7 +377,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/mxnet/values.yaml b/bitnami/mxnet/values.yaml index 6a109ef64f7f7a..d46e8ba1f52c29 100644 --- a/bitnami/mxnet/values.yaml +++ b/bitnami/mxnet/values.yaml @@ -76,7 +76,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/mxnet - tag: 1.9.1-debian-11-r408 + tag: 1.9.1-debian-11-r409 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1205,7 +1205,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/mysql/Chart.yaml b/bitnami/mysql/Chart.yaml index 678dec44d3720f..bab8fcdb719914 100644 --- a/bitnami/mysql/Chart.yaml +++ b/bitnami/mysql/Chart.yaml @@ -34,4 +34,4 @@ maintainers: name: mysql sources: - https://github.com/bitnami/charts/tree/main/bitnami/mysql -version: 9.12.3 +version: 9.12.4 diff --git a/bitnami/mysql/values.yaml b/bitnami/mysql/values.yaml index f2b6b17a7cbade..685fbbdeddd6ae 100644 --- a/bitnami/mysql/values.yaml +++ b/bitnami/mysql/values.yaml @@ -214,7 +214,6 @@ primary: pid-file=/opt/bitnami/mysql/tmp/mysqld.pid log-error=/opt/bitnami/mysql/logs/mysqld.log character-set-server=UTF8 - collation-server=utf8_general_ci slow_query_log=0 long_query_time=10.0 @@ -592,7 +591,6 @@ secondary: pid-file=/opt/bitnami/mysql/tmp/mysqld.pid log-error=/opt/bitnami/mysql/logs/mysqld.log character-set-server=UTF8 - collation-server=utf8_general_ci slow_query_log=0 long_query_time=10.0 diff --git a/bitnami/nats/Chart.lock b/bitnami/nats/Chart.lock index ed39855a963161..1145b6ce5df25d 100644 --- a/bitnami/nats/Chart.lock +++ b/bitnami/nats/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-04T05:49:21.476904757Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T19:52:31.885985902Z" diff --git a/bitnami/nats/Chart.yaml b/bitnami/nats/Chart.yaml index 73c8a94b693005..3fa7eb4bb79e4d 100644 --- a/bitnami/nats/Chart.yaml +++ b/bitnami/nats/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: nats-exporter - image: docker.io/bitnami/nats-exporter:0.12.0-debian-11-r94 + image: docker.io/bitnami/nats-exporter:0.12.0-debian-11-r97 - name: nats - image: docker.io/bitnami/nats:2.10.1-debian-11-r12 + image: docker.io/bitnami/nats:2.10.2-debian-11-r1 apiVersion: v2 -appVersion: 2.10.1 +appVersion: 2.10.2 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -31,4 +31,4 @@ maintainers: name: nats sources: - https://github.com/bitnami/charts/tree/main/bitnami/nats -version: 7.9.5 +version: 7.9.7 diff --git a/bitnami/nats/README.md b/bitnami/nats/README.md index 77f464c314180d..dea004b4e912a3 100644 --- a/bitnami/nats/README.md +++ b/bitnami/nats/README.md @@ -75,44 +75,44 @@ The command removes all the Kubernetes components associated with the chart and ### NATS parameters -| Name | Description | Value | -| ------------------------ | ----------------------------------------------------------------------------------------------------- | ---------------------- | -| `image.registry` | NATS image registry | `docker.io` | -| `image.repository` | NATS image repository | `bitnami/nats` | -| `image.tag` | NATS image tag (immutable tags are recommended) | `2.10.1-debian-11-r12` | -| `image.digest` | NATS image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | NATS image pull policy | `IfNotPresent` | -| `image.pullSecrets` | NATS image pull secrets | `[]` | -| `image.debug` | Enable NATS image debug mode | `false` | -| `auth.enabled` | Switch to enable/disable client authentication | `true` | -| `auth.user` | Client authentication user | `nats_client` | -| `auth.password` | Client authentication password | `""` | -| `auth.token` | Client authentication token | `""` | -| `auth.timeout` | Client authentication timeout (seconds) | `1` | -| `auth.usersCredentials` | Client authentication users credentials collection | `[]` | -| `auth.noAuthUser` | Client authentication username from auth.usersCredentials map to be used when no credentials provided | `""` | -| `cluster.name` | Cluster name | `nats` | -| `cluster.connectRetries` | Configure number of connect retries for implicit routes, otherwise leave blank | `""` | -| `cluster.auth.enabled` | Switch to enable/disable cluster authentication | `true` | -| `cluster.auth.user` | Cluster authentication user | `nats_cluster` | -| `cluster.auth.password` | Cluster authentication password | `""` | -| `jetstream.enabled` | Switch to enable/disable JetStream | `false` | -| `jetstream.maxMemory` | Max memory usage for JetStream | `1G` | -| `debug.enabled` | Switch to enable/disable debug on logging | `false` | -| `debug.trace` | Switch to enable/disable trace debug level on logging | `false` | -| `debug.logtime` | Switch to enable/disable logtime on logging | `false` | -| `maxConnections` | Max. number of client connections | `""` | -| `maxControlLine` | Max. protocol control line | `""` | -| `maxPayload` | Max. payload | `""` | -| `writeDeadline` | Duration the server can block on a socket write to a client | `""` | -| `natsFilename` | Filename used by several NATS files (binary, configuration file, and pid file) | `nats-server` | -| `configuration` | Specify content for NATS configuration file (generated based on other parameters otherwise) | `""` | -| `existingSecret` | The name of an existing Secret with your custom configuration for NATS | `""` | -| `command` | Override default container command (useful when using custom images) | `[]` | -| `args` | Override default container args (useful when using custom images) | `[]` | -| `extraEnvVars` | Extra environment variables to be set on NATS container | `[]` | -| `extraEnvVarsCM` | ConfigMap with extra environment variables | `""` | -| `extraEnvVarsSecret` | Secret with extra environment variables | `""` | +| Name | Description | Value | +| ------------------------ | ----------------------------------------------------------------------------------------------------- | --------------------- | +| `image.registry` | NATS image registry | `docker.io` | +| `image.repository` | NATS image repository | `bitnami/nats` | +| `image.tag` | NATS image tag (immutable tags are recommended) | `2.10.2-debian-11-r1` | +| `image.digest` | NATS image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | NATS image pull policy | `IfNotPresent` | +| `image.pullSecrets` | NATS image pull secrets | `[]` | +| `image.debug` | Enable NATS image debug mode | `false` | +| `auth.enabled` | Switch to enable/disable client authentication | `true` | +| `auth.user` | Client authentication user | `nats_client` | +| `auth.password` | Client authentication password | `""` | +| `auth.token` | Client authentication token | `""` | +| `auth.timeout` | Client authentication timeout (seconds) | `1` | +| `auth.usersCredentials` | Client authentication users credentials collection | `[]` | +| `auth.noAuthUser` | Client authentication username from auth.usersCredentials map to be used when no credentials provided | `""` | +| `cluster.name` | Cluster name | `nats` | +| `cluster.connectRetries` | Configure number of connect retries for implicit routes, otherwise leave blank | `""` | +| `cluster.auth.enabled` | Switch to enable/disable cluster authentication | `true` | +| `cluster.auth.user` | Cluster authentication user | `nats_cluster` | +| `cluster.auth.password` | Cluster authentication password | `""` | +| `jetstream.enabled` | Switch to enable/disable JetStream | `false` | +| `jetstream.maxMemory` | Max memory usage for JetStream | `1G` | +| `debug.enabled` | Switch to enable/disable debug on logging | `false` | +| `debug.trace` | Switch to enable/disable trace debug level on logging | `false` | +| `debug.logtime` | Switch to enable/disable logtime on logging | `false` | +| `maxConnections` | Max. number of client connections | `""` | +| `maxControlLine` | Max. protocol control line | `""` | +| `maxPayload` | Max. payload | `""` | +| `writeDeadline` | Duration the server can block on a socket write to a client | `""` | +| `natsFilename` | Filename used by several NATS files (binary, configuration file, and pid file) | `nats-server` | +| `configuration` | Specify content for NATS configuration file (generated based on other parameters otherwise) | `""` | +| `existingSecret` | The name of an existing Secret with your custom configuration for NATS | `""` | +| `command` | Override default container command (useful when using custom images) | `[]` | +| `args` | Override default container args (useful when using custom images) | `[]` | +| `extraEnvVars` | Extra environment variables to be set on NATS container | `[]` | +| `extraEnvVarsCM` | ConfigMap with extra environment variables | `""` | +| `extraEnvVarsSecret` | Secret with extra environment variables | `""` | ### NATS deployment/statefulset parameters @@ -217,7 +217,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Enable Prometheus metrics via exporter side-car | `false` | | `metrics.image.registry` | Prometheus metrics exporter image registry | `docker.io` | | `metrics.image.repository` | Prometheus metrics exporter image repository | `bitnami/nats-exporter` | -| `metrics.image.tag` | Prometheus metrics exporter image tag (immutable tags are recommended) | `0.12.0-debian-11-r94` | +| `metrics.image.tag` | Prometheus metrics exporter image tag (immutable tags are recommended) | `0.12.0-debian-11-r97` | | `metrics.image.digest` | NATS Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Prometheus metrics image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Prometheus metrics image pull secrets | `[]` | diff --git a/bitnami/nats/values.yaml b/bitnami/nats/values.yaml index e7c587061d1f94..61e53daa968ecf 100644 --- a/bitnami/nats/values.yaml +++ b/bitnami/nats/values.yaml @@ -67,7 +67,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/nats - tag: 2.10.1-debian-11-r12 + tag: 2.10.2-debian-11-r1 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -700,7 +700,7 @@ metrics: image: registry: docker.io repository: bitnami/nats-exporter - tag: 0.12.0-debian-11-r94 + tag: 0.12.0-debian-11-r97 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/nginx/Chart.lock b/bitnami/nginx/Chart.lock index 8352f26e8fb632..6c9e6e1a253531 100644 --- a/bitnami/nginx/Chart.lock +++ b/bitnami/nginx/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:bee62139700f032539621dd38fa1d7285f277b91577c55ea26045254d33825ed -generated: "2023-09-25T23:41:41.588580252Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T20:20:43.008542294Z" diff --git a/bitnami/nginx/Chart.yaml b/bitnami/nginx/Chart.yaml index 856e8675ea9b7b..ee9e5fe192b8cb 100644 --- a/bitnami/nginx/Chart.yaml +++ b/bitnami/nginx/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: git - image: docker.io/bitnami/git:2.42.0-debian-11-r32 + image: docker.io/bitnami/git:2.42.0-debian-11-r41 - name: nginx-exporter - image: docker.io/bitnami/nginx-exporter:0.11.0-debian-11-r358 + image: docker.io/bitnami/nginx-exporter:0.11.0-debian-11-r368 - name: nginx - image: docker.io/bitnami/nginx:1.25.2-debian-11-r37 + image: docker.io/bitnami/nginx:1.25.2-debian-11-r46 apiVersion: v2 appVersion: 1.25.2 dependencies: @@ -34,4 +34,4 @@ maintainers: name: nginx sources: - https://github.com/bitnami/charts/tree/main/bitnami/nginx -version: 15.3.1 +version: 15.3.3 diff --git a/bitnami/nginx/README.md b/bitnami/nginx/README.md index 3370fe90259a49..723d1d5295d651 100644 --- a/bitnami/nginx/README.md +++ b/bitnami/nginx/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | NGINX image registry | `docker.io` | | `image.repository` | NGINX image repository | `bitnami/nginx` | -| `image.tag` | NGINX image tag (immutable tags are recommended) | `1.25.2-debian-11-r37` | +| `image.tag` | NGINX image tag (immutable tags are recommended) | `1.25.2-debian-11-r46` | | `image.digest` | NGINX image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | NGINX image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -176,7 +176,7 @@ The command removes all the Kubernetes components associated with the chart and | `cloneStaticSiteFromGit.enabled` | Get the server static content from a Git repository | `false` | | `cloneStaticSiteFromGit.image.registry` | Git image registry | `docker.io` | | `cloneStaticSiteFromGit.image.repository` | Git image repository | `bitnami/git` | -| `cloneStaticSiteFromGit.image.tag` | Git image tag (immutable tags are recommended) | `2.42.0-debian-11-r32` | +| `cloneStaticSiteFromGit.image.tag` | Git image tag (immutable tags are recommended) | `2.42.0-debian-11-r41` | | `cloneStaticSiteFromGit.image.digest` | Git image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `cloneStaticSiteFromGit.image.pullPolicy` | Git image pull policy | `IfNotPresent` | | `cloneStaticSiteFromGit.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -250,7 +250,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.port` | NGINX Container Status Port scraped by Prometheus Exporter | `""` | | `metrics.image.registry` | NGINX Prometheus exporter image registry | `docker.io` | | `metrics.image.repository` | NGINX Prometheus exporter image repository | `bitnami/nginx-exporter` | -| `metrics.image.tag` | NGINX Prometheus exporter image tag (immutable tags are recommended) | `0.11.0-debian-11-r358` | +| `metrics.image.tag` | NGINX Prometheus exporter image tag (immutable tags are recommended) | `0.11.0-debian-11-r368` | | `metrics.image.digest` | NGINX Prometheus exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | NGINX Prometheus exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/nginx/values.yaml b/bitnami/nginx/values.yaml index 79867aa05ae62d..3d6f7ee6bcaf22 100644 --- a/bitnami/nginx/values.yaml +++ b/bitnami/nginx/values.yaml @@ -74,7 +74,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/nginx - tag: 1.25.2-debian-11-r37 + tag: 1.25.2-debian-11-r46 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -428,7 +428,7 @@ cloneStaticSiteFromGit: image: registry: docker.io repository: bitnami/git - tag: 2.42.0-debian-11-r32 + tag: 2.42.0-debian-11-r41 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -791,7 +791,7 @@ metrics: image: registry: docker.io repository: bitnami/nginx-exporter - tag: 0.11.0-debian-11-r358 + tag: 0.11.0-debian-11-r368 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/node-exporter/Chart.lock b/bitnami/node-exporter/Chart.lock index cde6b5903ebd44..90feb2d96eeb69 100644 --- a/bitnami/node-exporter/Chart.lock +++ b/bitnami/node-exporter/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-04T06:28:56.825726413Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T20:20:20.041114614Z" diff --git a/bitnami/node-exporter/Chart.yaml b/bitnami/node-exporter/Chart.yaml index 37f2358248ca47..adfc90c33864cf 100644 --- a/bitnami/node-exporter/Chart.yaml +++ b/bitnami/node-exporter/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: node-exporter - image: docker.io/bitnami/node-exporter:1.6.1-debian-11-r75 + image: docker.io/bitnami/node-exporter:1.6.1-debian-11-r78 apiVersion: v2 appVersion: 1.6.1 dependencies: @@ -28,4 +28,4 @@ maintainers: name: node-exporter sources: - https://github.com/bitnami/charts/tree/main/bitnami/node-exporter -version: 3.8.1 +version: 3.8.4 diff --git a/bitnami/node-exporter/README.md b/bitnami/node-exporter/README.md index e21d488b036800..60e2dcaaaeecad 100644 --- a/bitnami/node-exporter/README.md +++ b/bitnami/node-exporter/README.md @@ -86,7 +86,7 @@ The command removes all the Kubernetes components associated with the chart and | `serviceAccount.annotations` | Annotations for service account. Evaluated as a template. Only used if `create` is `true`. | `{}` | | `image.registry` | Node Exporter image registry | `docker.io` | | `image.repository` | Node Exporter image repository | `bitnami/node-exporter` | -| `image.tag` | Node Exporter image tag (immutable tags are recommended) | `1.6.1-debian-11-r75` | +| `image.tag` | Node Exporter image tag (immutable tags are recommended) | `1.6.1-debian-11-r78` | | `image.digest` | Node Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Node Exporter image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/node-exporter/templates/psp-clusterrole.yaml b/bitnami/node-exporter/templates/psp-clusterrole.yaml index 228b8734faff09..1cd17cd2d9d371 100644 --- a/bitnami/node-exporter/templates/psp-clusterrole.yaml +++ b/bitnami/node-exporter/templates/psp-clusterrole.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.rbac.create .Values.rbac.pspEnabled }} kind: ClusterRole apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }} metadata: diff --git a/bitnami/node-exporter/templates/psp-clusterrolebinding.yaml b/bitnami/node-exporter/templates/psp-clusterrolebinding.yaml index aae49accb476e6..998bd6f660f53a 100644 --- a/bitnami/node-exporter/templates/psp-clusterrolebinding.yaml +++ b/bitnami/node-exporter/templates/psp-clusterrolebinding.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.rbac.create .Values.rbac.pspEnabled }} apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }} kind: ClusterRoleBinding metadata: diff --git a/bitnami/node-exporter/templates/psp.yaml b/bitnami/node-exporter/templates/psp.yaml index 2e2029ae269b57..917e78f9dc6910 100644 --- a/bitnami/node-exporter/templates/psp.yaml +++ b/bitnami/node-exporter/templates/psp.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.rbac.create .Values.rbac.pspEnabled }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.rbac.create .Values.rbac.pspEnabled }} apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: diff --git a/bitnami/node-exporter/values.yaml b/bitnami/node-exporter/values.yaml index 1b24c73984c4ad..548822269f444a 100644 --- a/bitnami/node-exporter/values.yaml +++ b/bitnami/node-exporter/values.yaml @@ -102,7 +102,7 @@ serviceAccount: image: registry: docker.io repository: bitnami/node-exporter - tag: 1.6.1-debian-11-r75 + tag: 1.6.1-debian-11-r78 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/odoo/Chart.lock b/bitnami/odoo/Chart.lock index fd54546b03e17d..a48b41de43cd18 100644 --- a/bitnami/odoo/Chart.lock +++ b/bitnami/odoo/Chart.lock @@ -4,6 +4,6 @@ dependencies: version: 13.1.0 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:4a9daa68c8ffafc670045f3da58cdad44d1985414ff89c6a2060c09d0941a348 -generated: "2023-10-05T09:51:40.278657949Z" + version: 2.13.2 +digest: sha256:8126a362b3ccdbe72e15215ba86e605d92e3641b23719d649be25de07afb3877 +generated: "2023-10-06T06:41:44.227235586Z" diff --git a/bitnami/odoo/Chart.yaml b/bitnami/odoo/Chart.yaml index 3fb589b953c63c..e7d41b43de5c39 100644 --- a/bitnami/odoo/Chart.yaml +++ b/bitnami/odoo/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: odoo - image: docker.io/bitnami/odoo:16.0.20230915-debian-11-r19 + image: docker.io/bitnami/odoo:16.0.20230915-debian-11-r20 apiVersion: v2 appVersion: 16.0.20230915 dependencies: @@ -34,4 +34,4 @@ maintainers: name: odoo sources: - https://github.com/bitnami/charts/tree/main/bitnami/odoo -version: 24.0.2 +version: 24.0.3 diff --git a/bitnami/odoo/README.md b/bitnami/odoo/README.md index fb6360c4646f06..7eb21bcc1d8fda 100644 --- a/bitnami/odoo/README.md +++ b/bitnami/odoo/README.md @@ -80,7 +80,7 @@ The command removes all the Kubernetes components associated with the chart and | `diagnosticMode.args` | Args to override all containers in the the statefulset | `["infinity"]` | | `image.registry` | Odoo image registry | `docker.io` | | `image.repository` | Odoo image repository | `bitnami/odoo` | -| `image.tag` | Odoo image tag (immutable tags are recommended) | `16.0.20230915-debian-11-r19` | +| `image.tag` | Odoo image tag (immutable tags are recommended) | `16.0.20230915-debian-11-r20` | | `image.digest` | Odoo image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Odoo image pull policy | `IfNotPresent` | | `image.pullSecrets` | Odoo image pull secrets | `[]` | diff --git a/bitnami/odoo/values.yaml b/bitnami/odoo/values.yaml index a71ae8686990bb..e68e15474af3f9 100644 --- a/bitnami/odoo/values.yaml +++ b/bitnami/odoo/values.yaml @@ -72,7 +72,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/odoo - tag: 16.0.20230915-debian-11-r19 + tag: 16.0.20230915-debian-11-r20 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/opencart/Chart.lock b/bitnami/opencart/Chart.lock index 5915dc417bd8e5..87e178f41e2001 100644 --- a/bitnami/opencart/Chart.lock +++ b/bitnami/opencart/Chart.lock @@ -4,6 +4,6 @@ dependencies: version: 13.1.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.1 -digest: sha256:69467d8dd7e86ae13efcd0c3a062ce856c88db1f4ffaf9b3e824435d336c59cc -generated: "2023-09-16T00:17:04.743464674Z" + version: 2.13.2 +digest: sha256:c6e65edbabef9c25d383071a222186fd74d56e72e3f930d0b64273624470477d +generated: "2023-10-06T04:33:32.209845457Z" diff --git a/bitnami/opencart/Chart.yaml b/bitnami/opencart/Chart.yaml index 0a25129d56136d..dc62d375141e6e 100644 --- a/bitnami/opencart/Chart.yaml +++ b/bitnami/opencart/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r47 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: opencart - image: docker.io/bitnami/opencart:4.0.2-3-debian-11-r0 + image: docker.io/bitnami/opencart:4.0.2-3-debian-11-r20 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r69 + image: docker.io/bitnami/os-shell:11-debian-11-r89 apiVersion: v2 appVersion: 4.0.2-3 dependencies: @@ -38,4 +38,4 @@ maintainers: name: opencart sources: - https://github.com/bitnami/charts/tree/main/bitnami/opencart -version: 15.1.2 +version: 15.1.5 diff --git a/bitnami/opencart/README.md b/bitnami/opencart/README.md index 767ef348280461..a5b203db898efe 100644 --- a/bitnami/opencart/README.md +++ b/bitnami/opencart/README.md @@ -77,93 +77,93 @@ The command removes all the Kubernetes components associated with the chart and ### OpenCart parameters -| Name | Description | Value | -| --------------------------------------- | -------------------------------------------------------------------------------------------------------- | ---------------------- | -| `image.registry` | OpenCart image registry | `docker.io` | -| `image.repository` | OpenCart image repository | `bitnami/opencart` | -| `image.tag` | OpenCart image tag (immutable tags are recommended) | `4.0.2-3-debian-11-r0` | -| `image.digest` | OpenCart image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | OpenCart image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `image.debug` | Specify if debug logs should be enabled | `false` | -| `hostAliases` | Deployment pod host aliases | `[]` | -| `replicaCount` | Number of replicas (requires ReadWriteMany PVC support) | `1` | -| `opencartSkipInstall` | Skip OpenCart installation wizard. Useful for migrations and restoring from SQL dump | `false` | -| `opencartHost` | OpenCart host to create application URLs | `""` | -| `opencartUsername` | User of the application | `user` | -| `opencartPassword` | Application password | `""` | -| `opencartEmail` | Admin email | `user@example.com` | -| `opencartEnableHttps` | Whether to use HTTPS by default, default is false. | `false` | -| `allowEmptyPassword` | Allow DB blank passwords | `true` | -| `command` | Override default container command (useful when using custom images) | `[]` | -| `args` | Override default container args (useful when using custom images) | `[]` | -| `updateStrategy.type` | Update strategy - only really applicable for deployments with RWO PVs attached | `RollingUpdate` | -| `priorityClassName` | OpenCart pods' priorityClassName | `""` | -| `schedulerName` | Name of the k8s scheduler (other than default) | `""` | -| `topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` | -| `extraEnvVars` | An array to add extra env vars | `[]` | -| `extraEnvVarsCM` | ConfigMap with extra environment variables | `""` | -| `extraEnvVarsSecret` | Secret with extra environment variables | `""` | -| `extraVolumes` | Extra volumes to add to the deployment. Requires setting `extraVolumeMounts` | `[]` | -| `extraVolumeMounts` | Extra volume mounts to add to the container. Normally used with `extraVolumes`. | `[]` | -| `initContainers` | Extra init containers to add to the deployment | `[]` | -| `sidecars` | Extra sidecar containers to add to the deployment | `[]` | -| `tolerations` | Tolerations for pod assignment. Evaluated as a template. | `[]` | -| `existingSecret` | Name of a secret with the application password | `""` | -| `smtpHost` | SMTP host | `""` | -| `smtpPort` | SMTP port | `""` | -| `smtpUser` | SMTP user | `""` | -| `smtpPassword` | SMTP password | `""` | -| `smtpProtocol` | SMTP Protocol (options: ssl,tls, nil) | `""` | -| `containerPorts` | Container ports | `{}` | -| `persistence.enabled` | Enable persistence using PVC | `true` | -| `persistence.storageClass` | OpenCart Data Persistent Volume Storage Class | `""` | -| `persistence.accessModes` | PVC Access Mode for OpenCart volume | `["ReadWriteOnce"]` | -| `persistence.size` | PVC Storage Request for OpenCart volume | `8Gi` | -| `persistence.existingClaim` | An Existing PVC name | `""` | -| `persistence.hostPath` | Host mount path for OpenCart volume | `""` | -| `persistence.annotations` | Persistent Volume Claim annotations | `{}` | -| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | -| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | -| `affinity` | Affinity for pod assignment | `{}` | -| `nodeSelector` | Node labels for pod assignment | `{}` | -| `resources.requests` | The requested resources for the container | `{}` | -| `resources.limits` | The resources limits for the container | `{}` | -| `podSecurityContext.enabled` | Enable OpenCart pods' Security Context | `true` | -| `podSecurityContext.fsGroup` | OpenCart pods' group ID | `1001` | -| `containerSecurityContext.enabled` | Enable OpenCart containers' Security Context | `true` | -| `containerSecurityContext.runAsUser` | OpenCart containers' Security Context runAsUser | `1001` | -| `containerSecurityContext.runAsNonRoot` | OpenCart containers' Security Context runAsNonRoot | `true` | -| `startupProbe.enabled` | Enable startupProbe | `false` | -| `startupProbe.path` | Request path for startupProbe | `/administration/` | -| `startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `120` | -| `startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | -| `startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | -| `startupProbe.failureThreshold` | Failure threshold for startupProbe | `6` | -| `startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `livenessProbe.enabled` | Enable livenessProbe | `true` | -| `livenessProbe.path` | Request path for livenessProbe | `/administration/` | -| `livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `120` | -| `livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | -| `livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `readinessProbe.enabled` | Enable readinessProbe | `true` | -| `readinessProbe.path` | Request path for readinessProbe | `/administration/` | -| `readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | -| `readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `3` | -| `readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `customStartupProbe` | Override default startup probe | `{}` | -| `customLivenessProbe` | Override default liveness probe | `{}` | -| `customReadinessProbe` | Override default readiness probe | `{}` | -| `lifecycleHooks` | lifecycleHooks for the container to automate configuration before or after startup | `{}` | -| `podAnnotations` | Pod annotations | `{}` | -| `podLabels` | Add additional labels to the pod (evaluated as a template) | `{}` | +| Name | Description | Value | +| --------------------------------------- | -------------------------------------------------------------------------------------------------------- | ----------------------- | +| `image.registry` | OpenCart image registry | `docker.io` | +| `image.repository` | OpenCart image repository | `bitnami/opencart` | +| `image.tag` | OpenCart image tag (immutable tags are recommended) | `4.0.2-3-debian-11-r20` | +| `image.digest` | OpenCart image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | OpenCart image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `image.debug` | Specify if debug logs should be enabled | `false` | +| `hostAliases` | Deployment pod host aliases | `[]` | +| `replicaCount` | Number of replicas (requires ReadWriteMany PVC support) | `1` | +| `opencartSkipInstall` | Skip OpenCart installation wizard. Useful for migrations and restoring from SQL dump | `false` | +| `opencartHost` | OpenCart host to create application URLs | `""` | +| `opencartUsername` | User of the application | `user` | +| `opencartPassword` | Application password | `""` | +| `opencartEmail` | Admin email | `user@example.com` | +| `opencartEnableHttps` | Whether to use HTTPS by default, default is false. | `false` | +| `allowEmptyPassword` | Allow DB blank passwords | `true` | +| `command` | Override default container command (useful when using custom images) | `[]` | +| `args` | Override default container args (useful when using custom images) | `[]` | +| `updateStrategy.type` | Update strategy - only really applicable for deployments with RWO PVs attached | `RollingUpdate` | +| `priorityClassName` | OpenCart pods' priorityClassName | `""` | +| `schedulerName` | Name of the k8s scheduler (other than default) | `""` | +| `topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` | +| `extraEnvVars` | An array to add extra env vars | `[]` | +| `extraEnvVarsCM` | ConfigMap with extra environment variables | `""` | +| `extraEnvVarsSecret` | Secret with extra environment variables | `""` | +| `extraVolumes` | Extra volumes to add to the deployment. Requires setting `extraVolumeMounts` | `[]` | +| `extraVolumeMounts` | Extra volume mounts to add to the container. Normally used with `extraVolumes`. | `[]` | +| `initContainers` | Extra init containers to add to the deployment | `[]` | +| `sidecars` | Extra sidecar containers to add to the deployment | `[]` | +| `tolerations` | Tolerations for pod assignment. Evaluated as a template. | `[]` | +| `existingSecret` | Name of a secret with the application password | `""` | +| `smtpHost` | SMTP host | `""` | +| `smtpPort` | SMTP port | `""` | +| `smtpUser` | SMTP user | `""` | +| `smtpPassword` | SMTP password | `""` | +| `smtpProtocol` | SMTP Protocol (options: ssl,tls, nil) | `""` | +| `containerPorts` | Container ports | `{}` | +| `persistence.enabled` | Enable persistence using PVC | `true` | +| `persistence.storageClass` | OpenCart Data Persistent Volume Storage Class | `""` | +| `persistence.accessModes` | PVC Access Mode for OpenCart volume | `["ReadWriteOnce"]` | +| `persistence.size` | PVC Storage Request for OpenCart volume | `8Gi` | +| `persistence.existingClaim` | An Existing PVC name | `""` | +| `persistence.hostPath` | Host mount path for OpenCart volume | `""` | +| `persistence.annotations` | Persistent Volume Claim annotations | `{}` | +| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | +| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | +| `affinity` | Affinity for pod assignment | `{}` | +| `nodeSelector` | Node labels for pod assignment | `{}` | +| `resources.requests` | The requested resources for the container | `{}` | +| `resources.limits` | The resources limits for the container | `{}` | +| `podSecurityContext.enabled` | Enable OpenCart pods' Security Context | `true` | +| `podSecurityContext.fsGroup` | OpenCart pods' group ID | `1001` | +| `containerSecurityContext.enabled` | Enable OpenCart containers' Security Context | `true` | +| `containerSecurityContext.runAsUser` | OpenCart containers' Security Context runAsUser | `1001` | +| `containerSecurityContext.runAsNonRoot` | OpenCart containers' Security Context runAsNonRoot | `true` | +| `startupProbe.enabled` | Enable startupProbe | `false` | +| `startupProbe.path` | Request path for startupProbe | `/administration/` | +| `startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `120` | +| `startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | +| `startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | +| `startupProbe.failureThreshold` | Failure threshold for startupProbe | `6` | +| `startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `livenessProbe.enabled` | Enable livenessProbe | `true` | +| `livenessProbe.path` | Request path for livenessProbe | `/administration/` | +| `livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `120` | +| `livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | +| `livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `readinessProbe.enabled` | Enable readinessProbe | `true` | +| `readinessProbe.path` | Request path for readinessProbe | `/administration/` | +| `readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | +| `readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `3` | +| `readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `customStartupProbe` | Override default startup probe | `{}` | +| `customLivenessProbe` | Override default liveness probe | `{}` | +| `customReadinessProbe` | Override default readiness probe | `{}` | +| `lifecycleHooks` | lifecycleHooks for the container to automate configuration before or after startup | `{}` | +| `podAnnotations` | Pod annotations | `{}` | +| `podLabels` | Add additional labels to the pod (evaluated as a template) | `{}` | ### Traffic Exposure Parameters @@ -226,7 +226,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r69` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -240,7 +240,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.1-debian-11-r47` | +| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -265,7 +265,7 @@ The command removes all the Kubernetes components associated with the chart and | `certificates.extraEnvVarsSecret` | Secret with extra environment variables | `""` | | `certificates.image.registry` | Container sidecar registry | `docker.io` | | `certificates.image.repository` | Container sidecar image repository | `bitnami/os-shell` | -| `certificates.image.tag` | Container sidecar image tag (immutable tags are recommended) | `11-debian-11-r69` | +| `certificates.image.tag` | Container sidecar image tag (immutable tags are recommended) | `11-debian-11-r89` | | `certificates.image.digest` | Container sidecar image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `certificates.image.pullPolicy` | Container sidecar image pull policy | `IfNotPresent` | | `certificates.image.pullSecrets` | Container sidecar image pull secrets | `[]` | diff --git a/bitnami/opencart/values.yaml b/bitnami/opencart/values.yaml index 652b017a55045b..0a4cd74d0b714f 100644 --- a/bitnami/opencart/values.yaml +++ b/bitnami/opencart/values.yaml @@ -58,7 +58,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/opencart - tag: 4.0.2-3-debian-11-r0 + tag: 4.0.2-3-debian-11-r20 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -637,7 +637,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r69 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -687,7 +687,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.1-debian-11-r47 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -759,7 +759,7 @@ certificates: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r69 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/osclass/Chart.lock b/bitnami/osclass/Chart.lock index 49a2fc4ea01279..4822fc7512b28a 100644 --- a/bitnami/osclass/Chart.lock +++ b/bitnami/osclass/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.3 + version: 14.0.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts version: 2.13.2 -digest: sha256:008e350e93ff3bb403219371c0e2b9672fafbabd440b6893130182f3064f01ec -generated: "2023-10-06T05:25:03.103577327Z" +digest: sha256:18190c2ae6a970d4fe9907abff43c4a0fd4d5dad8dafa78f32bba41fe7411adf +generated: "2023-10-10T18:45:59.316560851+02:00" diff --git a/bitnami/osclass/Chart.yaml b/bitnami/osclass/Chart.yaml index 23be415c3ca141..dad35e510e70fc 100644 --- a/bitnami/osclass/Chart.yaml +++ b/bitnami/osclass/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r5 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: osclass - image: docker.io/bitnami/osclass:8.1.2-debian-11-r98 + image: docker.io/bitnami/osclass:8.1.2-debian-11-r99 apiVersion: v2 appVersion: 8.1.2 dependencies: @@ -19,7 +19,7 @@ dependencies: repository: oci://registry-1.docker.io/bitnamicharts tags: - osclass-database - version: 13.x.x + version: 14.x.x - name: common repository: oci://registry-1.docker.io/bitnamicharts tags: @@ -40,4 +40,4 @@ maintainers: name: osclass sources: - https://github.com/bitnami/charts/tree/main/bitnami/osclass -version: 16.1.3 +version: 17.0.0 diff --git a/bitnami/osclass/README.md b/bitnami/osclass/README.md index 7d3caf67ae92c5..4052b61de75778 100644 --- a/bitnami/osclass/README.md +++ b/bitnami/osclass/README.md @@ -80,7 +80,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------- | ------------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | Osclass image registry | `docker.io` | | `image.repository` | Osclass image repository | `bitnami/osclass` | -| `image.tag` | Osclass image tag (immutable tags are recommended) | `8.1.2-debian-11-r98` | +| `image.tag` | Osclass image tag (immutable tags are recommended) | `8.1.2-debian-11-r99` | | `image.digest` | Osclass image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Osclass image pull policy | `IfNotPresent` | | `image.pullSecrets` | Osclass image pull secrets | `[]` | @@ -151,7 +151,7 @@ The command removes all the Kubernetes components associated with the chart and | `certificates.extraEnvVarsSecret` | Secret with extra environment variables | `""` | | `certificates.image.registry` | Apache Exporter image registry | `docker.io` | | `certificates.image.repository` | Apache Exporter image repository | `bitnami/os-shell` | -| `certificates.image.tag` | Apache Exporter image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `certificates.image.tag` | Apache Exporter image tag (immutable tags are recommended) | `11-debian-11-r89` | | `certificates.image.digest` | Apache Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `certificates.image.pullPolicy` | Apache Exporter image pull policy | `IfNotPresent` | | `certificates.image.pullSecrets` | Apache Exporter image pull secrets | `[]` | @@ -247,7 +247,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | @@ -274,7 +274,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a sidecar prometheus exporter to expose metrics | `false` | | `metrics.image.registry` | Apache Exporter image registry | `docker.io` | | `metrics.image.repository` | Apache Exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache Exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r5` | +| `metrics.image.tag` | Apache Exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Apache Exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Apache Exporter image pull secrets | `[]` | @@ -411,6 +411,10 @@ Find more information about how to deal with common errors related to Bitnami's ## Upgrading +### To 17.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 16.0.0 This major release bumps the MariaDB version to 11.0. Follow the [upstream instructions](https://mariadb.com/kb/en/upgrading-from-mariadb-10-11-to-mariadb-11-0/) for upgrading from MariaDB 10.11 to 11.0. No major issues are expected during the upgrade. @@ -580,4 +584,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License. diff --git a/bitnami/osclass/values.yaml b/bitnami/osclass/values.yaml index 49dbf46af0a00f..4ca0bda3842e4a 100644 --- a/bitnami/osclass/values.yaml +++ b/bitnami/osclass/values.yaml @@ -58,7 +58,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/osclass - tag: 8.1.2-debian-11-r98 + tag: 8.1.2-debian-11-r99 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -259,7 +259,7 @@ certificates: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -707,7 +707,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -785,7 +785,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.2-debian-11-r5 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/parse/Chart.lock b/bitnami/parse/Chart.lock index 9469224e862d1b..b8aec9b3128acb 100644 --- a/bitnami/parse/Chart.lock +++ b/bitnami/parse/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: mongodb repository: oci://registry-1.docker.io/bitnamicharts - version: 14.0.0 + version: 14.0.7 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:37e7ec6c02dc5f67737399b48f79edeb10aab00c4d140a1cae11cfe004cad5a3 -generated: "2023-09-22T17:52:00.24423318+02:00" + version: 2.13.2 +digest: sha256:85375fa31f91b250109a7226ed775ff0e2997b150e157ceed6aef129472e64b3 +generated: "2023-10-09T21:35:22.772331788Z" diff --git a/bitnami/parse/Chart.yaml b/bitnami/parse/Chart.yaml index 1a199e4da270a0..e6168bb1dfa8d7 100644 --- a/bitnami/parse/Chart.yaml +++ b/bitnami/parse/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: parse-dashboard - image: docker.io/bitnami/parse-dashboard:5.2.0-debian-11-r8 + image: docker.io/bitnami/parse-dashboard:5.2.0-debian-11-r19 - name: parse - image: docker.io/bitnami/parse:6.3.0-debian-11-r8 + image: docker.io/bitnami/parse:6.3.0-debian-11-r19 apiVersion: v2 appVersion: 6.3.0 dependencies: @@ -38,4 +38,4 @@ maintainers: name: parse sources: - https://github.com/bitnami/charts/tree/main/bitnami/parse -version: 21.0.1 +version: 21.0.4 diff --git a/bitnami/parse/README.md b/bitnami/parse/README.md index aeafad7b4ed4b0..d8381df0c2fa93 100644 --- a/bitnami/parse/README.md +++ b/bitnami/parse/README.md @@ -78,87 +78,87 @@ The command removes all the Kubernetes components associated with the chart and ### Parse server parameters -| Name | Description | Value | -| -------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | -------------------- | -| `server.image.registry` | Parse image registry | `docker.io` | -| `server.image.repository` | Parse image repository | `bitnami/parse` | -| `server.image.tag` | Parse image tag (immutable tags are recommended) | `6.3.0-debian-11-r8` | -| `server.image.digest` | Parse image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `server.image.pullPolicy` | Image pull policy | `IfNotPresent` | -| `server.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `server.image.debug` | Enable image debug mode | `false` | -| `server.hostAliases` | Deployment pod host aliases | `[]` | -| `server.podLabels` | Extra labels for Parse pods | `{}` | -| `server.podAnnotations` | Annotations for Parse pods | `{}` | -| `server.podSecurityContext.enabled` | Enabled Parse Dashboard pods' Security Context | `true` | -| `server.podSecurityContext.fsGroup` | Set Parse Dashboard pod's Security Context fsGroup | `1001` | -| `server.containerSecurityContext.enabled` | Enabled Parse Dashboard containers' Security Context | `true` | -| `server.containerSecurityContext.runAsUser` | Set Parse Dashboard containers' Security Context runAsUser | `1001` | -| `server.containerSecurityContext.runAsNonRoot` | Set Parse Dashboard containers' Security Context runAsNonRoot | `true` | -| `server.containerSecurityContext.readOnlyRootFilesystem` | Set Parse Dashboard containers' Security Context runAsNonRoot | `false` | -| `server.command` | Override default container command (useful when using custom images) | `[]` | -| `server.args` | Override default container args (useful when using custom images) | `[]` | -| `server.containerPorts.http` | Parse server port | `1337` | -| `server.mountPath` | Parse server API mount path | `/parse` | -| `server.appId` | Parse server App ID | `myappID` | -| `server.masterKey` | Parse server Master Key | `""` | -| `server.extraEnvVars` | An array to add extra env vars | `[]` | -| `server.extraEnvVarsCM` | Name of a ConfigMap containing extra environment variables | `""` | -| `server.extraEnvVarsSecret` | Name of a Secret containing extra environment variables | `""` | -| `server.extraVolumes` | Optionally specify extra list of additional volumes for the Parse pod(s) | `[]` | -| `server.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Parse container(s) | `[]` | -| `server.sidecars` | Add additional sidecar containers to the Parse pod(s) | `[]` | -| `server.initContainers` | Add additional init containers to the Parse pod(s) | `[]` | -| `server.enableCloudCode` | Enable Parse Cloud Code | `false` | -| `server.cloudCodeScripts` | Cloud Code scripts | `{}` | -| `server.existingCloudCodeScriptsCM` | ConfigMap with Cloud Code scripts (Note: Overrides `cloudCodeScripts`). | `""` | -| `server.resources` | Parse Server pods' resource requests and limits | `{}` | -| `server.livenessProbe.enabled` | Enable livenessProbe | `true` | -| `server.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `120` | -| `server.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `server.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | -| `server.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` | -| `server.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `server.readinessProbe.enabled` | Enable readinessProbe | `true` | -| `server.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `server.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | -| `server.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` | -| `server.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` | -| `server.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `server.startupProbe.enabled` | Enable startupProbe on Parse containers | `false` | -| `server.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | -| `server.startupProbe.periodSeconds` | Period seconds for startupProbe | `3` | -| `server.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | -| `server.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `server.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `server.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `server.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `server.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `server.podAffinityPreset` | Parse server pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `server.podAntiAffinityPreset` | Parse server pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `server.nodeAffinityPreset.type` | Parse server node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `server.nodeAffinityPreset.key` | Parse server node label key to match Ignored if `affinity` is set. | `""` | -| `server.nodeAffinityPreset.values` | Parse server node label values to match. Ignored if `affinity` is set. | `[]` | -| `server.affinity` | Parse server affinity for pod assignment | `{}` | -| `server.nodeSelector` | Parse server node labels for pod assignment | `{}` | -| `server.tolerations` | Parse server tolerations for pod assignment | `[]` | -| `server.updateStrategy.type` | Parse statefulset strategy type | `RollingUpdate` | -| `server.priorityClassName` | Parse pods' priorityClassName | `""` | -| `server.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | -| `server.schedulerName` | Name of the k8s scheduler (other than default) for Parse pods | `""` | -| `server.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | -| `server.lifecycleHooks` | for the Parse container(s) to automate configuration before or after startup | `{}` | -| `server.service.type` | Kubernetes Service type | `LoadBalancer` | -| `server.service.ports.http` | Service HTTP port (Dashboard) | `1337` | -| `server.service.nodePorts.http` | Kubernetes HTTP node port | `""` | -| `server.service.clusterIP` | Service Cluster IP | `""` | -| `server.service.loadBalancerIP` | Service Load Balancer IP | `""` | -| `server.service.loadBalancerSourceRanges` | Service Load Balancer sources | `[]` | -| `server.service.externalTrafficPolicy` | Service external traffic policy | `Cluster` | -| `server.service.annotations` | Additional custom annotations for Service | `{}` | -| `server.service.extraPorts` | Extra ports to expose in Service (normally used with the `sidecars` value) | `[]` | -| `server.service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | -| `server.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | +| Name | Description | Value | +| -------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | --------------------- | +| `server.image.registry` | Parse image registry | `docker.io` | +| `server.image.repository` | Parse image repository | `bitnami/parse` | +| `server.image.tag` | Parse image tag (immutable tags are recommended) | `6.3.0-debian-11-r19` | +| `server.image.digest` | Parse image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `server.image.pullPolicy` | Image pull policy | `IfNotPresent` | +| `server.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `server.image.debug` | Enable image debug mode | `false` | +| `server.hostAliases` | Deployment pod host aliases | `[]` | +| `server.podLabels` | Extra labels for Parse pods | `{}` | +| `server.podAnnotations` | Annotations for Parse pods | `{}` | +| `server.podSecurityContext.enabled` | Enabled Parse Dashboard pods' Security Context | `true` | +| `server.podSecurityContext.fsGroup` | Set Parse Dashboard pod's Security Context fsGroup | `1001` | +| `server.containerSecurityContext.enabled` | Enabled Parse Dashboard containers' Security Context | `true` | +| `server.containerSecurityContext.runAsUser` | Set Parse Dashboard containers' Security Context runAsUser | `1001` | +| `server.containerSecurityContext.runAsNonRoot` | Set Parse Dashboard containers' Security Context runAsNonRoot | `true` | +| `server.containerSecurityContext.readOnlyRootFilesystem` | Set Parse Dashboard containers' Security Context runAsNonRoot | `false` | +| `server.command` | Override default container command (useful when using custom images) | `[]` | +| `server.args` | Override default container args (useful when using custom images) | `[]` | +| `server.containerPorts.http` | Parse server port | `1337` | +| `server.mountPath` | Parse server API mount path | `/parse` | +| `server.appId` | Parse server App ID | `myappID` | +| `server.masterKey` | Parse server Master Key | `""` | +| `server.extraEnvVars` | An array to add extra env vars | `[]` | +| `server.extraEnvVarsCM` | Name of a ConfigMap containing extra environment variables | `""` | +| `server.extraEnvVarsSecret` | Name of a Secret containing extra environment variables | `""` | +| `server.extraVolumes` | Optionally specify extra list of additional volumes for the Parse pod(s) | `[]` | +| `server.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Parse container(s) | `[]` | +| `server.sidecars` | Add additional sidecar containers to the Parse pod(s) | `[]` | +| `server.initContainers` | Add additional init containers to the Parse pod(s) | `[]` | +| `server.enableCloudCode` | Enable Parse Cloud Code | `false` | +| `server.cloudCodeScripts` | Cloud Code scripts | `{}` | +| `server.existingCloudCodeScriptsCM` | ConfigMap with Cloud Code scripts (Note: Overrides `cloudCodeScripts`). | `""` | +| `server.resources` | Parse Server pods' resource requests and limits | `{}` | +| `server.livenessProbe.enabled` | Enable livenessProbe | `true` | +| `server.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `120` | +| `server.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `server.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | +| `server.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` | +| `server.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `server.readinessProbe.enabled` | Enable readinessProbe | `true` | +| `server.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `server.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | +| `server.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` | +| `server.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` | +| `server.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `server.startupProbe.enabled` | Enable startupProbe on Parse containers | `false` | +| `server.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | +| `server.startupProbe.periodSeconds` | Period seconds for startupProbe | `3` | +| `server.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | +| `server.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `server.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `server.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `server.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `server.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `server.podAffinityPreset` | Parse server pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `server.podAntiAffinityPreset` | Parse server pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `server.nodeAffinityPreset.type` | Parse server node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `server.nodeAffinityPreset.key` | Parse server node label key to match Ignored if `affinity` is set. | `""` | +| `server.nodeAffinityPreset.values` | Parse server node label values to match. Ignored if `affinity` is set. | `[]` | +| `server.affinity` | Parse server affinity for pod assignment | `{}` | +| `server.nodeSelector` | Parse server node labels for pod assignment | `{}` | +| `server.tolerations` | Parse server tolerations for pod assignment | `[]` | +| `server.updateStrategy.type` | Parse statefulset strategy type | `RollingUpdate` | +| `server.priorityClassName` | Parse pods' priorityClassName | `""` | +| `server.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | +| `server.schedulerName` | Name of the k8s scheduler (other than default) for Parse pods | `""` | +| `server.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | +| `server.lifecycleHooks` | for the Parse container(s) to automate configuration before or after startup | `{}` | +| `server.service.type` | Kubernetes Service type | `LoadBalancer` | +| `server.service.ports.http` | Service HTTP port (Dashboard) | `1337` | +| `server.service.nodePorts.http` | Kubernetes HTTP node port | `""` | +| `server.service.clusterIP` | Service Cluster IP | `""` | +| `server.service.loadBalancerIP` | Service Load Balancer IP | `""` | +| `server.service.loadBalancerSourceRanges` | Service Load Balancer sources | `[]` | +| `server.service.externalTrafficPolicy` | Service external traffic policy | `Cluster` | +| `server.service.annotations` | Additional custom annotations for Service | `{}` | +| `server.service.extraPorts` | Extra ports to expose in Service (normally used with the `sidecars` value) | `[]` | +| `server.service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | +| `server.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | ### Dashboard Parameters @@ -167,7 +167,7 @@ The command removes all the Kubernetes components associated with the chart and | `dashboard.enabled` | Enable parse dashboard | `true` | | `dashboard.image.registry` | Dashboard image registry | `docker.io` | | `dashboard.image.repository` | Dashboard image repository | `bitnami/parse-dashboard` | -| `dashboard.image.tag` | Dashboard image tag (immutable tags are recommended) | `5.2.0-debian-11-r8` | +| `dashboard.image.tag` | Dashboard image tag (immutable tags are recommended) | `5.2.0-debian-11-r19` | | `dashboard.image.digest` | Dashboard image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `dashboard.image.pullPolicy` | image pull policy | `IfNotPresent` | | `dashboard.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -287,7 +287,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r77` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | diff --git a/bitnami/parse/values.yaml b/bitnami/parse/values.yaml index a3c40a1b918339..b123807fcddf5a 100644 --- a/bitnami/parse/values.yaml +++ b/bitnami/parse/values.yaml @@ -79,7 +79,7 @@ server: image: registry: docker.io repository: bitnami/parse - tag: 6.3.0-debian-11-r8 + tag: 6.3.0-debian-11-r19 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -414,7 +414,7 @@ dashboard: image: registry: docker.io repository: bitnami/parse-dashboard - tag: 5.2.0-debian-11-r8 + tag: 5.2.0-debian-11-r19 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -904,7 +904,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/phpbb/Chart.lock b/bitnami/phpbb/Chart.lock index 77f6c56f37ef85..6973bc18006893 100644 --- a/bitnami/phpbb/Chart.lock +++ b/bitnami/phpbb/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.3 + version: 14.0.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.1 -digest: sha256:69467d8dd7e86ae13efcd0c3a062ce856c88db1f4ffaf9b3e824435d336c59cc -generated: "2023-09-19T16:05:58.510701112Z" + version: 2.13.2 +digest: sha256:7617e01cd06d41043c65d55055935e5b34bfb7a55014a5c7d8da13a52b7f070c +generated: "2023-10-10T15:21:18.253279314+02:00" diff --git a/bitnami/phpbb/Chart.yaml b/bitnami/phpbb/Chart.yaml index 5c5431f8a09d72..ea68eeb5f92b46 100644 --- a/bitnami/phpbb/Chart.yaml +++ b/bitnami/phpbb/Chart.yaml @@ -6,18 +6,18 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r50 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r72 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: phpbb - image: docker.io/bitnami/phpbb:3.3.10-debian-11-r99 + image: docker.io/bitnami/phpbb:3.3.10-debian-11-r119 apiVersion: v2 appVersion: 3.3.10 dependencies: - condition: mariadb.enabled name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.x.x + version: 14.x.x - name: common repository: oci://registry-1.docker.io/bitnamicharts tags: @@ -37,4 +37,4 @@ maintainers: name: phpbb sources: - https://github.com/bitnami/charts/tree/main/bitnami/phpbb -version: 14.1.2 +version: 15.0.0 diff --git a/bitnami/phpbb/README.md b/bitnami/phpbb/README.md index 9ab3837b902454..1896203ee9d820 100644 --- a/bitnami/phpbb/README.md +++ b/bitnami/phpbb/README.md @@ -77,98 +77,98 @@ The command removes all the Kubernetes components associated with the chart and ### phpBB parameters -| Name | Description | Value | -| --------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | -| `image.registry` | phpBB image registry | `docker.io` | -| `image.repository` | phpBB image repository | `bitnami/phpbb` | -| `image.tag` | phpBB image tag (immutable tags are recommended) | `3.3.10-debian-11-r99` | -| `image.digest` | phpBB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | phpBB image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `image.debug` | Specify if debug logs should be enabled | `false` | -| `replicaCount` | Number of replicas (requires ReadWriteMany PVC support) | `1` | -| `phpbbSkipInstall` | Skip phpBB installation wizard. Useful for migrations and restoring from SQL dump | `no` | -| `phpbbDisableSessionValidation` | Disable session validation | `yes` | -| `phpbbUsername` | User of the application | `user` | -| `phpbbPassword` | Application password | `""` | -| `phpbbEmail` | Admin email | `user@example.com` | -| `allowEmptyPassword` | Allow DB blank passwords | `no` | -| `command` | Override default container command (useful when using custom images) | `[]` | -| `args` | Override default container args (useful when using custom images) | `[]` | -| `hostAliases` | Add deployment host aliases | `[]` | -| `updateStrategy.type` | Update strategy - only really applicable for deployments with RWO PVs attached | `RollingUpdate` | -| `extraEnvVars` | An array to add extra env vars | `[]` | -| `extraEnvVarsCM` | ConfigMap with extra environment variables | `""` | -| `extraEnvVarsSecret` | Secret with extra environment variables | `""` | -| `extraVolumes` | Extra volumes to add to the deployment. Requires setting `extraVolumeMounts` | `[]` | -| `extraVolumeMounts` | Extra volume mounts to add to the container. Normally used with `extraVolumes` | `[]` | -| `initContainers` | Extra init containers to add to the deployment | `[]` | -| `sidecars` | Extra sidecar containers to add to the deployment | `[]` | -| `tolerations` | Tolerations for pod assignment | `[]` | -| `existingSecret` | Use existing secret for the application password | `""` | -| `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | -| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | -| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r72` | -| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | -| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `volumePermissions.resources.limits` | The resources limits for the container | `{}` | -| `volumePermissions.resources.requests` | The requested resources for the container | `{}` | -| `smtpHost` | SMTP host | `""` | -| `smtpPort` | SMTP port | `""` | -| `smtpUser` | SMTP user | `""` | -| `smtpPassword` | SMTP password | `""` | -| `smtpProtocol` | SMTP Protocol (options: ssl,tls, nil) | `""` | -| `containerPorts` | Container ports | `{}` | -| `persistence.enabled` | Enable persistence using PVC | `true` | -| `persistence.storageClass` | Database data Persistent Volume Storage Class | `""` | -| `persistence.accessModes` | PVC Access Mode for phpBB volume | `["ReadWriteOnce"]` | -| `persistence.size` | PVC Storage Request for phpBB volume | `8Gi` | -| `persistence.existingClaim` | A manually managed Persistent Volume Claim | `""` | -| `persistence.hostPath` | Host mount path for phpBB volume | `""` | -| `persistence.annotations` | Persistent Volume Claim annotations | `{}` | -| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | -| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | -| `affinity` | Affinity for pod assignment. Evaluated as a template. | `{}` | -| `nodeSelector` | Node labels for pod assignment. Evaluated as a template. | `{}` | -| `resources.requests` | The requested resources for the container | `{}` | -| `resources.limits` | The resources limits for the container | `{}` | -| `podSecurityContext.enabled` | Enable phpBB pods' Security Context | `true` | -| `podSecurityContext.fsGroup` | phpBB pods' group ID | `1001` | -| `containerSecurityContext.enabled` | Enable phpBB containers' Security Context | `true` | -| `containerSecurityContext.runAsUser` | phpBB containers' Security Context runAsUser | `1001` | -| `containerSecurityContext.runAsNonRoot` | phpBB containers' Security Context runAsNonRoot | `true` | -| `startupProbe.enabled` | Enable startupProbe | `false` | -| `startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `600` | -| `startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | -| `startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | -| `startupProbe.failureThreshold` | Failure threshold for startupProbe | `6` | -| `startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `livenessProbe.enabled` | Enable livenessProbe | `true` | -| `livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `600` | -| `livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | -| `livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `readinessProbe.enabled` | Enable readinessProbe | `true` | -| `readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | -| `readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `3` | -| `readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `customStartupProbe` | Override default startup probe | `{}` | -| `customLivenessProbe` | Override default liveness probe | `{}` | -| `customReadinessProbe` | Override default readiness probe | `{}` | -| `priorityClassName` | Define the priority class name to use for the phpbb pods | `""` | -| `schedulerName` | Name of the k8s scheduler (other than default) | `""` | -| `topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` | -| `lifecycleHooks` | LifecycleHook to set additional configuration before or after startup | `{}` | -| `podAnnotations` | Pod annotations | `{}` | -| `podLabels` | Pod extra labels | `{}` | +| Name | Description | Value | +| --------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------- | +| `image.registry` | phpBB image registry | `docker.io` | +| `image.repository` | phpBB image repository | `bitnami/phpbb` | +| `image.tag` | phpBB image tag (immutable tags are recommended) | `3.3.10-debian-11-r119` | +| `image.digest` | phpBB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | phpBB image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `image.debug` | Specify if debug logs should be enabled | `false` | +| `replicaCount` | Number of replicas (requires ReadWriteMany PVC support) | `1` | +| `phpbbSkipInstall` | Skip phpBB installation wizard. Useful for migrations and restoring from SQL dump | `no` | +| `phpbbDisableSessionValidation` | Disable session validation | `yes` | +| `phpbbUsername` | User of the application | `user` | +| `phpbbPassword` | Application password | `""` | +| `phpbbEmail` | Admin email | `user@example.com` | +| `allowEmptyPassword` | Allow DB blank passwords | `no` | +| `command` | Override default container command (useful when using custom images) | `[]` | +| `args` | Override default container args (useful when using custom images) | `[]` | +| `hostAliases` | Add deployment host aliases | `[]` | +| `updateStrategy.type` | Update strategy - only really applicable for deployments with RWO PVs attached | `RollingUpdate` | +| `extraEnvVars` | An array to add extra env vars | `[]` | +| `extraEnvVarsCM` | ConfigMap with extra environment variables | `""` | +| `extraEnvVarsSecret` | Secret with extra environment variables | `""` | +| `extraVolumes` | Extra volumes to add to the deployment. Requires setting `extraVolumeMounts` | `[]` | +| `extraVolumeMounts` | Extra volume mounts to add to the container. Normally used with `extraVolumes` | `[]` | +| `initContainers` | Extra init containers to add to the deployment | `[]` | +| `sidecars` | Extra sidecar containers to add to the deployment | `[]` | +| `tolerations` | Tolerations for pod assignment | `[]` | +| `existingSecret` | Use existing secret for the application password | `""` | +| `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | +| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | +| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | +| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | +| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `volumePermissions.resources.limits` | The resources limits for the container | `{}` | +| `volumePermissions.resources.requests` | The requested resources for the container | `{}` | +| `smtpHost` | SMTP host | `""` | +| `smtpPort` | SMTP port | `""` | +| `smtpUser` | SMTP user | `""` | +| `smtpPassword` | SMTP password | `""` | +| `smtpProtocol` | SMTP Protocol (options: ssl,tls, nil) | `""` | +| `containerPorts` | Container ports | `{}` | +| `persistence.enabled` | Enable persistence using PVC | `true` | +| `persistence.storageClass` | Database data Persistent Volume Storage Class | `""` | +| `persistence.accessModes` | PVC Access Mode for phpBB volume | `["ReadWriteOnce"]` | +| `persistence.size` | PVC Storage Request for phpBB volume | `8Gi` | +| `persistence.existingClaim` | A manually managed Persistent Volume Claim | `""` | +| `persistence.hostPath` | Host mount path for phpBB volume | `""` | +| `persistence.annotations` | Persistent Volume Claim annotations | `{}` | +| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `nodeAffinityPreset.key` | Node label key to match Ignored if `affinity` is set. | `""` | +| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | +| `affinity` | Affinity for pod assignment. Evaluated as a template. | `{}` | +| `nodeSelector` | Node labels for pod assignment. Evaluated as a template. | `{}` | +| `resources.requests` | The requested resources for the container | `{}` | +| `resources.limits` | The resources limits for the container | `{}` | +| `podSecurityContext.enabled` | Enable phpBB pods' Security Context | `true` | +| `podSecurityContext.fsGroup` | phpBB pods' group ID | `1001` | +| `containerSecurityContext.enabled` | Enable phpBB containers' Security Context | `true` | +| `containerSecurityContext.runAsUser` | phpBB containers' Security Context runAsUser | `1001` | +| `containerSecurityContext.runAsNonRoot` | phpBB containers' Security Context runAsNonRoot | `true` | +| `startupProbe.enabled` | Enable startupProbe | `false` | +| `startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `600` | +| `startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | +| `startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | +| `startupProbe.failureThreshold` | Failure threshold for startupProbe | `6` | +| `startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `livenessProbe.enabled` | Enable livenessProbe | `true` | +| `livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `600` | +| `livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | +| `livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `readinessProbe.enabled` | Enable readinessProbe | `true` | +| `readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | +| `readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `3` | +| `readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `customStartupProbe` | Override default startup probe | `{}` | +| `customLivenessProbe` | Override default liveness probe | `{}` | +| `customReadinessProbe` | Override default readiness probe | `{}` | +| `priorityClassName` | Define the priority class name to use for the phpbb pods | `""` | +| `schedulerName` | Name of the k8s scheduler (other than default) | `""` | +| `topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` | +| `lifecycleHooks` | LifecycleHook to set additional configuration before or after startup | `{}` | +| `podAnnotations` | Pod annotations | `{}` | +| `podLabels` | Pod extra labels | `{}` | ### Traffic Exposure Parameters @@ -231,7 +231,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.1-debian-11-r50` | +| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -350,6 +350,10 @@ Find more information about how to deal with common errors related to Bitnami's ## Upgrading +### To 15.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 14.0.0 This major release bumps the MariaDB version to 11.0. Follow the [upstream instructions](https://mariadb.com/kb/en/upgrading-from-mariadb-10-11-to-mariadb-11-0/) for upgrading from MariaDB 10.11 to 11.0. No major issues are expected during the upgrade. @@ -493,4 +497,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License. diff --git a/bitnami/phpbb/values.yaml b/bitnami/phpbb/values.yaml index 3135d5deb5ab51..e4c8132119ffce 100644 --- a/bitnami/phpbb/values.yaml +++ b/bitnami/phpbb/values.yaml @@ -58,7 +58,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/phpbb - tag: 3.3.10-debian-11-r99 + tag: 3.3.10-debian-11-r119 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -174,7 +174,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r72 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -671,7 +671,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.1-debian-11-r50 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/phpmyadmin/Chart.lock b/bitnami/phpmyadmin/Chart.lock index d7d822a77c106c..0c83a4d98037f1 100644 --- a/bitnami/phpmyadmin/Chart.lock +++ b/bitnami/phpmyadmin/Chart.lock @@ -4,6 +4,6 @@ dependencies: version: 13.1.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.1 -digest: sha256:adaf86def4e5f75c0fbdf9a0b344c8854ed2378c9f96053344e7b6b671ce86fb -generated: "2023-09-19T16:06:02.467173142Z" + version: 2.13.2 +digest: sha256:8f8939d88d4d2367e1de3792a160b375daef99ed3318c9992512e7c9895f815a +generated: "2023-10-06T05:43:55.985949839Z" diff --git a/bitnami/phpmyadmin/Chart.yaml b/bitnami/phpmyadmin/Chart.yaml index 47feb9c164ea38..c21a2bc0653034 100644 --- a/bitnami/phpmyadmin/Chart.yaml +++ b/bitnami/phpmyadmin/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r50 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: phpmyadmin - image: docker.io/bitnami/phpmyadmin:5.2.1-debian-11-r103 + image: docker.io/bitnami/phpmyadmin:5.2.1-debian-11-r123 apiVersion: v2 appVersion: 5.2.1 dependencies: @@ -36,4 +36,4 @@ maintainers: name: phpmyadmin sources: - https://github.com/bitnami/charts/tree/main/bitnami/phpmyadmin -version: 12.1.2 +version: 12.1.4 diff --git a/bitnami/phpmyadmin/README.md b/bitnami/phpmyadmin/README.md index 24ec58113e6afe..98abc7c36fb2c5 100644 --- a/bitnami/phpmyadmin/README.md +++ b/bitnami/phpmyadmin/README.md @@ -78,7 +78,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------- | ---------------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | phpMyAdmin image registry | `docker.io` | | `image.repository` | phpMyAdmin image repository | `bitnami/phpmyadmin` | -| `image.tag` | phpMyAdmin image tag (immutable tags are recommended) | `5.2.1-debian-11-r103` | +| `image.tag` | phpMyAdmin image tag (immutable tags are recommended) | `5.2.1-debian-11-r123` | | `image.digest` | phpMyAdmin image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -215,7 +215,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.1-debian-11-r50` | +| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/phpmyadmin/values.yaml b/bitnami/phpmyadmin/values.yaml index 85d89daf1fd1ca..d65bc462ab74fa 100644 --- a/bitnami/phpmyadmin/values.yaml +++ b/bitnami/phpmyadmin/values.yaml @@ -56,7 +56,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/phpmyadmin - tag: 5.2.1-debian-11-r103 + tag: 5.2.1-debian-11-r123 digest: "" ## Specify a imagePullPolicy ## @@ -582,7 +582,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.1-debian-11-r50 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/pinniped/Chart.lock b/bitnami/pinniped/Chart.lock index 57b14c3dc5036b..0f810dbe790aec 100644 --- a/bitnami/pinniped/Chart.lock +++ b/bitnami/pinniped/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-10-04T06:57:33.185331579Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-10T08:41:09.778208973Z" diff --git a/bitnami/pinniped/Chart.yaml b/bitnami/pinniped/Chart.yaml index 8752263e5e0b36..a7519b32681ed5 100644 --- a/bitnami/pinniped/Chart.yaml +++ b/bitnami/pinniped/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: pinniped - image: docker.io/bitnami/pinniped:0.26.0-debian-11-r4 + image: docker.io/bitnami/pinniped:0.27.0-debian-11-r0 apiVersion: v2 -appVersion: 0.26.0 +appVersion: 0.27.0 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -27,4 +27,4 @@ maintainers: name: pinniped sources: - https://github.com/bitnami/charts/tree/main/bitnami/pinniped -version: 1.3.7 +version: 1.3.9 diff --git a/bitnami/pinniped/README.md b/bitnami/pinniped/README.md index 33f996b8f399b4..cafdf85ba5b886 100644 --- a/bitnami/pinniped/README.md +++ b/bitnami/pinniped/README.md @@ -77,7 +77,7 @@ The command removes all the Kubernetes components associated with the chart and | `extraDeploy` | Array of extra objects to deploy with the release | `[]` | | `image.registry` | Pinniped image registry | `docker.io` | | `image.repository` | Pinniped image repository | `bitnami/pinniped` | -| `image.tag` | Pinniped image tag (immutable tags are recommended) | `0.26.0-debian-11-r4` | +| `image.tag` | Pinniped image tag (immutable tags are recommended) | `0.27.0-debian-11-r0` | | `image.digest` | Pinniped image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Pinniped image pull policy | `IfNotPresent` | | `image.pullSecrets` | Pinniped image pull secrets | `[]` | diff --git a/bitnami/pinniped/values.yaml b/bitnami/pinniped/values.yaml index d04f14ea5d98f3..0150085e33a3b4 100644 --- a/bitnami/pinniped/values.yaml +++ b/bitnami/pinniped/values.yaml @@ -60,7 +60,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/pinniped - tag: 0.26.0-debian-11-r4 + tag: 0.27.0-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/postgresql-ha/Chart.lock b/bitnami/postgresql-ha/Chart.lock index 644e8045f627a4..21545cf4ec46e8 100644 --- a/bitnami/postgresql-ha/Chart.lock +++ b/bitnami/postgresql-ha/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:bee62139700f032539621dd38fa1d7285f277b91577c55ea26045254d33825ed -generated: "2023-09-25T15:00:42.712097744Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-10T09:09:39.017621487Z" diff --git a/bitnami/postgresql-ha/Chart.yaml b/bitnami/postgresql-ha/Chart.yaml index b817436795c505..010a17c4b8221a 100644 --- a/bitnami/postgresql-ha/Chart.yaml +++ b/bitnami/postgresql-ha/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r81 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: pgpool - image: docker.io/bitnami/pgpool:4.4.4-debian-11-r35 + image: docker.io/bitnami/pgpool:4.4.4-debian-11-r45 - name: postgres-exporter - image: docker.io/bitnami/postgres-exporter:0.14.0-debian-11-r5 + image: docker.io/bitnami/postgres-exporter:0.14.0-debian-11-r14 - name: postgresql-repmgr - image: docker.io/bitnami/postgresql-repmgr:16.0.0-debian-11-r2 + image: docker.io/bitnami/postgresql-repmgr:16.0.0-debian-11-r10 apiVersion: v2 appVersion: 16.0.0 dependencies: @@ -40,4 +40,4 @@ maintainers: name: postgresql-ha sources: - https://github.com/bitnami/charts/tree/main/bitnami/postgresql-ha -version: 12.0.0 +version: 12.0.3 diff --git a/bitnami/postgresql-ha/README.md b/bitnami/postgresql-ha/README.md index db05b97d17046e..b9b7ee82f2cf1d 100644 --- a/bitnami/postgresql-ha/README.md +++ b/bitnami/postgresql-ha/README.md @@ -94,7 +94,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | -------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------- | | `postgresql.image.registry` | PostgreSQL with Repmgr image registry | `docker.io` | | `postgresql.image.repository` | PostgreSQL with Repmgr image repository | `bitnami/postgresql-repmgr` | -| `postgresql.image.tag` | PostgreSQL with Repmgr image tag | `16.0.0-debian-11-r2` | +| `postgresql.image.tag` | PostgreSQL with Repmgr image tag | `16.0.0-debian-11-r10` | | `postgresql.image.digest` | PostgreSQL image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `postgresql.image.pullPolicy` | PostgreSQL with Repmgr image pull policy | `IfNotPresent` | | `postgresql.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -332,7 +332,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | ---------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- | | `pgpool.image.registry` | Pgpool image registry | `docker.io` | | `pgpool.image.repository` | Pgpool image repository | `bitnami/pgpool` | -| `pgpool.image.tag` | Pgpool image tag | `4.4.4-debian-11-r35` | +| `pgpool.image.tag` | Pgpool image tag | `4.4.4-debian-11-r45` | | `pgpool.image.digest` | Pgpool image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `pgpool.image.pullPolicy` | Pgpool image pull policy | `IfNotPresent` | | `pgpool.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -475,7 +475,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | `metrics.enabled` | Enable PostgreSQL Prometheus exporter | `false` | | `metrics.image.registry` | PostgreSQL Prometheus exporter image registry | `docker.io` | | `metrics.image.repository` | PostgreSQL Prometheus exporter image repository | `bitnami/postgres-exporter` | -| `metrics.image.tag` | PostgreSQL Prometheus exporter image tag | `0.14.0-debian-11-r5` | +| `metrics.image.tag` | PostgreSQL Prometheus exporter image tag | `0.14.0-debian-11-r14` | | `metrics.image.digest` | PostgreSQL Prometheus exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | PostgreSQL Prometheus exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -540,7 +540,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua | `volumePermissions.enabled` | Enable init container to adapt volume permissions | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r81` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -1016,4 +1016,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/postgresql-ha/templates/podsecuritypolicy.yaml b/bitnami/postgresql-ha/templates/podsecuritypolicy.yaml index a92a0f7459de2e..5f70d5d491e720 100644 --- a/bitnami/postgresql-ha/templates/podsecuritypolicy.yaml +++ b/bitnami/postgresql-ha/templates/podsecuritypolicy.yaml @@ -3,8 +3,7 @@ Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} -{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} -{{- if and $pspAvailable .Values.psp.create }} +{{- if and (include "common.capabilities.psp.supported" .) .Values.psp.create }} apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: diff --git a/bitnami/postgresql-ha/templates/postgresql/hooks-scripts-configmap.yaml b/bitnami/postgresql-ha/templates/postgresql/hooks-scripts-configmap.yaml index bea5c93e7fae93..97fe2724eec46e 100644 --- a/bitnami/postgresql-ha/templates/postgresql/hooks-scripts-configmap.yaml +++ b/bitnami/postgresql-ha/templates/postgresql/hooks-scripts-configmap.yaml @@ -109,8 +109,7 @@ data: TMP_FIRST_READY_FILE_TS="/tmp/ts-first-ready.mark" TMP_DELAY_APPLIED_FILE="/tmp/delay-applied.mark" - - DB_CHECK_RESULT=$(echo "SELECT 1" | postgresql_execute "$POSTGRESQL_DATABASE" "$POSTGRESQL_USERNAME" "$POSTGRESQL_PASSWORD" "-h 127.0.0.1 -tA" || "command failed") + DB_CHECK_RESULT=$(echo "SELECT 1" | postgresql_execute_print_output "$POSTGRESQL_DATABASE" "$POSTGRESQL_USERNAME" "$POSTGRESQL_PASSWORD" "-h 127.0.0.1 -tA" || echo "command failed") if [[ "$DB_CHECK_RESULT" == "1" ]]; then if [[ ! -f "$TMP_DELAY_APPLIED_FILE" ]]; then # DB up, but initial readiness delay not applied @@ -120,18 +119,18 @@ data: CURRENT_DELAY_SECONDS=$(($EPOCHSECONDS - $FIRST_READY_TS)) if (( $CURRENT_DELAY_SECONDS > $MIN_DELAY_AFTER_POD_READY_FIRST_TIME )); then # minimal delay of the first readiness state passed - report success and mark delay as applied - touch "$TMP_DELAY_APPLIED_FILE" + touch "$TMP_DELAY_APPLIED_FILE" else # minimal delay of the first readiness state not reached yet - report failure - return 1 + exit 1 fi else # first ever readiness test success - store timestamp and report failure echo $EPOCHSECONDS > $TMP_FIRST_READY_FILE_TS - return 1 + exit 1 fi fi else # DB test failed - report failure - return 1 + exit 1 fi diff --git a/bitnami/postgresql-ha/templates/role.yaml b/bitnami/postgresql-ha/templates/role.yaml index 258b752a576688..f82d9e43d1d6b9 100644 --- a/bitnami/postgresql-ha/templates/role.yaml +++ b/bitnami/postgresql-ha/templates/role.yaml @@ -14,8 +14,7 @@ metadata: annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }} {{- end }} rules: - {{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} - {{- if and $pspAvailable .Values.psp.create }} + {{- if and (include "common.capabilities.psp.supported" .) .Values.psp.create }} - apiGroups: ["extensions"] resources: ["podsecuritypolicies"] verbs: ["use"] diff --git a/bitnami/postgresql-ha/values.yaml b/bitnami/postgresql-ha/values.yaml index b1b5a3eaf32bed..59432bbc735f4e 100644 --- a/bitnami/postgresql-ha/values.yaml +++ b/bitnami/postgresql-ha/values.yaml @@ -104,7 +104,7 @@ postgresql: image: registry: docker.io repository: bitnami/postgresql-repmgr - tag: 16.0.0-debian-11-r2 + tag: 16.0.0-debian-11-r10 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -1043,7 +1043,7 @@ pgpool: image: registry: docker.io repository: bitnami/pgpool - tag: 4.4.4-debian-11-r35 + tag: 4.4.4-debian-11-r45 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -1562,7 +1562,7 @@ metrics: image: registry: docker.io repository: bitnami/postgres-exporter - tag: 0.14.0-debian-11-r5 + tag: 0.14.0-debian-11-r14 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -1811,7 +1811,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r81 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images diff --git a/bitnami/postgresql/Chart.lock b/bitnami/postgresql/Chart.lock index 7bc1b074947810..5a4cd408703625 100644 --- a/bitnami/postgresql/Chart.lock +++ b/bitnami/postgresql/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-29T11:05:05.28309+02:00" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-05T15:32:13.375699946Z" diff --git a/bitnami/postgresql/Chart.yaml b/bitnami/postgresql/Chart.yaml index fdf22ff124e4d0..0871feccf93567 100644 --- a/bitnami/postgresql/Chart.yaml +++ b/bitnami/postgresql/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: postgres-exporter - image: docker.io/bitnami/postgres-exporter:0.14.0-debian-11-r5 + image: docker.io/bitnami/postgres-exporter:0.14.0-debian-11-r14 - name: postgresql - image: docker.io/bitnami/postgresql:16.0.0-debian-11-r3 + image: docker.io/bitnami/postgresql:16.0.0-debian-11-r10 apiVersion: v2 appVersion: 16.0.0 dependencies: @@ -35,4 +35,4 @@ maintainers: name: postgresql sources: - https://github.com/bitnami/charts/tree/main/bitnami/postgresql -version: 13.1.0 +version: 13.1.3 diff --git a/bitnami/postgresql/README.md b/bitnami/postgresql/README.md index 526f49508235f4..b8228f83383da7 100644 --- a/bitnami/postgresql/README.md +++ b/bitnami/postgresql/README.md @@ -100,7 +100,7 @@ kubectl delete pvc -l release=my-release | ---------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------- | | `image.registry` | PostgreSQL image registry | `docker.io` | | `image.repository` | PostgreSQL image repository | `bitnami/postgresql` | -| `image.tag` | PostgreSQL image tag (immutable tags are recommended) | `16.0.0-debian-11-r3` | +| `image.tag` | PostgreSQL image tag (immutable tags are recommended) | `16.0.0-debian-11-r10` | | `image.digest` | PostgreSQL image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | PostgreSQL image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify image pull secrets | `[]` | @@ -430,7 +430,7 @@ kubectl delete pvc -l release=my-release | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | @@ -461,7 +461,7 @@ kubectl delete pvc -l release=my-release | `metrics.enabled` | Start a prometheus exporter | `false` | | `metrics.image.registry` | PostgreSQL Prometheus Exporter image registry | `docker.io` | | `metrics.image.repository` | PostgreSQL Prometheus Exporter image repository | `bitnami/postgres-exporter` | -| `metrics.image.tag` | PostgreSQL Prometheus Exporter image tag (immutable tags are recommended) | `0.14.0-debian-11-r5` | +| `metrics.image.tag` | PostgreSQL Prometheus Exporter image tag (immutable tags are recommended) | `0.14.0-debian-11-r14` | | `metrics.image.digest` | PostgreSQL image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | PostgreSQL Prometheus Exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify image pull secrets | `[]` | @@ -746,4 +746,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/postgresql/values.yaml b/bitnami/postgresql/values.yaml index 2e71e56b41cd3d..f0dc2ac537f68c 100644 --- a/bitnami/postgresql/values.yaml +++ b/bitnami/postgresql/values.yaml @@ -98,7 +98,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/postgresql - tag: 16.0.0-debian-11-r3 + tag: 16.0.0-debian-11-r10 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1299,7 +1299,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -1400,7 +1400,7 @@ metrics: image: registry: docker.io repository: bitnami/postgres-exporter - tag: 0.14.0-debian-11-r5 + tag: 0.14.0-debian-11-r14 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/prestashop/Chart.lock b/bitnami/prestashop/Chart.lock index 75375d11e4cfab..bd297435972e93 100644 --- a/bitnami/prestashop/Chart.lock +++ b/bitnami/prestashop/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.3 + version: 14.0.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:35c87c37da58b74eb3a2873de35e1397ef396cd691889d2ce81c7f903318f495 -generated: "2023-09-29T01:54:03.494839774Z" + version: 2.13.2 +digest: sha256:7617e01cd06d41043c65d55055935e5b34bfb7a55014a5c7d8da13a52b7f070c +generated: "2023-10-10T15:25:24.957423161+02:00" diff --git a/bitnami/prestashop/Chart.yaml b/bitnami/prestashop/Chart.yaml index 0fb83ca4368e1f..f3e8c115d70f60 100644 --- a/bitnami/prestashop/Chart.yaml +++ b/bitnami/prestashop/Chart.yaml @@ -6,18 +6,18 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r0 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r82 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: prestashop - image: docker.io/bitnami/prestashop:8.1.2-debian-11-r0 + image: docker.io/bitnami/prestashop:8.1.2-debian-11-r7 apiVersion: v2 appVersion: 8.1.2 dependencies: - condition: mariadb.enabled name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.x.x + version: 14.x.x - name: common repository: oci://registry-1.docker.io/bitnamicharts tags: @@ -38,4 +38,4 @@ maintainers: name: prestashop sources: - https://github.com/bitnami/charts/tree/main/bitnami/prestashop -version: 18.1.3 +version: 19.0.0 diff --git a/bitnami/prestashop/README.md b/bitnami/prestashop/README.md index fb90754dadc9db..7f38f8afb99ade 100644 --- a/bitnami/prestashop/README.md +++ b/bitnami/prestashop/README.md @@ -81,7 +81,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------- | ---------------------------------------------------------------------------------------------------------- | -------------------- | | `image.registry` | PrestaShop image registry | `docker.io` | | `image.repository` | PrestaShop image repository | `bitnami/prestashop` | -| `image.tag` | PrestaShop image tag (immutable tags are recommended) | `8.1.2-debian-11-r0` | +| `image.tag` | PrestaShop image tag (immutable tags are recommended) | `8.1.2-debian-11-r7` | | `image.digest` | PrestaShop image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | PrestaShop image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -232,7 +232,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r82` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -246,7 +246,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r0` | +| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -272,7 +272,7 @@ The command removes all the Kubernetes components associated with the chart and | `certificates.extraEnvVarsSecret` | Secret with extra environment variables | `""` | | `certificates.image.registry` | Container sidecar registry | `docker.io` | | `certificates.image.repository` | Container sidecar image repository | `bitnami/os-shell` | -| `certificates.image.tag` | Container sidecar image tag (immutable tags are recommended) | `11-debian-11-r82` | +| `certificates.image.tag` | Container sidecar image tag (immutable tags are recommended) | `11-debian-11-r89` | | `certificates.image.digest` | Container sidecar image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `certificates.image.pullPolicy` | Container sidecar image pull policy | `IfNotPresent` | | `certificates.image.pullSecrets` | Container sidecar image pull secrets | `[]` | @@ -421,6 +421,10 @@ Find more information about how to deal with common errors related to Bitnami's ## Upgrading +### To 19.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 18.0.0 This major release bumps the MariaDB version to 11.0. Follow the [upstream instructions](https://mariadb.com/kb/en/upgrading-from-mariadb-10-11-to-mariadb-11-0/) for upgrading from MariaDB 10.11 to 11.0. No major issues are expected during the upgrade. @@ -551,4 +555,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License. diff --git a/bitnami/prestashop/values.yaml b/bitnami/prestashop/values.yaml index 444476b1a183ae..b0c5a6fbd68d57 100644 --- a/bitnami/prestashop/values.yaml +++ b/bitnami/prestashop/values.yaml @@ -58,7 +58,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/prestashop - tag: 8.1.2-debian-11-r0 + tag: 8.1.2-debian-11-r7 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -649,7 +649,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r82 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -699,7 +699,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.2-debian-11-r0 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -781,7 +781,7 @@ certificates: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r82 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/prometheus/Chart.lock b/bitnami/prometheus/Chart.lock index 3b3bfd7eadf715..cd06e2d93e4833 100644 --- a/bitnami/prometheus/Chart.lock +++ b/bitnami/prometheus/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:eba5a1f693000386eaa87ad6e7864e5831cc41f32c07bfec159b5ff01fcd0ce5 -generated: "2023-10-04T19:41:19.351442574Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T20:43:19.622644129Z" diff --git a/bitnami/prometheus/Chart.yaml b/bitnami/prometheus/Chart.yaml index 31bc5f57fa4461..7e9cdad076e21f 100644 --- a/bitnami/prometheus/Chart.yaml +++ b/bitnami/prometheus/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: alertmanager - image: docker.io/bitnami/alertmanager:0.26.0-debian-11-r38 + image: docker.io/bitnami/alertmanager:0.26.0-debian-11-r43 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: prometheus - image: docker.io/bitnami/prometheus:2.47.1-debian-11-r0 + image: docker.io/bitnami/prometheus:2.47.1-debian-11-r2 - name: thanos - image: docker.io/bitnami/thanos:0.32.4-debian-11-r0 + image: docker.io/bitnami/thanos:0.32.4-debian-11-r2 apiVersion: v2 appVersion: 2.47.1 dependencies: @@ -35,4 +35,4 @@ sources: - https://github.com/bitnami/containers/tree/main/bitnami/prometheus - https://github.com/prometheus/prometheus - https://github.com/prometheus-community/helm-charts -version: 0.3.2 +version: 0.3.5 diff --git a/bitnami/prometheus/README.md b/bitnami/prometheus/README.md index 550879614aefeb..ed86f622bfc4b7 100644 --- a/bitnami/prometheus/README.md +++ b/bitnami/prometheus/README.md @@ -89,7 +89,7 @@ The command removes all the Kubernetes components associated with the chart and | `alertmanager.enabled` | Alertmanager enabled | `true` | | `alertmanager.image.registry` | Alertmanager image registry | `docker.io` | | `alertmanager.image.repository` | Alertmanager image repository | `bitnami/alertmanager` | -| `alertmanager.image.tag` | Alertmanager image tag (immutable tags are recommended) | `0.26.0-debian-11-r38` | +| `alertmanager.image.tag` | Alertmanager image tag (immutable tags are recommended) | `0.26.0-debian-11-r43` | | `alertmanager.image.digest` | Alertmanager image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `alertmanager.image.pullPolicy` | Alertmanager image pull policy | `IfNotPresent` | | `alertmanager.image.pullSecrets` | Alertmanager image pull secrets | `[]` | @@ -204,7 +204,7 @@ The command removes all the Kubernetes components associated with the chart and | ----------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------- | | `server.image.registry` | Prometheus image registry | `docker.io` | | `server.image.repository` | Prometheus image repository | `bitnami/prometheus` | -| `server.image.tag` | Prometheus image tag (immutable tags are recommended) | `2.47.1-debian-11-r0` | +| `server.image.tag` | Prometheus image tag (immutable tags are recommended) | `2.47.1-debian-11-r2` | | `server.image.digest` | Prometheus image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `server.image.pullPolicy` | Prometheus image pull policy | `IfNotPresent` | | `server.image.pullSecrets` | Prometheus image pull secrets | `[]` | @@ -291,7 +291,7 @@ The command removes all the Kubernetes components associated with the chart and | `server.thanos.create` | Create a Thanos sidecar container | `false` | | `server.thanos.image.registry` | Thanos image registry | `docker.io` | | `server.thanos.image.repository` | Thanos image name | `bitnami/thanos` | -| `server.thanos.image.tag` | Thanos image tag | `0.32.4-debian-11-r0` | +| `server.thanos.image.tag` | Thanos image tag | `0.32.4-debian-11-r2` | | `server.thanos.image.digest` | Thanos image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `server.thanos.image.pullPolicy` | Thanos image pull policy | `IfNotPresent` | | `server.thanos.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -395,7 +395,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | | `volumePermissions.resources.limits` | The resources limits for the init container | `{}` | diff --git a/bitnami/prometheus/values.yaml b/bitnami/prometheus/values.yaml index 0665707d4642ac..da52d21231ca00 100644 --- a/bitnami/prometheus/values.yaml +++ b/bitnami/prometheus/values.yaml @@ -84,7 +84,7 @@ alertmanager: image: registry: docker.io repository: bitnami/alertmanager - tag: 0.26.0-debian-11-r38 + tag: 0.26.0-debian-11-r43 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -584,7 +584,7 @@ server: image: registry: docker.io repository: bitnami/prometheus - tag: 2.47.1-debian-11-r0 + tag: 2.47.1-debian-11-r2 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -952,7 +952,7 @@ server: image: registry: docker.io repository: bitnami/thanos - tag: 0.32.4-debian-11-r0 + tag: 0.32.4-debian-11-r2 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -1494,7 +1494,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. diff --git a/bitnami/pytorch/Chart.lock b/bitnami/pytorch/Chart.lock index f7d4ca232b00d2..44e29d3b7aa1ed 100644 --- a/bitnami/pytorch/Chart.lock +++ b/bitnami/pytorch/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.11.1 -digest: sha256:ead8f26c76a9ec082f23629a358e8efd8f88d87aaed734bf41febcb8a7bc5d4c -generated: "2023-09-19T22:19:10.592854336Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T21:44:01.809464431Z" diff --git a/bitnami/pytorch/Chart.yaml b/bitnami/pytorch/Chart.yaml index 2539cce105adb6..5cf7e57000fff5 100644 --- a/bitnami/pytorch/Chart.yaml +++ b/bitnami/pytorch/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: git - image: docker.io/bitnami/git:2.42.0-debian-11-r26 + image: docker.io/bitnami/git:2.42.0-debian-11-r41 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r72 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: pytorch - image: docker.io/bitnami/pytorch:2.0.1-debian-11-r122 + image: docker.io/bitnami/pytorch:2.0.1-debian-11-r140 apiVersion: v2 appVersion: 2.0.1 dependencies: @@ -33,4 +33,4 @@ maintainers: name: pytorch sources: - https://github.com/bitnami/charts/tree/main/bitnami/pytorch -version: 3.3.2 +version: 3.3.4 diff --git a/bitnami/pytorch/README.md b/bitnami/pytorch/README.md index c82720eb4f6057..8577c478958256 100644 --- a/bitnami/pytorch/README.md +++ b/bitnami/pytorch/README.md @@ -83,7 +83,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | ---------------------- | | `image.registry` | PyTorch image registry | `docker.io` | | `image.repository` | PyTorch image repository | `bitnami/pytorch` | -| `image.tag` | PyTorch image tag (immutable tags are recommended) | `2.0.1-debian-11-r122` | +| `image.tag` | PyTorch image tag (immutable tags are recommended) | `2.0.1-debian-11-r140` | | `image.digest` | PyTorch image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | PyTorch image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -178,14 +178,14 @@ The command removes all the Kubernetes components associated with the chart and | -------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | | `git.registry` | Git image registry | `docker.io` | | `git.repository` | Git image repository | `bitnami/git` | -| `git.tag` | Git image tag (immutable tags are recommended) | `2.42.0-debian-11-r26` | +| `git.tag` | Git image tag (immutable tags are recommended) | `2.42.0-debian-11-r41` | | `git.digest` | Git image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `git.pullPolicy` | Git image pull policy | `IfNotPresent` | | `git.pullSecrets` | Specify docker-registry secret names as an array | `[]` | | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r72` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/pytorch/values.yaml b/bitnami/pytorch/values.yaml index dee21dfa4fd319..374ef94a0843f0 100644 --- a/bitnami/pytorch/values.yaml +++ b/bitnami/pytorch/values.yaml @@ -71,7 +71,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/pytorch - tag: 2.0.1-debian-11-r122 + tag: 2.0.1-debian-11-r140 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -440,7 +440,7 @@ service: git: registry: docker.io repository: bitnami/git - tag: 2.42.0-debian-11-r26 + tag: 2.42.0-debian-11-r41 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -469,7 +469,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r72 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/rabbitmq-cluster-operator/Chart.lock b/bitnami/rabbitmq-cluster-operator/Chart.lock index d9c1671682021c..eab121efd23f8b 100644 --- a/bitnami/rabbitmq-cluster-operator/Chart.lock +++ b/bitnami/rabbitmq-cluster-operator/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:eba5a1f693000386eaa87ad6e7864e5831cc41f32c07bfec159b5ff01fcd0ce5 -generated: "2023-10-04T11:32:32.543952061Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T20:58:59.130371629Z" diff --git a/bitnami/rabbitmq-cluster-operator/Chart.yaml b/bitnami/rabbitmq-cluster-operator/Chart.yaml index cc3d8f66285d56..358aafaa0a5f14 100644 --- a/bitnami/rabbitmq-cluster-operator/Chart.yaml +++ b/bitnami/rabbitmq-cluster-operator/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: rabbitmq-cluster-operator - image: docker.io/bitnami/rabbitmq-cluster-operator:2.5.0-debian-11-r34 + image: docker.io/bitnami/rabbitmq-cluster-operator:2.5.0-debian-11-r37 - name: rabbitmq - image: docker.io/bitnami/rabbitmq:3.11.23-debian-11-r19 + image: docker.io/bitnami/rabbitmq:3.11.23-debian-11-r22 - name: rmq-default-credential-updater - image: docker.io/bitnami/rmq-default-credential-updater:1.0.2-debian-11-r55 + image: docker.io/bitnami/rmq-default-credential-updater:1.0.2-debian-11-r57 - name: rmq-messaging-topology-operator - image: docker.io/bitnami/rmq-messaging-topology-operator:1.12.0-debian-11-r55 + image: docker.io/bitnami/rmq-messaging-topology-operator:1.12.0-debian-11-r58 apiVersion: v2 appVersion: 2.5.0 dependencies: @@ -37,4 +37,4 @@ maintainers: name: rabbitmq-cluster-operator sources: - https://github.com/bitnami/charts/tree/main/bitnami/rabbitmq-cluster-operator -version: 3.8.4 +version: 3.8.7 diff --git a/bitnami/rabbitmq-cluster-operator/README.md b/bitnami/rabbitmq-cluster-operator/README.md index 0d907d75d57d47..de2505d25c94e9 100644 --- a/bitnami/rabbitmq-cluster-operator/README.md +++ b/bitnami/rabbitmq-cluster-operator/README.md @@ -159,17 +159,17 @@ This solution allows to easily deploy multiple RabbitMQ instances compared to th | ------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------- | | `rabbitmqImage.registry` | RabbitMQ Image registry | `docker.io` | | `rabbitmqImage.repository` | RabbitMQ Image repository | `bitnami/rabbitmq` | -| `rabbitmqImage.tag` | RabbitMQ Image tag (immutable tags are recommended) | `3.11.23-debian-11-r19` | +| `rabbitmqImage.tag` | RabbitMQ Image tag (immutable tags are recommended) | `3.11.23-debian-11-r22` | | `rabbitmqImage.digest` | RabbitMQ image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `rabbitmqImage.pullSecrets` | RabbitMQ Image pull secrets | `[]` | | `credentialUpdaterImage.registry` | RabbitMQ Default User Credential Updater image registry | `docker.io` | | `credentialUpdaterImage.repository` | RabbitMQ Default User Credential Updater image repository | `bitnami/rmq-default-credential-updater` | -| `credentialUpdaterImage.tag` | RabbitMQ Default User Credential Updater image tag (immutable tags are recommended) | `1.0.2-debian-11-r55` | +| `credentialUpdaterImage.tag` | RabbitMQ Default User Credential Updater image tag (immutable tags are recommended) | `1.0.2-debian-11-r57` | | `credentialUpdaterImage.digest` | RabbitMQ Default User Credential Updater image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `credentialUpdaterImage.pullSecrets` | RabbitMQ Default User Credential Updater image pull secrets | `[]` | | `clusterOperator.image.registry` | RabbitMQ Cluster Operator image registry | `docker.io` | | `clusterOperator.image.repository` | RabbitMQ Cluster Operator image repository | `bitnami/rabbitmq-cluster-operator` | -| `clusterOperator.image.tag` | RabbitMQ Cluster Operator image tag (immutable tags are recommended) | `2.5.0-debian-11-r34` | +| `clusterOperator.image.tag` | RabbitMQ Cluster Operator image tag (immutable tags are recommended) | `2.5.0-debian-11-r37` | | `clusterOperator.image.digest` | RabbitMQ Cluster Operator image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `clusterOperator.image.pullPolicy` | RabbitMQ Cluster Operator image pull policy | `IfNotPresent` | | `clusterOperator.image.pullSecrets` | RabbitMQ Cluster Operator image pull secrets | `[]` | @@ -274,7 +274,7 @@ This solution allows to easily deploy multiple RabbitMQ instances compared to th | `msgTopologyOperator.enabled` | Deploy RabbitMQ Messaging Topology Operator as part of the installation | `true` | | `msgTopologyOperator.image.registry` | RabbitMQ Messaging Topology Operator image registry | `docker.io` | | `msgTopologyOperator.image.repository` | RabbitMQ Messaging Topology Operator image repository | `bitnami/rmq-messaging-topology-operator` | -| `msgTopologyOperator.image.tag` | RabbitMQ Messaging Topology Operator image tag (immutable tags are recommended) | `1.12.0-debian-11-r55` | +| `msgTopologyOperator.image.tag` | RabbitMQ Messaging Topology Operator image tag (immutable tags are recommended) | `1.12.0-debian-11-r58` | | `msgTopologyOperator.image.digest` | RabbitMQ Messaging Topology Operator image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `msgTopologyOperator.image.pullPolicy` | RabbitMQ Messaging Topology Operator image pull policy | `IfNotPresent` | | `msgTopologyOperator.image.pullSecrets` | RabbitMQ Messaging Topology Operator image pull secrets | `[]` | diff --git a/bitnami/rabbitmq-cluster-operator/values.yaml b/bitnami/rabbitmq-cluster-operator/values.yaml index bca600a2fb257d..5352e2099e5c45 100644 --- a/bitnami/rabbitmq-cluster-operator/values.yaml +++ b/bitnami/rabbitmq-cluster-operator/values.yaml @@ -65,7 +65,7 @@ diagnosticMode: rabbitmqImage: registry: docker.io repository: bitnami/rabbitmq - tag: 3.11.23-debian-11-r19 + tag: 3.11.23-debian-11-r22 digest: "" ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. @@ -87,7 +87,7 @@ rabbitmqImage: credentialUpdaterImage: registry: docker.io repository: bitnami/rmq-default-credential-updater - tag: 1.0.2-debian-11-r55 + tag: 1.0.2-debian-11-r57 digest: "" ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. @@ -111,7 +111,7 @@ clusterOperator: image: registry: docker.io repository: bitnami/rabbitmq-cluster-operator - tag: 2.5.0-debian-11-r34 + tag: 2.5.0-debian-11-r37 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -516,7 +516,7 @@ msgTopologyOperator: image: registry: docker.io repository: bitnami/rmq-messaging-topology-operator - tag: 1.12.0-debian-11-r55 + tag: 1.12.0-debian-11-r58 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/rabbitmq/Chart.lock b/bitnami/rabbitmq/Chart.lock index 25f459494aba8a..a60f4431e90585 100644 --- a/bitnami/rabbitmq/Chart.lock +++ b/bitnami/rabbitmq/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:bee62139700f032539621dd38fa1d7285f277b91577c55ea26045254d33825ed -generated: "2023-09-25T18:52:43.185496227Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T21:49:18.408554258Z" diff --git a/bitnami/rabbitmq/Chart.yaml b/bitnami/rabbitmq/Chart.yaml index 8e07f7a93d650c..2bebce0313afb4 100644 --- a/bitnami/rabbitmq/Chart.yaml +++ b/bitnami/rabbitmq/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: rabbitmq - image: docker.io/bitnami/rabbitmq:3.12.6-debian-11-r4 + image: docker.io/bitnami/rabbitmq:3.12.6-debian-11-r11 apiVersion: v2 appVersion: 3.12.6 dependencies: @@ -30,4 +30,4 @@ maintainers: name: rabbitmq sources: - https://github.com/bitnami/charts/tree/main/bitnami/rabbitmq -version: 12.2.0 +version: 12.2.1 diff --git a/bitnami/rabbitmq/README.md b/bitnami/rabbitmq/README.md index 60080a4445a40c..870268b686f4be 100644 --- a/bitnami/rabbitmq/README.md +++ b/bitnami/rabbitmq/README.md @@ -62,15 +62,15 @@ The command removes all the Kubernetes components associated with the chart and ### RabbitMQ Image parameters -| Name | Description | Value | -| ------------------- | -------------------------------------------------------------------------------------------------------- | --------------------- | -| `image.registry` | RabbitMQ image registry | `docker.io` | -| `image.repository` | RabbitMQ image repository | `bitnami/rabbitmq` | -| `image.tag` | RabbitMQ image tag (immutable tags are recommended) | `3.12.6-debian-11-r4` | -| `image.digest` | RabbitMQ image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | RabbitMQ image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `image.debug` | Set to true if you would like to see extra information on logs | `false` | +| Name | Description | Value | +| ------------------- | -------------------------------------------------------------------------------------------------------- | ---------------------- | +| `image.registry` | RabbitMQ image registry | `docker.io` | +| `image.repository` | RabbitMQ image repository | `bitnami/rabbitmq` | +| `image.tag` | RabbitMQ image tag (immutable tags are recommended) | `3.12.6-debian-11-r11` | +| `image.digest` | RabbitMQ image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | RabbitMQ image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `image.debug` | Set to true if you would like to see extra information on logs | `false` | ### Common parameters @@ -358,7 +358,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r77` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -728,4 +728,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/rabbitmq/values.yaml b/bitnami/rabbitmq/values.yaml index 617fc54d5ca57d..150cb277bb1979 100644 --- a/bitnami/rabbitmq/values.yaml +++ b/bitnami/rabbitmq/values.yaml @@ -34,7 +34,7 @@ global: image: registry: docker.io repository: bitnami/rabbitmq - tag: 3.12.6-debian-11-r4 + tag: 3.12.6-debian-11-r11 digest: "" ## set to true if you would like to see extra information on logs ## It turns BASH and/or NAMI debugging in the image @@ -1393,7 +1393,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/redis-cluster/Chart.lock b/bitnami/redis-cluster/Chart.lock index 9db5e622220489..00a8f35bbebd5e 100644 --- a/bitnami/redis-cluster/Chart.lock +++ b/bitnami/redis-cluster/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-29T11:05:39.24661+02:00" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-07T00:23:54.69259049Z" diff --git a/bitnami/redis-cluster/Chart.yaml b/bitnami/redis-cluster/Chart.yaml index 03a727292c4faf..b1a5d009678f1e 100644 --- a/bitnami/redis-cluster/Chart.yaml +++ b/bitnami/redis-cluster/Chart.yaml @@ -6,30 +6,30 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r60 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: redis-cluster - image: docker.io/bitnami/redis-cluster:7.2.1-debian-11-r0 + image: docker.io/bitnami/redis-cluster:7.2.1-debian-11-r24 - name: redis-exporter - image: docker.io/bitnami/redis-exporter:1.54.0-debian-11-r0 + image: docker.io/bitnami/redis-exporter:1.54.0-debian-11-r27 apiVersion: v2 appVersion: 7.2.1 dependencies: - - name: common - repository: oci://registry-1.docker.io/bitnamicharts - tags: - - bitnami-common - version: 2.x.x +- name: common + repository: oci://registry-1.docker.io/bitnamicharts + tags: + - bitnami-common + version: 2.x.x description: Redis(R) is an open source, scalable, distributed in-memory cache for applications. It can be used to store and serve data in the form of strings, hashes, lists, sets and sorted sets. home: https://bitnami.com icon: https://bitnami.com/assets/stacks/redis/img/redis-stack-220x234.png keywords: - - redis - - keyvalue - - database +- redis +- keyvalue +- database maintainers: - - name: VMware, Inc. - url: https://github.com/bitnami/charts +- name: VMware, Inc. + url: https://github.com/bitnami/charts name: redis-cluster sources: - - https://github.com/bitnami/charts/tree/main/bitnami/redis-cluster -version: 9.0.7 +- https://github.com/bitnami/charts/tree/main/bitnami/redis-cluster +version: 9.0.11 diff --git a/bitnami/redis-cluster/README.md b/bitnami/redis-cluster/README.md index bdc7a58217d590..688a4d13f74e50 100644 --- a/bitnami/redis-cluster/README.md +++ b/bitnami/redis-cluster/README.md @@ -94,7 +94,7 @@ The command removes all the Kubernetes components associated with the chart and | `diagnosticMode.args` | Args to override all containers in the deployment | `["infinity"]` | | `image.registry` | Redis® cluster image registry | `docker.io` | | `image.repository` | Redis® cluster image repository | `bitnami/redis-cluster` | -| `image.tag` | Redis® cluster image tag (immutable tags are recommended) | `7.2.1-debian-11-r0` | +| `image.tag` | Redis® cluster image tag (immutable tags are recommended) | `7.2.1-debian-11-r24` | | `image.digest` | Redis® cluster image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Redis® cluster image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -161,7 +161,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the registry (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r60` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -267,22 +267,24 @@ The command removes all the Kubernetes components associated with the chart and ### Cluster management parameters -| Name | Description | Value | -| --------------------------------------------------------- | --------------------------------------------------------------------------------------------- | -------------- | -| `cluster.init` | Enable the initialization of the Redis® Cluster | `true` | -| `cluster.nodes` | The number of master nodes should always be >= 3, otherwise cluster creation will fail | `6` | -| `cluster.replicas` | Number of replicas for every master in the cluster | `1` | -| `cluster.externalAccess.enabled` | Enable access to the Redis | `false` | -| `cluster.externalAccess.hostMode` | Set cluster preferred endpoint type as hostname | `false` | -| `cluster.externalAccess.service.type` | Type for the services used to expose every Pod | `LoadBalancer` | -| `cluster.externalAccess.service.port` | Port for the services used to expose every Pod | `6379` | -| `cluster.externalAccess.service.loadBalancerIP` | Array of load balancer IPs for each Redis® node. Length must be the same as cluster.nodes | `[]` | -| `cluster.externalAccess.service.loadBalancerSourceRanges` | Service Load Balancer sources | `[]` | -| `cluster.externalAccess.service.annotations` | Annotations to add to the services used to expose every Pod of the Redis® Cluster | `{}` | -| `cluster.update.addNodes` | Boolean to specify if you want to add nodes after the upgrade | `false` | -| `cluster.update.currentNumberOfNodes` | Number of currently deployed Redis® nodes | `6` | -| `cluster.update.currentNumberOfReplicas` | Number of currently deployed Redis® replicas | `1` | -| `cluster.update.newExternalIPs` | External IPs obtained from the services for the new nodes to add to the cluster | `[]` | +| Name | Description | Value | +| --------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------- | -------------- | +| `cluster.init` | Enable the initialization of the Redis® Cluster | `true` | +| `cluster.nodes` | The number of master nodes should always be >= 3, otherwise cluster creation will fail | `6` | +| `cluster.replicas` | Number of replicas for every master in the cluster | `1` | +| `cluster.externalAccess.enabled` | Enable access to the Redis | `false` | +| `cluster.externalAccess.hostMode` | Set cluster preferred endpoint type as hostname | `false` | +| `cluster.externalAccess.service.disableLoadBalancerIP` | Disable use of `Service.spec.loadBalancerIP` | `false` | +| `cluster.externalAccess.service.loadBalancerIPAnnotaion` | Name of annotation to specify fixed IP for service in. Disables `Service.spec.loadBalancerIP` if not empty | `""` | +| `cluster.externalAccess.service.type` | Type for the services used to expose every Pod | `LoadBalancer` | +| `cluster.externalAccess.service.port` | Port for the services used to expose every Pod | `6379` | +| `cluster.externalAccess.service.loadBalancerIP` | Array of load balancer IPs for each Redis® node. Length must be the same as cluster.nodes | `[]` | +| `cluster.externalAccess.service.loadBalancerSourceRanges` | Service Load Balancer sources | `[]` | +| `cluster.externalAccess.service.annotations` | Annotations to add to the services used to expose every Pod of the Redis® Cluster | `{}` | +| `cluster.update.addNodes` | Boolean to specify if you want to add nodes after the upgrade | `false` | +| `cluster.update.currentNumberOfNodes` | Number of currently deployed Redis® nodes | `6` | +| `cluster.update.currentNumberOfReplicas` | Number of currently deployed Redis® replicas | `1` | +| `cluster.update.newExternalIPs` | External IPs obtained from the services for the new nodes to add to the cluster | `[]` | ### Metrics sidecar parameters @@ -291,7 +293,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a side-car prometheus exporter | `false` | | `metrics.image.registry` | Redis® exporter image registry | `docker.io` | | `metrics.image.repository` | Redis® exporter image name | `bitnami/redis-exporter` | -| `metrics.image.tag` | Redis® exporter image tag | `1.54.0-debian-11-r0` | +| `metrics.image.tag` | Redis® exporter image tag | `1.54.0-debian-11-r27` | | `metrics.image.digest` | Redis® exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Redis® exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -331,7 +333,7 @@ The command removes all the Kubernetes components associated with the chart and | `sysctlImage.command` | sysctlImage command to execute | `[]` | | `sysctlImage.registry` | sysctlImage Init container registry | `docker.io` | | `sysctlImage.repository` | sysctlImage Init container repository | `bitnami/os-shell` | -| `sysctlImage.tag` | sysctlImage Init container tag | `11-debian-11-r60` | +| `sysctlImage.tag` | sysctlImage Init container tag | `11-debian-11-r89` | | `sysctlImage.digest` | sysctlImage Init container digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `sysctlImage.pullPolicy` | sysctlImage Init container pull policy | `IfNotPresent` | | `sysctlImage.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/redis-cluster/templates/svc-cluster-external-access.yaml b/bitnami/redis-cluster/templates/svc-cluster-external-access.yaml index 20e44c80fed1d7..d347c4406b4a10 100644 --- a/bitnami/redis-cluster/templates/svc-cluster-external-access.yaml +++ b/bitnami/redis-cluster/templates/svc-cluster-external-access.yaml @@ -18,13 +18,32 @@ metadata: namespace: {{ $.Release.Namespace | quote }} labels: {{- include "common.labels.standard" ( dict "customLabels" $root.Values.commonLabels "context" $ ) | nindent 4 }} pod: {{ $targetPod }} - {{- if or $root.Values.cluster.externalAccess.service.annotations $root.Values.commonAnnotations }} - {{- $annotations := include "common.tplvalues.merge" ( dict "values" ( list $root.Values.cluster.externalAccess.service.annotations $root.Values.commonAnnotations ) "context" $ ) }} + {{- if or + ($root.Values.cluster.externalAccess.service.annotations) + ($root.Values.commonAnnotations) + (ne $root.Values.cluster.externalAccess.service.loadBalancerIPAnnotaion "") }} + {{- $loadBalancerIPAnnotaion := "" }} + {{- if ne $root.Values.cluster.externalAccess.service.loadBalancerIPAnnotaion ""}} + {{- $loadBalancerIPAnnotaion = printf + "%s: %s" + $root.Values.cluster.externalAccess.service.loadBalancerIPAnnotaion + (index $root.Values.cluster.externalAccess.service.loadBalancerIP $i) }} + {{- end }} + {{- $annotations := include "common.tplvalues.merge" + ( dict "values" + ( list + $root.Values.cluster.externalAccess.service.annotations + $root.Values.commonAnnotations + $loadBalancerIPAnnotaion + ) "context" $ ) }} annotations: {{- include "common.tplvalues.render" ( dict "value" $annotations "context" $) | nindent 4 }} {{- end }} spec: type: {{ $root.Values.cluster.externalAccess.service.type }} - {{- if $root.Values.cluster.externalAccess.service.loadBalancerIP }} + {{- if and + ($root.Values.cluster.externalAccess.service.loadBalancerIP) + (eq $root.Values.cluster.externalAccess.service.loadBalancerIPAnnotaion "") + (not $root.Values.cluster.externalAccess.service.disableLoadBalancerIP) }} loadBalancerIP: {{ index $root.Values.cluster.externalAccess.service.loadBalancerIP $i }} {{- end }} {{- if and (eq $root.Values.cluster.externalAccess.service.type "LoadBalancer") $root.Values.cluster.externalAccess.service.loadBalancerSourceRanges }} diff --git a/bitnami/redis-cluster/values.yaml b/bitnami/redis-cluster/values.yaml index e49aac41686237..dfe45c33d0a04f 100644 --- a/bitnami/redis-cluster/values.yaml +++ b/bitnami/redis-cluster/values.yaml @@ -73,7 +73,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/redis-cluster - tag: 7.2.1-debian-11-r0 + tag: 7.2.1-debian-11-r24 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -359,7 +359,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r60 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -787,6 +787,12 @@ cluster: ## hostMode: false service: + ## @param cluster.externalAccess.service.disableLoadBalancerIP Disable use of `Service.spec.loadBalancerIP` + ## + disableLoadBalancerIP: false + ## @param cluster.externalAccess.service.loadBalancerIPAnnotaion Name of annotation to specify fixed IP for service in. Disables `Service.spec.loadBalancerIP` if not empty + ## + loadBalancerIPAnnotaion: "" ## @param cluster.externalAccess.service.type Type for the services used to expose every Pod ## At this moment only LoadBalancer is supported ## @@ -843,7 +849,7 @@ metrics: image: registry: docker.io repository: bitnami/redis-exporter - tag: 1.54.0-debian-11-r0 + tag: 1.54.0-debian-11-r27 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -1012,7 +1018,7 @@ sysctlImage: ## registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r60 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/redis/Chart.lock b/bitnami/redis/Chart.lock index f5fb20a778b6b8..2404c9905b26cd 100644 --- a/bitnami/redis/Chart.lock +++ b/bitnami/redis/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6b6084c51b6a028a651f6e8539d0197487ee807c5bae44867d4ea6ccd1f9ae93 -generated: "2023-09-29T11:06:04.261917+02:00" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-07T00:54:22.108613108Z" diff --git a/bitnami/redis/Chart.yaml b/bitnami/redis/Chart.yaml index 7588896c7dca87..a49bf789348966 100644 --- a/bitnami/redis/Chart.yaml +++ b/bitnami/redis/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r60 + image: docker.io/bitnami/os-shell:11-debian-11-r86 - name: redis-exporter - image: docker.io/bitnami/redis-exporter:1.54.0-debian-11-r0 + image: docker.io/bitnami/redis-exporter:1.54.0-debian-11-r25 - name: redis-sentinel - image: docker.io/bitnami/redis-sentinel:7.2.1-debian-11-r0 + image: docker.io/bitnami/redis-sentinel:7.2.1-debian-11-r23 - name: redis - image: docker.io/bitnami/redis:7.2.1-debian-11-r0 + image: docker.io/bitnami/redis:7.2.1-debian-11-r24 apiVersion: v2 appVersion: 7.2.1 dependencies: @@ -34,4 +34,4 @@ maintainers: name: redis sources: - https://github.com/bitnami/charts/tree/main/bitnami/redis -version: 18.1.2 +version: 18.1.4 diff --git a/bitnami/redis/README.md b/bitnami/redis/README.md index 6e840a6506f557..42fd531c5bd061 100644 --- a/bitnami/redis/README.md +++ b/bitnami/redis/README.md @@ -97,15 +97,15 @@ The command removes all the Kubernetes components associated with the chart and ### Redis® Image parameters -| Name | Description | Value | -| ------------------- | ---------------------------------------------------------------------------------------------------------- | -------------------- | -| `image.registry` | Redis® image registry | `docker.io` | -| `image.repository` | Redis® image repository | `bitnami/redis` | -| `image.tag` | Redis® image tag (immutable tags are recommended) | `7.2.1-debian-11-r0` | -| `image.digest` | Redis® image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | Redis® image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Redis® image pull secrets | `[]` | -| `image.debug` | Enable image debug mode | `false` | +| Name | Description | Value | +| ------------------- | ---------------------------------------------------------------------------------------------------------- | --------------------- | +| `image.registry` | Redis® image registry | `docker.io` | +| `image.repository` | Redis® image repository | `bitnami/redis` | +| `image.tag` | Redis® image tag (immutable tags are recommended) | `7.2.1-debian-11-r24` | +| `image.digest` | Redis® image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | Redis® image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Redis® image pull secrets | `[]` | +| `image.debug` | Enable image debug mode | `false` | ### Redis® common configuration parameters @@ -208,6 +208,9 @@ The command removes all the Kubernetes components associated with the chart and | `master.persistence.selector` | Additional labels to match for the PVC | `{}` | | `master.persistence.dataSource` | Custom PVC data source | `{}` | | `master.persistence.existingClaim` | Use a existing PVC which must be created manually before bound | `""` | +| `master.persistentVolumeClaimRetentionPolicy.enabled` | Controls if and how PVCs are deleted during the lifecycle of a StatefulSet | `false` | +| `master.persistentVolumeClaimRetentionPolicy.whenScaled` | Volume retention behavior when the replica count of the StatefulSet is reduced | `Retain` | +| `master.persistentVolumeClaimRetentionPolicy.whenDeleted` | Volume retention behavior that applies when the StatefulSet is deleted | `Retain` | | `master.service.type` | Redis® master service type | `ClusterIP` | | `master.service.ports.redis` | Redis® master service port | `6379` | | `master.service.nodePorts.redis` | Node port for Redis® master | `""` | @@ -317,6 +320,9 @@ The command removes all the Kubernetes components associated with the chart and | `replica.persistence.selector` | Additional labels to match for the PVC | `{}` | | `replica.persistence.dataSource` | Custom PVC data source | `{}` | | `replica.persistence.existingClaim` | Use a existing PVC which must be created manually before bound | `""` | +| `replica.persistentVolumeClaimRetentionPolicy.enabled` | Controls if and how PVCs are deleted during the lifecycle of a StatefulSet | `false` | +| `replica.persistentVolumeClaimRetentionPolicy.whenScaled` | Volume retention behavior when the replica count of the StatefulSet is reduced | `Retain` | +| `replica.persistentVolumeClaimRetentionPolicy.whenDeleted` | Volume retention behavior that applies when the StatefulSet is deleted | `Retain` | | `replica.service.type` | Redis® replicas service type | `ClusterIP` | | `replica.service.ports.redis` | Redis® replicas service port | `6379` | | `replica.service.nodePorts.redis` | Node port for Redis® replicas | `""` | @@ -347,7 +353,7 @@ The command removes all the Kubernetes components associated with the chart and | `sentinel.enabled` | Use Redis® Sentinel on Redis® pods. | `false` | | `sentinel.image.registry` | Redis® Sentinel image registry | `docker.io` | | `sentinel.image.repository` | Redis® Sentinel image repository | `bitnami/redis-sentinel` | -| `sentinel.image.tag` | Redis® Sentinel image tag (immutable tags are recommended) | `7.2.1-debian-11-r0` | +| `sentinel.image.tag` | Redis® Sentinel image tag (immutable tags are recommended) | `7.2.1-debian-11-r23` | | `sentinel.image.digest` | Redis® Sentinel image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `sentinel.image.pullPolicy` | Redis® Sentinel image pull policy | `IfNotPresent` | | `sentinel.image.pullSecrets` | Redis® Sentinel image pull secrets | `[]` | @@ -404,6 +410,9 @@ The command removes all the Kubernetes components associated with the chart and | `sentinel.persistence.dataSource` | Custom PVC data source | `{}` | | `sentinel.persistence.medium` | Provide a medium for `emptyDir` volumes. | `""` | | `sentinel.persistence.sizeLimit` | Set this to enable a size limit for `emptyDir` volumes. | `""` | +| `sentinel.persistentVolumeClaimRetentionPolicy.enabled` | Controls if and how PVCs are deleted during the lifecycle of a StatefulSet | `false` | +| `sentinel.persistentVolumeClaimRetentionPolicy.whenScaled` | Volume retention behavior when the replica count of the StatefulSet is reduced | `Retain` | +| `sentinel.persistentVolumeClaimRetentionPolicy.whenDeleted` | Volume retention behavior that applies when the StatefulSet is deleted | `Retain` | | `sentinel.resources.limits` | The resources limits for the Redis® Sentinel containers | `{}` | | `sentinel.resources.requests` | The requested resources for the Redis® Sentinel containers | `{}` | | `sentinel.containerSecurityContext.enabled` | Enabled Redis® Sentinel containers' Security Context | `true` | @@ -474,7 +483,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a sidecar prometheus exporter to expose Redis® metrics | `false` | | `metrics.image.registry` | Redis® Exporter image registry | `docker.io` | | `metrics.image.repository` | Redis® Exporter image repository | `bitnami/redis-exporter` | -| `metrics.image.tag` | Redis® Exporter image tag (immutable tags are recommended) | `1.54.0-debian-11-r0` | +| `metrics.image.tag` | Redis® Exporter image tag (immutable tags are recommended) | `1.54.0-debian-11-r25` | | `metrics.image.digest` | Redis® Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Redis® Exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Redis® Exporter image pull secrets | `[]` | @@ -547,7 +556,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r60` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | @@ -557,7 +566,7 @@ The command removes all the Kubernetes components associated with the chart and | `sysctl.enabled` | Enable init container to modify Kernel settings | `false` | | `sysctl.image.registry` | OS Shell + Utility image registry | `docker.io` | | `sysctl.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `sysctl.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r60` | +| `sysctl.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | | `sysctl.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `sysctl.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `sysctl.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | @@ -985,4 +994,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/redis/templates/master/application.yaml b/bitnami/redis/templates/master/application.yaml index 4b10b80dbd085e..84a25b1bc14d89 100644 --- a/bitnami/redis/templates/master/application.yaml +++ b/bitnami/redis/templates/master/application.yaml @@ -493,6 +493,11 @@ spec: persistentVolumeClaim: claimName: {{ printf "redis-data-%s-master" (include "common.names.fullname" .) }} {{- else }} + {{- if .Values.master.persistentVolumeClaimRetentionPolicy.enabled }} + persistentVolumeClaimRetentionPolicy: + whenDeleted: {{ .Values.master.persistentVolumeClaimRetentionPolicy.whenDeleted }} + whenScaled: {{ .Values.master.persistentVolumeClaimRetentionPolicy.whenScaled }} + {{- end }} volumeClaimTemplates: - apiVersion: v1 kind: PersistentVolumeClaim diff --git a/bitnami/redis/templates/replicas/statefulset.yaml b/bitnami/redis/templates/replicas/statefulset.yaml index e7a927327d2619..b82406c07829dc 100644 --- a/bitnami/redis/templates/replicas/statefulset.yaml +++ b/bitnami/redis/templates/replicas/statefulset.yaml @@ -490,6 +490,11 @@ spec: persistentVolumeClaim: claimName: {{ printf "%s" (tpl .Values.replica.persistence.existingClaim .) }} {{- else }} + {{- if .Values.replica.persistentVolumeClaimRetentionPolicy.enabled }} + persistentVolumeClaimRetentionPolicy: + whenDeleted: {{ .Values.replica.persistentVolumeClaimRetentionPolicy.whenDeleted }} + whenScaled: {{ .Values.replica.persistentVolumeClaimRetentionPolicy.whenScaled }} + {{- end }} volumeClaimTemplates: - apiVersion: v1 kind: PersistentVolumeClaim diff --git a/bitnami/redis/templates/sentinel/statefulset.yaml b/bitnami/redis/templates/sentinel/statefulset.yaml index 5f76a039921150..55d0e90e0690eb 100644 --- a/bitnami/redis/templates/sentinel/statefulset.yaml +++ b/bitnami/redis/templates/sentinel/statefulset.yaml @@ -728,6 +728,11 @@ spec: persistentVolumeClaim: claimName: {{ printf "%s" (tpl .Values.replica.persistence.existingClaim .) }} {{- else }} + {{- if .Values.sentinel.persistentVolumeClaimRetentionPolicy.enabled }} + persistentVolumeClaimRetentionPolicy: + whenDeleted: {{ .Values.sentinel.persistentVolumeClaimRetentionPolicy.whenDeleted }} + whenScaled: {{ .Values.sentinel.persistentVolumeClaimRetentionPolicy.whenScaled }} + {{- end }} volumeClaimTemplates: - apiVersion: v1 kind: PersistentVolumeClaim diff --git a/bitnami/redis/values.yaml b/bitnami/redis/values.yaml index 8db5e26581bc0c..0d7046a508e171 100644 --- a/bitnami/redis/values.yaml +++ b/bitnami/redis/values.yaml @@ -91,7 +91,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/redis - tag: 7.2.1-debian-11-r0 + tag: 7.2.1-debian-11-r24 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -488,6 +488,16 @@ master: ## NOTE: requires master.persistence.enabled: true ## existingClaim: "" + ## persistentVolumeClaimRetentionPolicy + ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#persistentvolumeclaim-retention + ## @param master.persistentVolumeClaimRetentionPolicy.enabled Controls if and how PVCs are deleted during the lifecycle of a StatefulSet + ## @param master.persistentVolumeClaimRetentionPolicy.whenScaled Volume retention behavior when the replica count of the StatefulSet is reduced + ## @param master.persistentVolumeClaimRetentionPolicy.whenDeleted Volume retention behavior that applies when the StatefulSet is deleted + ## + persistentVolumeClaimRetentionPolicy: + enabled: false + whenScaled: Retain + whenDeleted: Retain ## Redis® master service parameters ## service: @@ -921,6 +931,16 @@ replica: ## NOTE: requires replica.persistence.enabled: true ## existingClaim: "" + ## persistentVolumeClaimRetentionPolicy + ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#persistentvolumeclaim-retention + ## @param replica.persistentVolumeClaimRetentionPolicy.enabled Controls if and how PVCs are deleted during the lifecycle of a StatefulSet + ## @param replica.persistentVolumeClaimRetentionPolicy.whenScaled Volume retention behavior when the replica count of the StatefulSet is reduced + ## @param replica.persistentVolumeClaimRetentionPolicy.whenDeleted Volume retention behavior that applies when the StatefulSet is deleted + ## + persistentVolumeClaimRetentionPolicy: + enabled: false + whenScaled: Retain + whenDeleted: Retain ## Redis® replicas service parameters ## service: @@ -1036,7 +1056,7 @@ sentinel: image: registry: docker.io repository: bitnami/redis-sentinel - tag: 7.2.1-debian-11-r0 + tag: 7.2.1-debian-11-r23 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1219,6 +1239,16 @@ sentinel: ## @param sentinel.persistence.sizeLimit Set this to enable a size limit for `emptyDir` volumes. ## sizeLimit: "" + ## persistentVolumeClaimRetentionPolicy + ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#persistentvolumeclaim-retention + ## @param sentinel.persistentVolumeClaimRetentionPolicy.enabled Controls if and how PVCs are deleted during the lifecycle of a StatefulSet + ## @param sentinel.persistentVolumeClaimRetentionPolicy.whenScaled Volume retention behavior when the replica count of the StatefulSet is reduced + ## @param sentinel.persistentVolumeClaimRetentionPolicy.whenDeleted Volume retention behavior that applies when the StatefulSet is deleted + ## + persistentVolumeClaimRetentionPolicy: + enabled: false + whenScaled: Retain + whenDeleted: Retain ## Redis® Sentinel resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param sentinel.resources.limits The resources limits for the Redis® Sentinel containers @@ -1505,7 +1535,7 @@ metrics: image: registry: docker.io repository: bitnami/redis-exporter - tag: 1.54.0-debian-11-r0 + tag: 1.54.0-debian-11-r25 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -1779,7 +1809,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r60 + tag: 11-debian-11-r86 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -1827,7 +1857,7 @@ sysctl: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r60 + tag: 11-debian-11-r86 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/redmine/Chart.lock b/bitnami/redmine/Chart.lock index 9475ccdd216ad7..3027244aa65736 100644 --- a/bitnami/redmine/Chart.lock +++ b/bitnami/redmine/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.0.0 + version: 13.1.1 - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts version: 13.1.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6a093df04ba2b7e04ad81ba2546fd029b8fd73923de423ec5e6d9d4018db5f18 -generated: "2023-09-30T15:11:33.564365129Z" + version: 2.13.2 +digest: sha256:d88d73e0c783bd79f71491da6d2c8d0f8ccbe1abab9e06789ba679eba1b9c8f6 +generated: "2023-10-09T21:16:40.782717168Z" diff --git a/bitnami/redmine/Chart.yaml b/bitnami/redmine/Chart.yaml index 760ac639e0cb32..8037143e4d5131 100644 --- a/bitnami/redmine/Chart.yaml +++ b/bitnami/redmine/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r83 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: redmine - image: docker.io/bitnami/redmine:5.0.6-debian-11-r0 + image: docker.io/bitnami/redmine:5.0.6-debian-11-r6 apiVersion: v2 appVersion: 5.0.6 dependencies: @@ -43,4 +43,4 @@ maintainers: name: redmine sources: - https://github.com/bitnami/charts/tree/main/bitnami/redmine -version: 24.0.1 +version: 24.0.3 diff --git a/bitnami/redmine/README.md b/bitnami/redmine/README.md index addefb18b36986..a821b23ba68092 100644 --- a/bitnami/redmine/README.md +++ b/bitnami/redmine/README.md @@ -92,7 +92,7 @@ helm install my-release oci://registry-1.docker.io/bitnamicharts/redmine --set d | ----------------------- | ------------------------------------------------------------------------------------------------------- | -------------------- | | `image.registry` | Redmine image registry | `docker.io` | | `image.repository` | Redmine image repository | `bitnami/redmine` | -| `image.tag` | Redmine image tag (immutable tags are recommended) | `5.0.6-debian-11-r0` | +| `image.tag` | Redmine image tag (immutable tags are recommended) | `5.0.6-debian-11-r6` | | `image.digest` | Redmine image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Redmine image pull policy | `IfNotPresent` | | `image.pullSecrets` | Redmine image pull secrets | `[]` | @@ -338,7 +338,7 @@ helm install my-release oci://registry-1.docker.io/bitnamicharts/redmine --set d | `certificates.customCA` | Defines a list of secrets to import into the container trust store | `[]` | | `certificates.image.registry` | Redmine image registry | `docker.io` | | `certificates.image.repository` | Redmine image repository | `bitnami/os-shell` | -| `certificates.image.tag` | Redmine image tag (immutable tags are recommended) | `11-debian-11-r83` | +| `certificates.image.tag` | Redmine image tag (immutable tags are recommended) | `11-debian-11-r89` | | `certificates.image.digest` | Redmine image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `certificates.image.pullPolicy` | Redmine image pull policy | `IfNotPresent` | | `certificates.image.pullSecrets` | Redmine image pull secrets | `[]` | diff --git a/bitnami/redmine/values.yaml b/bitnami/redmine/values.yaml index 5a1f3d3dd8a570..18f1e4e93f320c 100644 --- a/bitnami/redmine/values.yaml +++ b/bitnami/redmine/values.yaml @@ -76,7 +76,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/redmine - tag: 5.0.6-debian-11-r0 + tag: 5.0.6-debian-11-r6 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -945,7 +945,7 @@ certificates: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r83 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/sealed-secrets/Chart.lock b/bitnami/sealed-secrets/Chart.lock index ba8076eeb13500..dc2f70d621a7d2 100644 --- a/bitnami/sealed-secrets/Chart.lock +++ b/bitnami/sealed-secrets/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:eba5a1f693000386eaa87ad6e7864e5831cc41f32c07bfec159b5ff01fcd0ce5 -generated: "2023-10-04T11:24:00.096417936Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-10T09:20:46.787044852Z" diff --git a/bitnami/sealed-secrets/Chart.yaml b/bitnami/sealed-secrets/Chart.yaml index ca77106b303bc6..5fdc35712d8d99 100644 --- a/bitnami/sealed-secrets/Chart.yaml +++ b/bitnami/sealed-secrets/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: sealed-secrets - image: docker.io/bitnami/sealed-secrets:0.24.0-debian-11-r16 + image: docker.io/bitnami/sealed-secrets:0.24.1-debian-11-r1 apiVersion: v2 -appVersion: 0.24.0 +appVersion: 0.24.1 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -28,4 +28,4 @@ maintainers: name: sealed-secrets sources: - https://github.com/bitnami/charts/tree/main/bitnami/sealed-secrets -version: 1.5.5 +version: 1.5.7 diff --git a/bitnami/sealed-secrets/README.md b/bitnami/sealed-secrets/README.md index 04c4c7121660a3..4cf7cda927737d 100644 --- a/bitnami/sealed-secrets/README.md +++ b/bitnami/sealed-secrets/README.md @@ -78,7 +78,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | ------------------------ | | `image.registry` | Sealed Secrets image registry | `docker.io` | | `image.repository` | Sealed Secrets image repository | `bitnami/sealed-secrets` | -| `image.tag` | Sealed Secrets image tag (immutable tags are recommended) | `0.24.0-debian-11-r16` | +| `image.tag` | Sealed Secrets image tag (immutable tags are recommended) | `0.24.1-debian-11-r1` | | `image.digest` | Sealed Secrets image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Sealed Secrets image pull policy | `IfNotPresent` | | `image.pullSecrets` | Sealed Secrets image pull secrets | `[]` | diff --git a/bitnami/sealed-secrets/values.yaml b/bitnami/sealed-secrets/values.yaml index 9ea5134a9799db..1a6fe29e140535 100644 --- a/bitnami/sealed-secrets/values.yaml +++ b/bitnami/sealed-secrets/values.yaml @@ -64,7 +64,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/sealed-secrets - tag: 0.24.0-debian-11-r16 + tag: 0.24.1-debian-11-r1 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/solr/Chart.lock b/bitnami/solr/Chart.lock index fe3ffbb3f6038f..d1b26b8c4d1816 100644 --- a/bitnami/solr/Chart.lock +++ b/bitnami/solr/Chart.lock @@ -4,6 +4,6 @@ dependencies: version: 12.1.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:6e3716213db604b13109e4c542a7d67d7df35b50a0764f7f56a5032a0add2c70 -generated: "2023-10-01T12:19:18.703651636Z" + version: 2.13.2 +digest: sha256:014815aff273844f34be8506ddc386d70779c46590d9899f756d141eb6285acd +generated: "2023-10-09T21:46:29.265259182Z" diff --git a/bitnami/solr/Chart.yaml b/bitnami/solr/Chart.yaml index e42524267e5867..2b9497a1cf0560 100644 --- a/bitnami/solr/Chart.yaml +++ b/bitnami/solr/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r83 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: solr - image: docker.io/bitnami/solr:9.3.0-debian-11-r63 + image: docker.io/bitnami/solr:9.3.0-debian-11-r68 apiVersion: v2 appVersion: 9.3.0 dependencies: @@ -34,4 +34,4 @@ maintainers: name: solr sources: - https://github.com/bitnami/charts/tree/main/bitnami/solr -version: 8.1.5 +version: 8.1.6 diff --git a/bitnami/solr/README.md b/bitnami/solr/README.md index 254d8e501898b1..5f62774359fd0c 100644 --- a/bitnami/solr/README.md +++ b/bitnami/solr/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | -------------------------------- | ---------------------------------------------------------------------------------------------------- | ----------------------- | | `image.registry` | Solr image registry | `docker.io` | | `image.repository` | Solr image repository | `bitnami/solr` | -| `image.tag` | Solr image tag (immutable tags are recommended) | `9.3.0-debian-11-r63` | +| `image.tag` | Solr image tag (immutable tags are recommended) | `9.3.0-debian-11-r68` | | `image.digest` | Solr image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -220,7 +220,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r83` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | diff --git a/bitnami/solr/values.yaml b/bitnami/solr/values.yaml index c87d21c0541bd6..57ad86374f4f84 100644 --- a/bitnami/solr/values.yaml +++ b/bitnami/solr/values.yaml @@ -75,7 +75,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/solr - tag: 9.3.0-debian-11-r63 + tag: 9.3.0-debian-11-r68 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -600,7 +600,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r83 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/sonarqube/Chart.lock b/bitnami/sonarqube/Chart.lock index af40dc01dd28e2..bffc864f6d5161 100644 --- a/bitnami/sonarqube/Chart.lock +++ b/bitnami/sonarqube/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.0.0 + version: 13.1.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.1 -digest: sha256:10376f14af550041b2735d1e33cc3adfec90f704169222c5a0e0076f2c2ee277 -generated: "2023-09-29T10:42:25.873883+02:00" + version: 2.13.2 +digest: sha256:e5ced9197fb01928d7faeff7f41e320149cbc634bd8423a217e5a4f4e9b571f9 +generated: "2023-10-09T21:52:40.583614043Z" diff --git a/bitnami/sonarqube/Chart.yaml b/bitnami/sonarqube/Chart.yaml index 209063b24d2c42..f0b906bf59ab90 100644 --- a/bitnami/sonarqube/Chart.yaml +++ b/bitnami/sonarqube/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: jmx-exporter - image: docker.io/bitnami/jmx-exporter:0.19.0-debian-11-r84 + image: docker.io/bitnami/jmx-exporter:0.19.0-debian-11-r92 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: sonarqube - image: docker.io/bitnami/sonarqube:10.2.1-debian-11-r0 + image: docker.io/bitnami/sonarqube:10.2.1-debian-11-r6 apiVersion: v2 appVersion: 10.2.1 dependencies: @@ -37,4 +37,4 @@ maintainers: name: sonarqube sources: - https://github.com/bitnami/charts/tree/main/bitnami/sonarqube -version: 4.0.0 +version: 4.0.1 diff --git a/bitnami/sonarqube/README.md b/bitnami/sonarqube/README.md index 579846d8c5bc72..7fe4fd47739cc8 100644 --- a/bitnami/sonarqube/README.md +++ b/bitnami/sonarqube/README.md @@ -80,7 +80,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------- | ---------------------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | SonarQube™ image registry | `docker.io` | | `image.repository` | SonarQube™ image repository | `bitnami/sonarqube` | -| `image.tag` | SonarQube™ image tag (immutable tags are recommended) | `10.2.1-debian-11-r0` | +| `image.tag` | SonarQube™ image tag (immutable tags are recommended) | `10.2.1-debian-11-r6` | | `image.digest` | SonarQube™ image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | SonarQube™ image pull policy | `IfNotPresent` | | `image.pullSecrets` | SonarQube™ image pull secrets | `[]` | @@ -226,7 +226,7 @@ The command removes all the Kubernetes components associated with the chart and | `caCerts.enabled` | Enable the use of caCerts | `false` | | `caCerts.image.registry` | OS Shell + Utility image registry | `docker.io` | | `caCerts.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `caCerts.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `caCerts.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `caCerts.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `caCerts.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `caCerts.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | @@ -244,7 +244,7 @@ The command removes all the Kubernetes components associated with the chart and | `plugins.noCheckCertificate` | Set to true to not validate the server's certificate to download plugin | `true` | | `plugins.image.registry` | OS Shell + Utility image registry | `docker.io` | | `plugins.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `plugins.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `plugins.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `plugins.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `plugins.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `plugins.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | @@ -266,7 +266,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | @@ -281,7 +281,7 @@ The command removes all the Kubernetes components associated with the chart and | `sysctl.enabled` | Enable kernel settings modifier image | `true` | | `sysctl.image.registry` | OS Shell + Utility image registry | `docker.io` | | `sysctl.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `sysctl.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `sysctl.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `sysctl.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `sysctl.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `sysctl.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | @@ -310,7 +310,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.jmx.enabled` | Whether or not to expose JMX metrics to Prometheus | `false` | | `metrics.jmx.image.registry` | JMX exporter image registry | `docker.io` | | `metrics.jmx.image.repository` | JMX exporter image repository | `bitnami/jmx-exporter` | -| `metrics.jmx.image.tag` | JMX exporter image tag (immutable tags are recommended) | `0.19.0-debian-11-r84` | +| `metrics.jmx.image.tag` | JMX exporter image tag (immutable tags are recommended) | `0.19.0-debian-11-r92` | | `metrics.jmx.image.digest` | JMX exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.jmx.image.pullPolicy` | JMX exporter image pull policy | `IfNotPresent` | | `metrics.jmx.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -486,4 +486,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/sonarqube/values.yaml b/bitnami/sonarqube/values.yaml index 0f5e2d2e7d7e3c..70ee50279ef4b1 100644 --- a/bitnami/sonarqube/values.yaml +++ b/bitnami/sonarqube/values.yaml @@ -76,7 +76,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/sonarqube - tag: 10.2.1-debian-11-r0 + tag: 10.2.1-debian-11-r6 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -616,7 +616,7 @@ caCerts: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -677,7 +677,7 @@ plugins: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -758,7 +758,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -808,7 +808,7 @@ sysctl: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -888,7 +888,7 @@ metrics: image: registry: docker.io repository: bitnami/jmx-exporter - tag: 0.19.0-debian-11-r84 + tag: 0.19.0-debian-11-r92 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/spring-cloud-dataflow/Chart.lock b/bitnami/spring-cloud-dataflow/Chart.lock index 3011ff3974624a..3e0250cf6bbd5a 100644 --- a/bitnami/spring-cloud-dataflow/Chart.lock +++ b/bitnami/spring-cloud-dataflow/Chart.lock @@ -1,15 +1,15 @@ dependencies: - name: rabbitmq repository: oci://registry-1.docker.io/bitnamicharts - version: 12.1.7 + version: 12.2.1 - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.3 + version: 14.0.1 - name: kafka repository: oci://registry-1.docker.io/bitnamicharts - version: 25.1.12 + version: 25.3.3 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.12.0 -digest: sha256:c56043662c7522c8ed19154123b5027e3b8f37025ebda129aa88161a6f81f430 -generated: "2023-09-27T17:39:51.776407503Z" + version: 2.13.2 +digest: sha256:7e1237bb26df398565557f910b7bce5709c7934604da6e9296d38d0f1e44e26b +generated: "2023-10-10T15:29:53.082658464+02:00" diff --git a/bitnami/spring-cloud-dataflow/Chart.yaml b/bitnami/spring-cloud-dataflow/Chart.yaml index 4b71c58c75bdde..987fbe8bb9099e 100644 --- a/bitnami/spring-cloud-dataflow/Chart.yaml +++ b/bitnami/spring-cloud-dataflow/Chart.yaml @@ -6,17 +6,17 @@ annotations: licenses: Apache-2.0 images: | - name: kubectl - image: docker.io/bitnami/kubectl:1.28.2-debian-11-r5 + image: docker.io/bitnami/kubectl:1.28.2-debian-11-r15 - name: mariadb - image: docker.io/bitnami/mariadb:10.11.5-debian-11-r39 + image: docker.io/bitnami/mariadb:10.11.5-debian-11-r49 - name: prometheus-rsocket-proxy - image: docker.io/bitnami/prometheus-rsocket-proxy:1.5.2-debian-11-r74 + image: docker.io/bitnami/prometheus-rsocket-proxy:1.5.2-debian-11-r84 - name: spring-cloud-dataflow-composed-task-runner - image: docker.io/bitnami/spring-cloud-dataflow-composed-task-runner:2.11.0-debian-11-r5 + image: docker.io/bitnami/spring-cloud-dataflow-composed-task-runner:2.11.0-debian-11-r13 - name: spring-cloud-dataflow - image: docker.io/bitnami/spring-cloud-dataflow:2.11.0-debian-11-r0 + image: docker.io/bitnami/spring-cloud-dataflow:2.11.0-debian-11-r7 - name: spring-cloud-skipper - image: docker.io/bitnami/spring-cloud-skipper:2.9.3-debian-11-r131 + image: docker.io/bitnami/spring-cloud-skipper:2.11.0-debian-11-r2 apiVersion: v2 appVersion: 2.11.0 dependencies: @@ -29,7 +29,7 @@ dependencies: repository: oci://registry-1.docker.io/bitnamicharts tags: - dataflow-database - version: 13.x.x + version: 14.x.x - condition: kafka.enabled name: kafka repository: oci://registry-1.docker.io/bitnamicharts @@ -53,4 +53,4 @@ maintainers: name: spring-cloud-dataflow sources: - https://github.com/bitnami/charts/tree/main/bitnami/spring-cloud-dataflow -version: 23.1.4 +version: 24.0.1 diff --git a/bitnami/spring-cloud-dataflow/README.md b/bitnami/spring-cloud-dataflow/README.md index f183ff7a077314..77f56104406715 100644 --- a/bitnami/spring-cloud-dataflow/README.md +++ b/bitnami/spring-cloud-dataflow/README.md @@ -74,7 +74,7 @@ helm uninstall my-release | --------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------ | ---------------------------------------------------- | | `server.image.registry` | Spring Cloud Dataflow image registry | `docker.io` | | `server.image.repository` | Spring Cloud Dataflow image repository | `bitnami/spring-cloud-dataflow` | -| `server.image.tag` | Spring Cloud Dataflow image tag (immutable tags are recommended) | `2.11.0-debian-11-r0` | +| `server.image.tag` | Spring Cloud Dataflow image tag (immutable tags are recommended) | `2.11.0-debian-11-r7` | | `server.image.digest` | Spring Cloud Dataflow image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `server.image.pullPolicy` | Spring Cloud Dataflow image pull policy | `IfNotPresent` | | `server.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -82,7 +82,7 @@ helm uninstall my-release | `server.hostAliases` | Deployment pod host aliases | `[]` | | `server.composedTaskRunner.image.registry` | Spring Cloud Dataflow Composed Task Runner image registry | `docker.io` | | `server.composedTaskRunner.image.repository` | Spring Cloud Dataflow Composed Task Runner image repository | `bitnami/spring-cloud-dataflow-composed-task-runner` | -| `server.composedTaskRunner.image.tag` | Spring Cloud Dataflow Composed Task Runner image tag (immutable tags are recommended) | `2.11.0-debian-11-r5` | +| `server.composedTaskRunner.image.tag` | Spring Cloud Dataflow Composed Task Runner image tag (immutable tags are recommended) | `2.11.0-debian-11-r13` | | `server.composedTaskRunner.image.digest` | Spring Cloud Dataflow Composed Task Runner image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `server.configuration.streamingEnabled` | Enables or disables streaming data processing | `true` | | `server.configuration.batchEnabled` | Enables or disables batch data (tasks and schedules) processing | `true` | @@ -192,7 +192,7 @@ helm uninstall my-release | `skipper.hostAliases` | Deployment pod host aliases | `[]` | | `skipper.image.registry` | Spring Cloud Skipper image registry | `docker.io` | | `skipper.image.repository` | Spring Cloud Skipper image repository | `bitnami/spring-cloud-skipper` | -| `skipper.image.tag` | Spring Cloud Skipper image tag (immutable tags are recommended) | `2.9.3-debian-11-r131` | +| `skipper.image.tag` | Spring Cloud Skipper image tag (immutable tags are recommended) | `2.11.0-debian-11-r2` | | `skipper.image.digest` | Spring Cloud Skipper image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `skipper.image.pullPolicy` | Spring Cloud Skipper image pull policy | `IfNotPresent` | | `skipper.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -313,7 +313,7 @@ helm uninstall my-release | `metrics.enabled` | Enable Prometheus metrics | `false` | | `metrics.image.registry` | Prometheus Rsocket Proxy image registry | `docker.io` | | `metrics.image.repository` | Prometheus Rsocket Proxy image repository | `bitnami/prometheus-rsocket-proxy` | -| `metrics.image.tag` | Prometheus Rsocket Proxy image tag (immutable tags are recommended) | `1.5.2-debian-11-r74` | +| `metrics.image.tag` | Prometheus Rsocket Proxy image tag (immutable tags are recommended) | `1.5.2-debian-11-r84` | | `metrics.image.digest` | Prometheus Rsocket Proxy image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Prometheus Rsocket Proxy image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -385,17 +385,17 @@ helm uninstall my-release ### Init Container parameters -| Name | Description | Value | -| ------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------- | --------------------- | -| `waitForBackends.enabled` | Wait for the database and other services (such as Kafka or RabbitMQ) used when enabling streaming | `true` | -| `waitForBackends.image.registry` | Init container wait-for-backend image registry | `docker.io` | -| `waitForBackends.image.repository` | Init container wait-for-backend image name | `bitnami/kubectl` | -| `waitForBackends.image.tag` | Init container wait-for-backend image tag | `1.28.2-debian-11-r5` | -| `waitForBackends.image.digest` | Init container wait-for-backend image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `waitForBackends.image.pullPolicy` | Init container wait-for-backend image pull policy | `IfNotPresent` | -| `waitForBackends.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `waitForBackends.resources.limits` | Init container wait-for-backend resource limits | `{}` | -| `waitForBackends.resources.requests` | Init container wait-for-backend resource requests | `{}` | +| Name | Description | Value | +| ------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | +| `waitForBackends.enabled` | Wait for the database and other services (such as Kafka or RabbitMQ) used when enabling streaming | `true` | +| `waitForBackends.image.registry` | Init container wait-for-backend image registry | `docker.io` | +| `waitForBackends.image.repository` | Init container wait-for-backend image name | `bitnami/kubectl` | +| `waitForBackends.image.tag` | Init container wait-for-backend image tag | `1.28.2-debian-11-r15` | +| `waitForBackends.image.digest` | Init container wait-for-backend image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `waitForBackends.image.pullPolicy` | Init container wait-for-backend image pull policy | `IfNotPresent` | +| `waitForBackends.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `waitForBackends.resources.limits` | Init container wait-for-backend resource limits | `{}` | +| `waitForBackends.resources.requests` | Init container wait-for-backend resource requests | `{}` | ### Database parameters @@ -404,7 +404,7 @@ helm uninstall my-release | `mariadb.enabled` | Enable/disable MariaDB chart installation | `true` | | `mariadb.image.registry` | MariaDB image registry | `docker.io` | | `mariadb.image.repository` | MariaDB image repository | `bitnami/mariadb` | -| `mariadb.image.tag` | MariaDB image tag (immutable tags are recommended) | `10.11.5-debian-11-r39` | +| `mariadb.image.tag` | MariaDB image tag (immutable tags are recommended) | `10.11.5-debian-11-r49` | | `mariadb.image.digest` | MariaDB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `mariadb.architecture` | MariaDB architecture. Allowed values: `standalone` or `replication` | `standalone` | | `mariadb.auth.rootPassword` | Password for the MariaDB `root` user | `""` | @@ -662,6 +662,10 @@ Find more information about how to deal with common errors related to Bitnami He If you enabled RabbitMQ chart to be used as the messaging solution for Skipper to manage streaming content, then it's necessary to set the `rabbitmq.auth.password` and `rabbitmq.auth.erlangCookie` parameters when upgrading for readiness/liveness probes to work properly. Inspect the RabbitMQ secret to obtain the password and the Erlang cookie, then you can upgrade your chart using the command below: +### To 24.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 23.0.0 This major updates the Kafka subchart to its newest major, 25.0.0. For more information on this subchart's major, please refer to [Kafka upgrade notes](https://github.com/bitnami/charts/tree/main/bitnami/kafka#to-2500). diff --git a/bitnami/spring-cloud-dataflow/values.yaml b/bitnami/spring-cloud-dataflow/values.yaml index df68f77a2dc298..99f84934bd0e3b 100644 --- a/bitnami/spring-cloud-dataflow/values.yaml +++ b/bitnami/spring-cloud-dataflow/values.yaml @@ -61,7 +61,7 @@ server: image: registry: docker.io repository: bitnami/spring-cloud-dataflow - tag: 2.11.0-debian-11-r0 + tag: 2.11.0-debian-11-r7 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -93,7 +93,7 @@ server: image: registry: docker.io repository: bitnami/spring-cloud-dataflow-composed-task-runner - tag: 2.11.0-debian-11-r5 + tag: 2.11.0-debian-11-r13 digest: "" ## Spring Cloud Dataflow Server configuration parameters ## @@ -596,7 +596,7 @@ skipper: image: registry: docker.io repository: bitnami/spring-cloud-skipper - tag: 2.9.3-debian-11-r131 + tag: 2.11.0-debian-11-r2 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -1067,7 +1067,7 @@ metrics: image: registry: docker.io repository: bitnami/prometheus-rsocket-proxy - tag: 1.5.2-debian-11-r74 + tag: 1.5.2-debian-11-r84 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -1402,7 +1402,7 @@ waitForBackends: image: registry: docker.io repository: bitnami/kubectl - tag: 1.28.2-debian-11-r5 + tag: 1.28.2-debian-11-r15 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1455,7 +1455,7 @@ mariadb: image: registry: docker.io repository: bitnami/mariadb - tag: 10.11.5-debian-11-r39 + tag: 10.11.5-debian-11-r49 digest: "" ## @param mariadb.architecture MariaDB architecture. Allowed values: `standalone` or `replication` ## diff --git a/bitnami/suitecrm/Chart.lock b/bitnami/suitecrm/Chart.lock index 410f8774b839f4..1631f3c2023b7d 100644 --- a/bitnami/suitecrm/Chart.lock +++ b/bitnami/suitecrm/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.2 + version: 14.0.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.10.0 -digest: sha256:798b52fd077bfc503a72f4fa8d3a27cb1241c13a19f69325e86703e873b9e8e6 -generated: "2023-09-05T11:36:27.843725+02:00" + version: 2.13.2 +digest: sha256:7617e01cd06d41043c65d55055935e5b34bfb7a55014a5c7d8da13a52b7f070c +generated: "2023-10-10T15:31:36.562192334+02:00" diff --git a/bitnami/suitecrm/Chart.yaml b/bitnami/suitecrm/Chart.yaml index 80ad24bf5cb161..442cc6a82d729e 100644 --- a/bitnami/suitecrm/Chart.yaml +++ b/bitnami/suitecrm/Chart.yaml @@ -17,7 +17,7 @@ dependencies: - condition: mariadb.enabled name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.x.x + version: 14.x.x - name: common repository: oci://registry-1.docker.io/bitnamicharts tags: @@ -38,4 +38,4 @@ maintainers: name: suitecrm sources: - https://github.com/bitnami/charts/tree/main/bitnami/suitecrm -version: 13.1.1 +version: 14.0.0 diff --git a/bitnami/suitecrm/README.md b/bitnami/suitecrm/README.md index e8636e81248176..7314a50c22bdfd 100644 --- a/bitnami/suitecrm/README.md +++ b/bitnami/suitecrm/README.md @@ -417,6 +417,10 @@ Find more information about how to deal with common errors related to Bitnami's ## Upgrading +### To 14.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 13.0.0 This major release bumps the MariaDB version to 11.0. Follow the [upstream instructions](https://mariadb.com/kb/en/upgrading-from-mariadb-10-11-to-mariadb-11-0/) for upgrading from MariaDB 10.11 to 11.0. No major issues are expected during the upgrade. @@ -559,4 +563,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License. diff --git a/bitnami/supabase/Chart.lock b/bitnami/supabase/Chart.lock index 51b9d27f46fde8..88d39d09da7719 100644 --- a/bitnami/supabase/Chart.lock +++ b/bitnami/supabase/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: postgresql repository: oci://registry-1.docker.io/bitnamicharts - version: 13.0.0 + version: 13.1.2 - name: kong repository: oci://registry-1.docker.io/bitnamicharts - version: 9.5.4 + version: 10.0.0 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.0 -digest: sha256:f84926a7e938b9292cb7ce403326dd5827e34d106c032522901b991871ade38c -generated: "2023-09-29T10:43:18.129491+02:00" + version: 2.13.2 +digest: sha256:912d128f0d8991b8608acea995850d04f716c93c486e2cb47481d970181c25cb +generated: "2023-10-11T08:58:44.154685+02:00" diff --git a/bitnami/supabase/Chart.yaml b/bitnami/supabase/Chart.yaml index c3d9ed421fe0ec..4f0befba3b3ec8 100644 --- a/bitnami/supabase/Chart.yaml +++ b/bitnami/supabase/Chart.yaml @@ -6,27 +6,27 @@ annotations: licenses: Apache-2.0 images: | - name: gotrue - image: docker.io/bitnami/gotrue:1.0.1-debian-11-r204 + image: docker.io/bitnami/gotrue:1.0.1-debian-11-r214 - name: jwt-cli - image: docker.io/bitnami/jwt-cli:6.0.0-debian-11-r8 + image: docker.io/bitnami/jwt-cli:6.0.0-debian-11-r21 - name: kubectl - image: docker.io/bitnami/kubectl:1.28.2-debian-11-r5 + image: docker.io/bitnami/kubectl:1.28.2-debian-11-r14 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r77 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: postgrest - image: docker.io/bitnami/postgrest:11.2.0-debian-11-r42 + image: docker.io/bitnami/postgrest:11.2.1-debian-11-r0 - name: supabase-postgres-meta - image: docker.io/bitnami/supabase-postgres-meta:0.70.0-debian-11-r5 + image: docker.io/bitnami/supabase-postgres-meta:0.70.0-debian-11-r16 - name: supabase-postgres - image: docker.io/bitnami/supabase-postgres:15.1.0-debian-11-r165 + image: docker.io/bitnami/supabase-postgres:15.1.0-debian-11-r174 - name: supabase-realtime - image: docker.io/bitnami/supabase-realtime:2.22.21-debian-11-r2 + image: docker.io/bitnami/supabase-realtime:2.24.0-debian-11-r1 - name: supabase-storage - image: docker.io/bitnami/supabase-storage:0.41.7-debian-11-r2 + image: docker.io/bitnami/supabase-storage:0.42.1-debian-11-r1 - name: supabase-studio - image: docker.io/bitnami/supabase-studio:0.23.8-debian-11-r13 + image: docker.io/bitnami/supabase-studio:0.23.9-debian-11-r0 apiVersion: v2 -appVersion: 0.23.8 +appVersion: 0.23.9 dependencies: - condition: postgresql.enabled name: postgresql @@ -35,7 +35,7 @@ dependencies: - condition: kong.enabled name: kong repository: oci://registry-1.docker.io/bitnamicharts - version: 9.x.x + version: 10.x.x - name: common repository: oci://registry-1.docker.io/bitnamicharts tags: @@ -53,4 +53,4 @@ maintainers: name: supabase sources: - https://github.com/bitnami/charts/tree/main/bitnami/supabase -version: 1.0.0 +version: 2.0.0 \ No newline at end of file diff --git a/bitnami/supabase/README.md b/bitnami/supabase/README.md index 862e142a5f0808..39b2587c62db4a 100644 --- a/bitnami/supabase/README.md +++ b/bitnami/supabase/README.md @@ -86,47 +86,47 @@ The command removes all the Kubernetes components associated with the chart and ### Supabase Common parameters -| Name | Description | Value | -| -------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- | -| `jwt.secret` | The secret string used to sign JWT tokens | `""` | -| `jwt.anonKey` | JWT string for annonymous users | `""` | -| `jwt.serviceKey` | JWT string for service users | `""` | -| `jwt.autoGenerate.forceRun` | Force the run of the JWT generation job | `false` | -| `jwt.autoGenerate.image.registry` | JWT CLI image registry | `docker.io` | -| `jwt.autoGenerate.image.repository` | JWT CLI image repository | `bitnami/jwt-cli` | -| `jwt.autoGenerate.image.tag` | JWT CLI image tag (immutable tags are recommended) | `6.0.0-debian-11-r8` | -| `jwt.autoGenerate.image.digest` | JWT CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | -| `jwt.autoGenerate.image.pullPolicy` | JWT CLI image pull policy | `IfNotPresent` | -| `jwt.autoGenerate.image.pullSecrets` | JWT CLI image pull secrets | `[]` | -| `jwt.autoGenerate.kubectlImage.registry` | Kubectl image registry | `docker.io` | -| `jwt.autoGenerate.kubectlImage.repository` | Kubectl image repository | `bitnami/kubectl` | -| `jwt.autoGenerate.kubectlImage.tag` | Kubectl image tag (immutable tags are recommended) | `1.28.2-debian-11-r5` | -| `jwt.autoGenerate.kubectlImage.digest` | Kubectl image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `jwt.autoGenerate.kubectlImage.pullPolicy` | Kubectl image pull policy | `IfNotPresent` | -| `jwt.autoGenerate.kubectlImage.pullSecrets` | Kubectl image pull secrets | `[]` | -| `jwt.autoGenerate.backoffLimit` | set backoff limit of the job | `10` | -| `jwt.autoGenerate.extraVolumes` | Optionally specify extra list of additional volumes for the jwt init job | `[]` | -| `jwt.autoGenerate.containerSecurityContext.enabled` | Enabled jwt init job containers' Security Context | `true` | -| `jwt.autoGenerate.containerSecurityContext.runAsUser` | Set jwt init job containers' Security Context runAsUser | `1001` | -| `jwt.autoGenerate.containerSecurityContext.runAsNonRoot` | Set jwt init job containers' Security Context runAsNonRoot | `true` | -| `jwt.autoGenerate.containerSecurityContext.readOnlyRootFilesystem` | Set jwt init job containers' Security Context runAsNonRoot | `false` | -| `jwt.autoGenerate.containerSecurityContext.allowPrivilegeEscalation` | Set container's privilege escalation | `false` | -| `jwt.autoGenerate.containerSecurityContext.capabilities.drop` | Set container's Security Context runAsNonRoot | `["ALL"]` | -| `jwt.autoGenerate.podSecurityContext.enabled` | Enabled jwt init job pods' Security Context | `true` | -| `jwt.autoGenerate.podSecurityContext.fsGroup` | Set jwt init job pod's Security Context fsGroup | `1001` | -| `jwt.autoGenerate.podSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `jwt.autoGenerate.extraEnvVars` | Array containing extra env vars to configure the jwt init job | `[]` | -| `jwt.autoGenerate.extraEnvVarsCM` | ConfigMap containing extra env vars to configure the jwt init job | `""` | -| `jwt.autoGenerate.extraEnvVarsSecret` | Secret containing extra env vars to configure the jwt init job (in case of sensitive data) | `""` | -| `jwt.autoGenerate.extraVolumeMounts` | Array of extra volume mounts to be added to the jwt Container (evaluated as template). Normally used with `extraVolumes`. | `[]` | -| `jwt.autoGenerate.resources.limits` | The resources limits for the container | `{}` | -| `jwt.autoGenerate.resources.requests` | The requested resources for the container | `{}` | -| `jwt.autoGenerate.hostAliases` | Add deployment host aliases | `[]` | -| `jwt.autoGenerate.annotations` | Add annotations to the job | `{}` | -| `jwt.autoGenerate.podLabels` | Additional pod labels | `{}` | -| `jwt.autoGenerate.podAnnotations` | Additional pod annotations | `{}` | -| `publicURL` | Supabase API public URL | `""` | -| `dbSSL` | Supabase API database connection mode for SSL. Applied to all components. Allowed values: verify-ca, verify-full, disable, allow, prefer, require | `disable` | +| Name | Description | Value | +| -------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | +| `jwt.secret` | The secret string used to sign JWT tokens | `""` | +| `jwt.anonKey` | JWT string for annonymous users | `""` | +| `jwt.serviceKey` | JWT string for service users | `""` | +| `jwt.autoGenerate.forceRun` | Force the run of the JWT generation job | `false` | +| `jwt.autoGenerate.image.registry` | JWT CLI image registry | `docker.io` | +| `jwt.autoGenerate.image.repository` | JWT CLI image repository | `bitnami/jwt-cli` | +| `jwt.autoGenerate.image.tag` | JWT CLI image tag (immutable tags are recommended) | `6.0.0-debian-11-r21` | +| `jwt.autoGenerate.image.digest` | JWT CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | +| `jwt.autoGenerate.image.pullPolicy` | JWT CLI image pull policy | `IfNotPresent` | +| `jwt.autoGenerate.image.pullSecrets` | JWT CLI image pull secrets | `[]` | +| `jwt.autoGenerate.kubectlImage.registry` | Kubectl image registry | `docker.io` | +| `jwt.autoGenerate.kubectlImage.repository` | Kubectl image repository | `bitnami/kubectl` | +| `jwt.autoGenerate.kubectlImage.tag` | Kubectl image tag (immutable tags are recommended) | `1.28.2-debian-11-r14` | +| `jwt.autoGenerate.kubectlImage.digest` | Kubectl image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `jwt.autoGenerate.kubectlImage.pullPolicy` | Kubectl image pull policy | `IfNotPresent` | +| `jwt.autoGenerate.kubectlImage.pullSecrets` | Kubectl image pull secrets | `[]` | +| `jwt.autoGenerate.backoffLimit` | set backoff limit of the job | `10` | +| `jwt.autoGenerate.extraVolumes` | Optionally specify extra list of additional volumes for the jwt init job | `[]` | +| `jwt.autoGenerate.containerSecurityContext.enabled` | Enabled jwt init job containers' Security Context | `true` | +| `jwt.autoGenerate.containerSecurityContext.runAsUser` | Set jwt init job containers' Security Context runAsUser | `1001` | +| `jwt.autoGenerate.containerSecurityContext.runAsNonRoot` | Set jwt init job containers' Security Context runAsNonRoot | `true` | +| `jwt.autoGenerate.containerSecurityContext.readOnlyRootFilesystem` | Set jwt init job containers' Security Context runAsNonRoot | `false` | +| `jwt.autoGenerate.containerSecurityContext.allowPrivilegeEscalation` | Set container's privilege escalation | `false` | +| `jwt.autoGenerate.containerSecurityContext.capabilities.drop` | Set container's Security Context runAsNonRoot | `["ALL"]` | +| `jwt.autoGenerate.podSecurityContext.enabled` | Enabled jwt init job pods' Security Context | `true` | +| `jwt.autoGenerate.podSecurityContext.fsGroup` | Set jwt init job pod's Security Context fsGroup | `1001` | +| `jwt.autoGenerate.podSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `jwt.autoGenerate.extraEnvVars` | Array containing extra env vars to configure the jwt init job | `[]` | +| `jwt.autoGenerate.extraEnvVarsCM` | ConfigMap containing extra env vars to configure the jwt init job | `""` | +| `jwt.autoGenerate.extraEnvVarsSecret` | Secret containing extra env vars to configure the jwt init job (in case of sensitive data) | `""` | +| `jwt.autoGenerate.extraVolumeMounts` | Array of extra volume mounts to be added to the jwt Container (evaluated as template). Normally used with `extraVolumes`. | `[]` | +| `jwt.autoGenerate.resources.limits` | The resources limits for the container | `{}` | +| `jwt.autoGenerate.resources.requests` | The requested resources for the container | `{}` | +| `jwt.autoGenerate.hostAliases` | Add deployment host aliases | `[]` | +| `jwt.autoGenerate.annotations` | Add annotations to the job | `{}` | +| `jwt.autoGenerate.podLabels` | Additional pod labels | `{}` | +| `jwt.autoGenerate.podAnnotations` | Additional pod annotations | `{}` | +| `publicURL` | Supabase API public URL | `""` | +| `dbSSL` | Supabase API database connection mode for SSL. Applied to all components. Allowed values: verify-ca, verify-full, disable, allow, prefer, require | `disable` | ### Supabase Auth Parameters @@ -140,7 +140,7 @@ The command removes all the Kubernetes components associated with the chart and | `auth.extraConfigExistingConfigmap` | The name of an existing ConfigMap with extra configuration | `""` | | `auth.image.registry` | Gotrue image registry | `docker.io` | | `auth.image.repository` | Gotrue image repository | `bitnami/gotrue` | -| `auth.image.tag` | Gotrue image tag (immutable tags are recommended) | `1.0.1-debian-11-r204` | +| `auth.image.tag` | Gotrue image tag (immutable tags are recommended) | `1.0.1-debian-11-r214` | | `auth.image.digest` | Gotrue image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `auth.image.pullPolicy` | Gotrue image pull policy | `IfNotPresent` | | `auth.image.pullSecrets` | Gotrue image pull secrets | `[]` | @@ -229,7 +229,7 @@ The command removes all the Kubernetes components associated with the chart and | `meta.extraConfigExistingConfigmap` | The name of an existing ConfigMap with extra configuration | `""` | | `meta.image.registry` | Supabase Postgres Meta image registry | `docker.io` | | `meta.image.repository` | Supabase Postgres Meta image repository | `bitnami/supabase-postgres-meta` | -| `meta.image.tag` | Supabase Postgres Meta image tag (immutable tags are recommended) | `0.70.0-debian-11-r5` | +| `meta.image.tag` | Supabase Postgres Meta image tag (immutable tags are recommended) | `0.70.0-debian-11-r16` | | `meta.image.digest` | Supabase Postgres Meta image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `meta.image.pullPolicy` | Supabase Postgres Meta image pull policy | `IfNotPresent` | | `meta.image.pullSecrets` | Supabase Postgres Meta image pull secrets | `[]` | @@ -321,7 +321,7 @@ The command removes all the Kubernetes components associated with the chart and | `realtime.extraConfigExistingConfigmap` | The name of an existing ConfigMap with extra configuration | `""` | | `realtime.image.registry` | Realtime image registry | `docker.io` | | `realtime.image.repository` | Realtime image repository | `bitnami/supabase-realtime` | -| `realtime.image.tag` | Realtime image tag (immutable tags are recommended) | `2.22.21-debian-11-r2` | +| `realtime.image.tag` | Realtime image tag (immutable tags are recommended) | `2.24.0-debian-11-r1` | | `realtime.image.digest` | Realtime image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `realtime.image.pullPolicy` | Realtime image pull policy | `IfNotPresent` | | `realtime.image.pullSecrets` | Realtime image pull secrets | `[]` | @@ -400,76 +400,76 @@ The command removes all the Kubernetes components associated with the chart and ### Supabase Rest Parameters -| Name | Description | Value | -| ------------------------------------------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | -| `rest.enabled` | Enable Supabase rest | `true` | -| `rest.replicaCount` | Number of Supabase rest replicas to deploy | `1` | -| `rest.defaultConfig` | Default configuration for the Supabase rest service | `""` | -| `rest.extraConfig` | Extra configuration for the Supabase rest service | `{}` | -| `rest.existingConfigmap` | The name of an existing ConfigMap with the default configuration | `""` | -| `rest.extraConfigExistingConfigmap` | The name of an existing ConfigMap with extra configuration | `""` | -| `rest.image.registry` | PostgREST image registry | `docker.io` | -| `rest.image.repository` | PostgREST image repository | `bitnami/postgrest` | -| `rest.image.tag` | PostgREST image tag (immutable tags are recommended) | `11.2.0-debian-11-r42` | -| `rest.image.digest` | PostgREST image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | -| `rest.image.pullPolicy` | PostgREST image pull policy | `IfNotPresent` | -| `rest.image.pullSecrets` | PostgREST image pull secrets | `[]` | -| `rest.containerPorts.http` | Supabase rest HTTP container port | `3000` | -| `rest.livenessProbe.enabled` | Enable livenessProbe on Supabase rest containers | `true` | -| `rest.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` | -| `rest.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `rest.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | -| `rest.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `rest.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `rest.readinessProbe.enabled` | Enable readinessProbe on Supabase rest containers | `true` | -| `rest.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` | -| `rest.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | -| `rest.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` | -| `rest.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `rest.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `rest.startupProbe.enabled` | Enable startupProbe on Supabase rest containers | `false` | -| `rest.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | -| `rest.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | -| `rest.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | -| `rest.startupProbe.failureThreshold` | Failure threshold for startupProbe | `6` | -| `rest.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `rest.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `rest.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `rest.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `rest.resources.limits` | The resources limits for the Supabase rest containers | `{}` | -| `rest.resources.requests` | The requested resources for the Supabase rest containers | `{}` | -| `rest.podSecurityContext.enabled` | Enabled Supabase rest pods' Security Context | `true` | -| `rest.podSecurityContext.fsGroup` | Set Supabase rest pod's Security Context fsGroup | `1001` | -| `rest.containerSecurityContext.enabled` | Enabled Supabase rest containers' Security Context | `true` | -| `rest.containerSecurityContext.runAsUser` | Set Supabase rest containers' Security Context runAsUser | `1001` | -| `rest.containerSecurityContext.runAsNonRoot` | Set Supabase rest containers' Security Context runAsNonRoot | `true` | -| `rest.containerSecurityContext.readOnlyRootFilesystem` | Set Supabase rest containers' Security Context runAsNonRoot | `false` | -| `rest.command` | Override default container command (useful when using custom images) | `[]` | -| `rest.args` | Override default container args (useful when using custom images) | `[]` | -| `rest.hostAliases` | Supabase rest pods host aliases | `[]` | -| `rest.podLabels` | Extra labels for Supabase rest pods | `{}` | -| `rest.podAnnotations` | Annotations for Supabase rest pods | `{}` | -| `rest.podAffinityPreset` | Pod affinity preset. Ignored if `rest.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `rest.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `rest.affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `rest.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `rest.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `rest.nodeAffinityPreset.key` | Node label key to match. Ignored if `rest.affinity` is set | `""` | -| `rest.nodeAffinityPreset.values` | Node label values to match. Ignored if `rest.affinity` is set | `[]` | -| `rest.affinity` | Affinity for Supabase rest pods assignment | `{}` | -| `rest.nodeSelector` | Node labels for Supabase rest pods assignment | `{}` | -| `rest.tolerations` | Tolerations for Supabase rest pods assignment | `[]` | -| `rest.updateStrategy.type` | Supabase rest statefulset strategy type | `RollingUpdate` | -| `rest.priorityClassName` | Supabase rest pods' priorityClassName | `""` | -| `rest.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | -| `rest.schedulerName` | Name of the k8s scheduler (other than default) for Supabase rest pods | `""` | -| `rest.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | -| `rest.lifecycleHooks` | for the Supabase rest container(s) to automate configuration before or after startup | `{}` | -| `rest.extraEnvVars` | Array with extra environment variables to add to Supabase rest nodes | `[]` | -| `rest.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Supabase rest nodes | `""` | -| `rest.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Supabase rest nodes | `""` | -| `rest.extraVolumes` | Optionally specify extra list of additional volumes for the Supabase rest pod(s) | `[]` | -| `rest.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Supabase rest container(s) | `[]` | -| `rest.sidecars` | Add additional sidecar containers to the Supabase rest pod(s) | `[]` | -| `rest.initContainers` | Add additional init containers to the Supabase rest pod(s) | `[]` | +| Name | Description | Value | +| ------------------------------------------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- | +| `rest.enabled` | Enable Supabase rest | `true` | +| `rest.replicaCount` | Number of Supabase rest replicas to deploy | `1` | +| `rest.defaultConfig` | Default configuration for the Supabase rest service | `""` | +| `rest.extraConfig` | Extra configuration for the Supabase rest service | `{}` | +| `rest.existingConfigmap` | The name of an existing ConfigMap with the default configuration | `""` | +| `rest.extraConfigExistingConfigmap` | The name of an existing ConfigMap with extra configuration | `""` | +| `rest.image.registry` | PostgREST image registry | `docker.io` | +| `rest.image.repository` | PostgREST image repository | `bitnami/postgrest` | +| `rest.image.tag` | PostgREST image tag (immutable tags are recommended) | `11.2.1-debian-11-r0` | +| `rest.image.digest` | PostgREST image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | +| `rest.image.pullPolicy` | PostgREST image pull policy | `IfNotPresent` | +| `rest.image.pullSecrets` | PostgREST image pull secrets | `[]` | +| `rest.containerPorts.http` | Supabase rest HTTP container port | `3000` | +| `rest.livenessProbe.enabled` | Enable livenessProbe on Supabase rest containers | `true` | +| `rest.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` | +| `rest.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `rest.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | +| `rest.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `rest.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `rest.readinessProbe.enabled` | Enable readinessProbe on Supabase rest containers | `true` | +| `rest.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` | +| `rest.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | +| `rest.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` | +| `rest.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `rest.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `rest.startupProbe.enabled` | Enable startupProbe on Supabase rest containers | `false` | +| `rest.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | +| `rest.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | +| `rest.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | +| `rest.startupProbe.failureThreshold` | Failure threshold for startupProbe | `6` | +| `rest.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `rest.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `rest.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `rest.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `rest.resources.limits` | The resources limits for the Supabase rest containers | `{}` | +| `rest.resources.requests` | The requested resources for the Supabase rest containers | `{}` | +| `rest.podSecurityContext.enabled` | Enabled Supabase rest pods' Security Context | `true` | +| `rest.podSecurityContext.fsGroup` | Set Supabase rest pod's Security Context fsGroup | `1001` | +| `rest.containerSecurityContext.enabled` | Enabled Supabase rest containers' Security Context | `true` | +| `rest.containerSecurityContext.runAsUser` | Set Supabase rest containers' Security Context runAsUser | `1001` | +| `rest.containerSecurityContext.runAsNonRoot` | Set Supabase rest containers' Security Context runAsNonRoot | `true` | +| `rest.containerSecurityContext.readOnlyRootFilesystem` | Set Supabase rest containers' Security Context runAsNonRoot | `false` | +| `rest.command` | Override default container command (useful when using custom images) | `[]` | +| `rest.args` | Override default container args (useful when using custom images) | `[]` | +| `rest.hostAliases` | Supabase rest pods host aliases | `[]` | +| `rest.podLabels` | Extra labels for Supabase rest pods | `{}` | +| `rest.podAnnotations` | Annotations for Supabase rest pods | `{}` | +| `rest.podAffinityPreset` | Pod affinity preset. Ignored if `rest.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `rest.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `rest.affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `rest.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `rest.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `rest.nodeAffinityPreset.key` | Node label key to match. Ignored if `rest.affinity` is set | `""` | +| `rest.nodeAffinityPreset.values` | Node label values to match. Ignored if `rest.affinity` is set | `[]` | +| `rest.affinity` | Affinity for Supabase rest pods assignment | `{}` | +| `rest.nodeSelector` | Node labels for Supabase rest pods assignment | `{}` | +| `rest.tolerations` | Tolerations for Supabase rest pods assignment | `[]` | +| `rest.updateStrategy.type` | Supabase rest statefulset strategy type | `RollingUpdate` | +| `rest.priorityClassName` | Supabase rest pods' priorityClassName | `""` | +| `rest.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | +| `rest.schedulerName` | Name of the k8s scheduler (other than default) for Supabase rest pods | `""` | +| `rest.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | +| `rest.lifecycleHooks` | for the Supabase rest container(s) to automate configuration before or after startup | `{}` | +| `rest.extraEnvVars` | Array with extra environment variables to add to Supabase rest nodes | `[]` | +| `rest.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Supabase rest nodes | `""` | +| `rest.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Supabase rest nodes | `""` | +| `rest.extraVolumes` | Optionally specify extra list of additional volumes for the Supabase rest pod(s) | `[]` | +| `rest.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Supabase rest container(s) | `[]` | +| `rest.sidecars` | Add additional sidecar containers to the Supabase rest pod(s) | `[]` | +| `rest.initContainers` | Add additional init containers to the Supabase rest pod(s) | `[]` | ### Supabase Rest Traffic Exposure Parameters @@ -499,7 +499,7 @@ The command removes all the Kubernetes components associated with the chart and | `storage.extraConfigExistingConfigmap` | The name of an existing ConfigMap with extra configuration | `""` | | `storage.image.registry` | Storage image registry | `docker.io` | | `storage.image.repository` | Storage image repository | `bitnami/supabase-storage` | -| `storage.image.tag` | Storage image tag (immutable tags are recommended) | `0.41.7-debian-11-r2` | +| `storage.image.tag` | Storage image tag (immutable tags are recommended) | `0.42.1-debian-11-r1` | | `storage.image.digest` | Storage image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `storage.image.pullPolicy` | Storage image pull policy | `IfNotPresent` | | `storage.image.pullSecrets` | Storage image pull secrets | `[]` | @@ -604,7 +604,7 @@ The command removes all the Kubernetes components associated with the chart and | `studio.extraConfigExistingConfigmap` | The name of an existing ConfigMap with extra configuration | `""` | | `studio.image.registry` | Studio image registry | `docker.io` | | `studio.image.repository` | Studio image repository | `bitnami/supabase-studio` | -| `studio.image.tag` | Studio image tag (immutable tags are recommended) | `0.23.8-debian-11-r13` | +| `studio.image.tag` | Studio image tag (immutable tags are recommended) | `0.23.9-debian-11-r0` | | `studio.image.digest` | Studio image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `studio.image.pullPolicy` | Studio image pull policy | `IfNotPresent` | | `studio.image.pullSecrets` | Studio image pull secrets | `[]` | @@ -701,7 +701,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r77` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | | `volumePermissions.resources.limits` | The resources limits for the init container | `{}` | @@ -710,7 +710,7 @@ The command removes all the Kubernetes components associated with the chart and | `psqlImage.registry` | PostgreSQL client image registry | `docker.io` | | `psqlImage.repository` | PostgreSQL client image repository | `bitnami/supabase-postgres` | | `psqlImage.digest` | PostgreSQL client image digest (overrides image tag) | `""` | -| `psqlImage.tag` | PostgreSQL client image tag (immutable tags are recommended) | `15.1.0-debian-11-r165` | +| `psqlImage.tag` | PostgreSQL client image tag (immutable tags are recommended) | `15.1.0-debian-11-r174` | | `psqlImage.pullPolicy` | PostgreSQL client image pull policy | `IfNotPresent` | | `psqlImage.pullSecrets` | PostgreSQL client image pull secrets | `[]` | | `psqlImage.debug` | Enable PostgreSQL client image debug mode | `false` | @@ -754,7 +754,7 @@ The command removes all the Kubernetes components associated with the chart and | `postgresql.service.ports.postgresql` | PostgreSQL service port | `5432` | | `postgresql.image.registry` | PostgreSQL image registry | `docker.io` | | `postgresql.image.repository` | PostgreSQL image repository | `bitnami/supabase-postgres` | -| `postgresql.image.tag` | PostgreSQL image tag (immutable tags are recommended) | `15.1.0-debian-11-r165` | +| `postgresql.image.tag` | PostgreSQL image tag (immutable tags are recommended) | `15.1.0-debian-11-r174` | | `postgresql.image.digest` | PostgreSQL image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `postgresql.image.pullPolicy` | PostgreSQL image pull policy | `IfNotPresent` | | `postgresql.image.pullSecrets` | Specify image pull secrets | `[]` | @@ -770,7 +770,7 @@ The command removes all the Kubernetes components associated with the chart and | `externalDatabase.password` | Password for the non-root username for PostgreSQL | `""` | | `externalDatabase.database` | PostgreSQL database name | `postgres` | | `externalDatabase.existingSecret` | Name of an existing secret resource containing the database credentials | `""` | -| `externalDatabase.existingSecretPasswordKey` | Name of an existing secret key containing the database credentials | `db-password` | +| `externalDatabase.existingSecretPasswordKey` | Name of an existing secret key containing the database credentials | `""` | The above parameters map to the env variables defined in [bitnami/supabase-studio](https://github.com/bitnami/containers/tree/main/bitnami/supabase-studio). For more information please refer to the [bitnami/supabase-studio](https://github.com/bitnami/containers/tree/main/bitnami/supabase-studio) image documentation. @@ -860,6 +860,10 @@ Find more information about how to deal with common errors related to Bitnami's ## Upgrading +### To 2.0.0 + +This major updates the Kong subchart to its newest major, 10.0.0. [Here](https://github.com/bitnami/charts/tree/master/bitnami/kong#to-1000) you can find more information about the changes introduced in that version. + ### To 1.0.0 This major updates the PostgreSQL subchart to its newest major, 13.0.0. [Here](https://github.com/bitnami/charts/tree/master/bitnami/postgresql#to-1300) you can find more information about the changes introduced in that version. @@ -878,4 +882,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/supabase/templates/_helpers.tpl b/bitnami/supabase/templates/_helpers.tpl index 85d17befc4d5e8..de597a87f07e94 100644 --- a/bitnami/supabase/templates/_helpers.tpl +++ b/bitnami/supabase/templates/_helpers.tpl @@ -536,10 +536,10 @@ Retrieve key of the postgresql secret {{- if .Values.externalDatabase.existingSecretPasswordKey -}} {{- printf "%s" .Values.externalDatabase.existingSecretPasswordKey -}} {{- else -}} - {{- print "postgres-password" -}} + {{- print "db-password" -}} {{- end -}} {{- else -}} - {{- print "postgres-password" -}} + {{- print "db-password" -}} {{- end -}} {{- end -}} {{- end -}} diff --git a/bitnami/supabase/templates/externaldb-secrets.yaml b/bitnami/supabase/templates/externaldb-secrets.yaml index 985da9dc4e0656..aadbcec8f77042 100644 --- a/bitnami/supabase/templates/externaldb-secrets.yaml +++ b/bitnami/supabase/templates/externaldb-secrets.yaml @@ -16,5 +16,5 @@ metadata: {{- end }} type: Opaque data: - db-password: {{ .Values.externalDatabase.password | b64enc | quote }} + {{- printf "%s: %s" (include "supabase.database.passwordKey" .) (quote (b64enc .Values.externalDatabase.password)) | nindent 2 }} {{- end }} diff --git a/bitnami/supabase/values.yaml b/bitnami/supabase/values.yaml index 133a3ba3a66182..9f5c57fd53e0a7 100644 --- a/bitnami/supabase/values.yaml +++ b/bitnami/supabase/values.yaml @@ -107,7 +107,7 @@ jwt: image: registry: docker.io repository: bitnami/jwt-cli - tag: 6.0.0-debian-11-r8 + tag: 6.0.0-debian-11-r21 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -134,7 +134,7 @@ jwt: ## registry: docker.io repository: bitnami/kubectl - tag: 1.28.2-debian-11-r5 + tag: 1.28.2-debian-11-r14 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -296,7 +296,7 @@ auth: image: registry: docker.io repository: bitnami/gotrue - tag: 1.0.1-debian-11-r204 + tag: 1.0.1-debian-11-r214 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -620,7 +620,7 @@ meta: image: registry: docker.io repository: bitnami/supabase-postgres-meta - tag: 0.70.0-debian-11-r5 + tag: 0.70.0-debian-11-r16 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -963,7 +963,7 @@ realtime: image: registry: docker.io repository: bitnami/supabase-realtime - tag: 2.22.21-debian-11-r2 + tag: 2.24.0-debian-11-r1 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1285,7 +1285,7 @@ rest: image: registry: docker.io repository: bitnami/postgrest - tag: 11.2.0-debian-11-r42 + tag: 11.2.1-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1612,7 +1612,7 @@ storage: image: registry: docker.io repository: bitnami/supabase-storage - tag: 0.41.7-debian-11-r2 + tag: 0.42.1-debian-11-r1 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -1986,7 +1986,7 @@ studio: image: registry: docker.io repository: bitnami/supabase-studio - tag: 0.23.8-debian-11-r13 + tag: 0.23.9-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2389,7 +2389,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r77 + tag: 11-debian-11-r89 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. @@ -2430,7 +2430,7 @@ volumePermissions: psqlImage: registry: docker.io repository: bitnami/supabase-postgres - tag: 15.1.0-debian-11-r165 + tag: 15.1.0-debian-11-r174 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2594,7 +2594,7 @@ postgresql: image: registry: docker.io repository: bitnami/supabase-postgres - tag: 15.1.0-debian-11-r165 + tag: 15.1.0-debian-11-r174 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -2649,4 +2649,4 @@ externalDatabase: database: postgres password: "" existingSecret: "" - existingSecretPasswordKey: "db-password" + existingSecretPasswordKey: "" diff --git a/bitnami/thanos/Chart.lock b/bitnami/thanos/Chart.lock index afc9d7328b12cf..3556ff68d65f9f 100644 --- a/bitnami/thanos/Chart.lock +++ b/bitnami/thanos/Chart.lock @@ -4,6 +4,6 @@ dependencies: version: 12.8.12 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:24fa521170111e9bad4ea2beb7fb83b14f0225cad012cb519bc9b78840ee5131 -generated: "2023-10-04T19:47:11.74244914Z" + version: 2.13.2 +digest: sha256:f556f0b1f79861dd21e6fdb9f26fa1b168dd7424d0523f37273bc0cd6e2fe708 +generated: "2023-10-09T22:34:32.161208838Z" diff --git a/bitnami/thanos/Chart.yaml b/bitnami/thanos/Chart.yaml index 3bf2073a9eb8ba..6b33bb4b35dd03 100644 --- a/bitnami/thanos/Chart.yaml +++ b/bitnami/thanos/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: thanos - image: docker.io/bitnami/thanos:0.32.4-debian-11-r0 + image: docker.io/bitnami/thanos:0.32.4-debian-11-r2 apiVersion: v2 appVersion: 0.32.4 dependencies: @@ -35,4 +35,4 @@ maintainers: name: thanos sources: - https://github.com/bitnami/charts/tree/main/bitnami/thanos -version: 12.13.7 +version: 12.13.9 diff --git a/bitnami/thanos/README.md b/bitnami/thanos/README.md index e8ec1c23a18870..01889a854e14b9 100644 --- a/bitnami/thanos/README.md +++ b/bitnami/thanos/README.md @@ -109,7 +109,7 @@ Check the section [Integrate Thanos with Prometheus and Alertmanager](#integrate | --------------------------------------------- | ------------------------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | Thanos image registry | `docker.io` | | `image.repository` | Thanos image repository | `bitnami/thanos` | -| `image.tag` | Thanos image tag (immutable tags are recommended) | `0.32.4-debian-11-r0` | +| `image.tag` | Thanos image tag (immutable tags are recommended) | `0.32.4-debian-11-r2` | | `image.digest` | Thanos image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Thanos image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -1187,7 +1187,7 @@ Check the section [Integrate Thanos with Prometheus and Alertmanager](#integrate | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r86` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/thanos/values.yaml b/bitnami/thanos/values.yaml index 9fc5f62b5df7e8..4a89c079a141d0 100644 --- a/bitnami/thanos/values.yaml +++ b/bitnami/thanos/values.yaml @@ -57,7 +57,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/thanos - tag: 0.32.4-debian-11-r0 + tag: 0.32.4-debian-11-r2 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -4259,7 +4259,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images diff --git a/bitnami/tomcat/Chart.lock b/bitnami/tomcat/Chart.lock index c49fadf05dcb7b..73f9c62685c096 100644 --- a/bitnami/tomcat/Chart.lock +++ b/bitnami/tomcat/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:eba5a1f693000386eaa87ad6e7864e5831cc41f32c07bfec159b5ff01fcd0ce5 -generated: "2023-10-04T19:50:12.009278549Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T21:56:34.987847613Z" diff --git a/bitnami/tomcat/Chart.yaml b/bitnami/tomcat/Chart.yaml index db1c45060abbd0..3bac77c60d0713 100644 --- a/bitnami/tomcat/Chart.yaml +++ b/bitnami/tomcat/Chart.yaml @@ -8,11 +8,11 @@ annotations: - name: jmx-exporter image: docker.io/bitnami/jmx-exporter:0.19.0-debian-11-r92 - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: tomcat - image: docker.io/bitnami/tomcat:10.1.13-debian-11-r35 + image: docker.io/bitnami/tomcat:10.1.14-debian-11-r0 apiVersion: v2 -appVersion: 10.1.13 +appVersion: 10.1.14 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -35,4 +35,4 @@ maintainers: name: tomcat sources: - https://github.com/bitnami/charts/tree/main/bitnami/tomcat -version: 10.10.5 +version: 10.10.8 diff --git a/bitnami/tomcat/README.md b/bitnami/tomcat/README.md index 6de7ea8111c94f..6637c64d9a2971 100644 --- a/bitnami/tomcat/README.md +++ b/bitnami/tomcat/README.md @@ -77,25 +77,25 @@ The command removes all the Kubernetes components associated with the chart and ### Tomcat parameters -| Name | Description | Value | -| ----------------------------- | ------------------------------------------------------------------------------------------------------ | ----------------------- | -| `image.registry` | Tomcat image registry | `docker.io` | -| `image.repository` | Tomcat image repository | `bitnami/tomcat` | -| `image.tag` | Tomcat image tag (immutable tags are recommended) | `10.1.13-debian-11-r35` | -| `image.digest` | Tomcat image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | Tomcat image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `image.debug` | Specify if debug logs should be enabled | `false` | -| `hostAliases` | Deployment pod host aliases | `[]` | -| `tomcatUsername` | Tomcat admin user | `user` | -| `tomcatPassword` | Tomcat admin password | `""` | -| `tomcatAllowRemoteManagement` | Enable remote access to management interface | `0` | -| `catalinaOpts` | Java runtime option used by tomcat JVM | `""` | -| `command` | Override default container command (useful when using custom images) | `[]` | -| `args` | Override default container args (useful when using custom images) | `[]` | -| `extraEnvVars` | Extra environment variables to be set on Tomcat container | `[]` | -| `extraEnvVarsCM` | Name of existing ConfigMap containing extra environment variables | `""` | -| `extraEnvVarsSecret` | Name of existing Secret containing extra environment variables | `""` | +| Name | Description | Value | +| ----------------------------- | ------------------------------------------------------------------------------------------------------ | ---------------------- | +| `image.registry` | Tomcat image registry | `docker.io` | +| `image.repository` | Tomcat image repository | `bitnami/tomcat` | +| `image.tag` | Tomcat image tag (immutable tags are recommended) | `10.1.14-debian-11-r0` | +| `image.digest` | Tomcat image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | Tomcat image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `image.debug` | Specify if debug logs should be enabled | `false` | +| `hostAliases` | Deployment pod host aliases | `[]` | +| `tomcatUsername` | Tomcat admin user | `user` | +| `tomcatPassword` | Tomcat admin password | `""` | +| `tomcatAllowRemoteManagement` | Enable remote access to management interface | `0` | +| `catalinaOpts` | Java runtime option used by tomcat JVM | `""` | +| `command` | Override default container command (useful when using custom images) | `[]` | +| `args` | Override default container args (useful when using custom images) | `[]` | +| `extraEnvVars` | Extra environment variables to be set on Tomcat container | `[]` | +| `extraEnvVarsCM` | Name of existing ConfigMap containing extra environment variables | `""` | +| `extraEnvVarsSecret` | Name of existing Secret containing extra environment variables | `""` | ### Tomcat deployment parameters @@ -203,7 +203,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r86` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/tomcat/values.yaml b/bitnami/tomcat/values.yaml index c75f3c35413245..152c6666c61853 100644 --- a/bitnami/tomcat/values.yaml +++ b/bitnami/tomcat/values.yaml @@ -61,7 +61,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/tomcat - tag: 10.1.13-debian-11-r35 + tag: 10.1.14-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -585,7 +585,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/whereabouts/Chart.lock b/bitnami/whereabouts/Chart.lock index d224c8ff06fd29..aa63f5da2bb70c 100644 --- a/bitnami/whereabouts/Chart.lock +++ b/bitnami/whereabouts/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:eba5a1f693000386eaa87ad6e7864e5831cc41f32c07bfec159b5ff01fcd0ce5 -generated: "2023-10-04T19:00:58.409026798Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-10T01:22:03.958402759Z" diff --git a/bitnami/whereabouts/Chart.yaml b/bitnami/whereabouts/Chart.yaml index 76409ab5006ae0..e6b798c3d61819 100644 --- a/bitnami/whereabouts/Chart.yaml +++ b/bitnami/whereabouts/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: whereabouts - image: docker.io/bitnami/whereabouts:0.6.2-debian-11-r106 + image: docker.io/bitnami/whereabouts:0.6.2-debian-11-r108 apiVersion: v2 appVersion: 0.6.2 dependencies: @@ -29,4 +29,4 @@ maintainers: name: whereabouts sources: - https://github.com/bitnami/charts/tree/main/bitnami/whereabouts -version: 0.5.3 +version: 0.5.5 diff --git a/bitnami/whereabouts/README.md b/bitnami/whereabouts/README.md index 2abaf87dc1b937..b927b73fe7bee2 100644 --- a/bitnami/whereabouts/README.md +++ b/bitnami/whereabouts/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | --------------------------------------- | --------------------------------------------------------------------------------------------------------------------- | --------------------------- | | `image.registry` | Whereabouts image registry | `docker.io` | | `image.repository` | Whereabouts Image name | `bitnami/whereabouts` | -| `image.tag` | Whereabouts Image tag | `0.6.2-debian-11-r106` | +| `image.tag` | Whereabouts Image tag | `0.6.2-debian-11-r108` | | `image.digest` | Whereabouts image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | Whereabouts image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | diff --git a/bitnami/whereabouts/values.yaml b/bitnami/whereabouts/values.yaml index 6b51e0eea62275..c86510dbcd2470 100644 --- a/bitnami/whereabouts/values.yaml +++ b/bitnami/whereabouts/values.yaml @@ -77,7 +77,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/whereabouts - tag: 0.6.2-debian-11-r106 + tag: 0.6.2-debian-11-r108 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' diff --git a/bitnami/wildfly/Chart.lock b/bitnami/wildfly/Chart.lock index 0a532e7d66cad0..86d3d0fa2d9259 100644 --- a/bitnami/wildfly/Chart.lock +++ b/bitnami/wildfly/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:eba5a1f693000386eaa87ad6e7864e5831cc41f32c07bfec159b5ff01fcd0ce5 -generated: "2023-10-04T23:08:39.687051116Z" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-09T22:49:07.185016699Z" diff --git a/bitnami/wildfly/Chart.yaml b/bitnami/wildfly/Chart.yaml index 2ce947333a743b..f27578bbc65d23 100644 --- a/bitnami/wildfly/Chart.yaml +++ b/bitnami/wildfly/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r86 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: wildfly - image: docker.io/bitnami/wildfly:29.0.1-debian-11-r24 + image: docker.io/bitnami/wildfly:29.0.1-debian-11-r26 apiVersion: v2 appVersion: 29.0.1 dependencies: @@ -33,4 +33,4 @@ maintainers: name: wildfly sources: - https://github.com/bitnami/charts/tree/main/bitnami/wildfly -version: 16.0.2 +version: 16.0.4 diff --git a/bitnami/wildfly/README.md b/bitnami/wildfly/README.md index c2f9428e5722a0..a627d06d6467b1 100644 --- a/bitnami/wildfly/README.md +++ b/bitnami/wildfly/README.md @@ -84,7 +84,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------- | ------------------------------------------------------------------------------------------------------- | ---------------------- | | `image.registry` | WildFly image registry | `docker.io` | | `image.repository` | WildFly image repository | `bitnami/wildfly` | -| `image.tag` | WildFly image tag (immutable tags are recommended) | `29.0.1-debian-11-r24` | +| `image.tag` | WildFly image tag (immutable tags are recommended) | `29.0.1-debian-11-r26` | | `image.digest` | WildFly image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | WildFly image pull policy | `IfNotPresent` | | `image.pullSecrets` | WildFly image pull secrets | `[]` | @@ -215,7 +215,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` | | `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r86` | +| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | diff --git a/bitnami/wildfly/values.yaml b/bitnami/wildfly/values.yaml index 0b520bf541a15b..b94f15bf903d69 100644 --- a/bitnami/wildfly/values.yaml +++ b/bitnami/wildfly/values.yaml @@ -72,7 +72,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/wildfly - tag: 29.0.1-debian-11-r24 + tag: 29.0.1-debian-11-r26 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -647,7 +647,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r86 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/wordpress/Chart.lock b/bitnami/wordpress/Chart.lock index 7a47e16745d7df..99a578454adf21 100644 --- a/bitnami/wordpress/Chart.lock +++ b/bitnami/wordpress/Chart.lock @@ -1,12 +1,12 @@ dependencies: - name: memcached repository: oci://registry-1.docker.io/bitnamicharts - version: 6.6.2 + version: 6.6.5 - name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.1.3 + version: 14.0.1 - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.13.1 -digest: sha256:ce613074a26b3e1646eaf9ebe3ae900e41ec8f4c5f5e21c0af0e7ed6fcb67367 -generated: "2023-10-05T00:03:26.846759771Z" + version: 2.13.2 +digest: sha256:56af54f8c9da680706e077608eeb82670e54813036ef65c52f5a3bae7307e7d5 +generated: "2023-10-11T09:06:34.349749115+02:00" diff --git a/bitnami/wordpress/Chart.yaml b/bitnami/wordpress/Chart.yaml index bd7d07e9c2ab6f..27a5ae32a635bb 100644 --- a/bitnami/wordpress/Chart.yaml +++ b/bitnami/wordpress/Chart.yaml @@ -6,11 +6,11 @@ annotations: licenses: Apache-2.0 images: | - name: apache-exporter - image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r5 + image: docker.io/bitnami/apache-exporter:1.0.2-debian-11-r8 - name: os-shell image: docker.io/bitnami/os-shell:11-debian-11-r86 - name: wordpress - image: docker.io/bitnami/wordpress:6.3.1-debian-11-r31 + image: docker.io/bitnami/wordpress:6.3.1-debian-11-r32 apiVersion: v2 appVersion: 6.3.1 dependencies: @@ -21,7 +21,7 @@ dependencies: - condition: mariadb.enabled name: mariadb repository: oci://registry-1.docker.io/bitnamicharts - version: 13.x.x + version: 14.x.x - name: common repository: oci://registry-1.docker.io/bitnamicharts tags: @@ -44,4 +44,4 @@ maintainers: name: wordpress sources: - https://github.com/bitnami/charts/tree/main/bitnami/wordpress -version: 17.1.16 +version: 18.0.0 diff --git a/bitnami/wordpress/README.md b/bitnami/wordpress/README.md index 7f7f2156fbb345..a7ecf7475aa06e 100644 --- a/bitnami/wordpress/README.md +++ b/bitnami/wordpress/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | ------------------- | --------------------------------------------------------------------------------------------------------- | --------------------- | | `image.registry` | WordPress image registry | `docker.io` | | `image.repository` | WordPress image repository | `bitnami/wordpress` | -| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.3.1-debian-11-r31` | +| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.3.1-debian-11-r32` | | `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` | | `image.pullSecrets` | WordPress image pull secrets | `[]` | @@ -281,7 +281,7 @@ The command removes all the Kubernetes components associated with the chart and | `metrics.enabled` | Start a sidecar prometheus exporter to expose metrics | `false` | | `metrics.image.registry` | Apache exporter image registry | `docker.io` | | `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` | -| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r5` | +| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.2-debian-11-r8` | | `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Apache exporter image pull secrets | `[]` | @@ -513,6 +513,10 @@ To enable the new features, it is not possible to do it by upgrading an existing ## Upgrading +### To 18.0.0 + +This major release bumps the MariaDB version to 11.1. No major issues are expected during the upgrade. + ### To 17.0.0 This major release bumps the MariaDB version to 11.0. Follow the [upstream instructions](https://mariadb.com/kb/en/upgrading-from-mariadb-10-11-to-mariadb-11-0/) for upgrading from MariaDB 10.11 to 11.0. No major issues are expected during the upgrade. @@ -638,4 +642,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License. diff --git a/bitnami/wordpress/values.yaml b/bitnami/wordpress/values.yaml index ab3e02dc9bdfbe..3e5a2f5de6ea18 100644 --- a/bitnami/wordpress/values.yaml +++ b/bitnami/wordpress/values.yaml @@ -76,7 +76,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/wordpress - tag: 6.3.1-debian-11-r31 + tag: 6.3.1-debian-11-r32 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -860,7 +860,7 @@ metrics: image: registry: docker.io repository: bitnami/apache-exporter - tag: 1.0.2-debian-11-r5 + tag: 1.0.2-debian-11-r8 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. diff --git a/bitnami/zookeeper/Chart.lock b/bitnami/zookeeper/Chart.lock index f54586cc7714ca..934796e86da1b0 100644 --- a/bitnami/zookeeper/Chart.lock +++ b/bitnami/zookeeper/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.10.0 -digest: sha256:023ded170632d04528f30332370f34fc8fb96efb2886a01d934cb3bd6e6d2e09 -generated: "2023-09-05T11:24:06.99508+02:00" + version: 2.13.2 +digest: sha256:551ae9c020597fd0a1d62967d9899a3c57a12e92f49e7a3967b6a187efdcaead +generated: "2023-10-11T10:24:27.070886462Z" diff --git a/bitnami/zookeeper/Chart.yaml b/bitnami/zookeeper/Chart.yaml index dc498e58583ef5..f2ca371235673a 100644 --- a/bitnami/zookeeper/Chart.yaml +++ b/bitnami/zookeeper/Chart.yaml @@ -6,26 +6,26 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:11-debian-11-r51 + image: docker.io/bitnami/os-shell:11-debian-11-r89 - name: zookeeper - image: docker.io/bitnami/zookeeper:3.9.0-debian-11-r11 + image: docker.io/bitnami/zookeeper:3.9.1-debian-11-r0 apiVersion: v2 -appVersion: 3.9.0 +appVersion: 3.9.1 dependencies: - - name: common - repository: oci://registry-1.docker.io/bitnamicharts - tags: - - bitnami-common - version: 2.x.x +- name: common + repository: oci://registry-1.docker.io/bitnamicharts + tags: + - bitnami-common + version: 2.x.x description: Apache ZooKeeper provides a reliable, centralized register of configuration data and services for distributed applications. home: https://bitnami.com icon: https://bitnami.com/assets/stacks/zookeeper/img/zookeeper-stack-220x234.png keywords: - - zookeeper +- zookeeper maintainers: - - name: VMware, Inc. - url: https://github.com/bitnami/charts +- name: VMware, Inc. + url: https://github.com/bitnami/charts name: zookeeper sources: - - https://github.com/bitnami/charts/tree/main/bitnami/zookeeper -version: 12.1.3 +- https://github.com/bitnami/charts/tree/main/bitnami/zookeeper +version: 12.1.4 diff --git a/bitnami/zookeeper/README.md b/bitnami/zookeeper/README.md index 4121148ea14f20..fa96ee8ac918e1 100644 --- a/bitnami/zookeeper/README.md +++ b/bitnami/zookeeper/README.md @@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and | ----------------------------- | -------------------------------------------------------------------------------------------------------------------------- | ----------------------- | | `image.registry` | ZooKeeper image registry | `docker.io` | | `image.repository` | ZooKeeper image repository | `bitnami/zookeeper` | -| `image.tag` | ZooKeeper image tag (immutable tags are recommended) | `3.9.0-debian-11-r11` | +| `image.tag` | ZooKeeper image tag (immutable tags are recommended) | `3.9.1-debian-11-r0` | | `image.digest` | ZooKeeper image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `image.pullPolicy` | ZooKeeper image pull policy | `IfNotPresent` | | `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | @@ -248,7 +248,7 @@ The command removes all the Kubernetes components associated with the chart and | `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` | | `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` | | `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` | -| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r51` | +| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r89` | | `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | | `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | diff --git a/bitnami/zookeeper/values.yaml b/bitnami/zookeeper/values.yaml index 7e6ebbe1133522..825cb9c5047171 100644 --- a/bitnami/zookeeper/values.yaml +++ b/bitnami/zookeeper/values.yaml @@ -79,7 +79,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/zookeeper - tag: 3.9.0-debian-11-r11 + tag: 3.9.1-debian-11-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -663,7 +663,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 11-debian-11-r51 + tag: 11-debian-11-r89 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets.