diff --git a/.github/CODEOWNERS.md b/.github/CODEOWNERS.md new file mode 100644 index 0000000..cdf81a7 --- /dev/null +++ b/.github/CODEOWNERS.md @@ -0,0 +1 @@ +* @ThomasVitale \ No newline at end of file diff --git a/.github/ISSUE_TEMPLATE/bug-report.md b/.github/ISSUE_TEMPLATE/bug-report.md new file mode 100644 index 0000000..0f20905 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/bug-report.md @@ -0,0 +1,27 @@ +--- +name: Bug report +about: Tell us about a problem you are experiencing +title: '' +labels: bug, triage +assignees: '' + +--- + +**What steps did you take:** +[A clear and concise description steps that can be used to reproduce the problem.] + +**What happened:** +[A small description of the issue] + +**What did you expect:** +[A description of what was expected] + +**Anything else you would like to add:** +[Additional information that will assist in solving the issue.] + +**Environment:** + +* Kubernetes version (execute `kubectl version`): +* kctrl version (execute `kctrl version`): +* kapp-controller version (execute `kubectl get deployment -n kapp-controller kapp-controller -o yaml` and the annotation is `kbld.k14s.io/images`): +* package repo version (execute `kctrl package repo get -r kadras-packages -n `): diff --git a/.github/ISSUE_TEMPLATE/feature-request.md b/.github/ISSUE_TEMPLATE/feature-request.md new file mode 100644 index 0000000..270da4e --- /dev/null +++ b/.github/ISSUE_TEMPLATE/feature-request.md @@ -0,0 +1,17 @@ +--- +name: Feature request +about: Suggest an idea for this project +title: '' +labels: enhancement, triage +assignees: '' + +--- + +**Describe the problem/challenge you have:** +[A description of the current challenge that you are experiencing.] + +**Describe the solution you'd like:** +[A clear and concise description of what you want to happen. If applicable a visual representation of the UX.] + +**Anything else you would like to add:** +[Additional information that will assist in solving the issue.] diff --git a/.github/ISSUE_TEMPLATE/other-request.md b/.github/ISSUE_TEMPLATE/other-request.md new file mode 100644 index 0000000..b5722c0 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/other-request.md @@ -0,0 +1,8 @@ +--- +name: Other issue or question +about: Free form issue or question +title: '' +labels: triage +assignees: '' + +--- diff --git a/.github/dependabot.yml b/.github/dependabot.yml new file mode 100644 index 0000000..4bb1068 --- /dev/null +++ b/.github/dependabot.yml @@ -0,0 +1,13 @@ +version: 2 +updates: + - package-ecosystem: "github-actions" + directory: "/" + schedule: + interval: daily + time: "00:30" + timezone: Europe/Copenhagen + open-pull-requests-limit: 10 + labels: + - "dependencies" + commit-message: + prefix: "deps:" diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 44ce5e5..b98fffa 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -3,41 +3,48 @@ on: - workflow_dispatch env: - COSIGN_EXPERIMENTAL: 1 REGISTRY: ghcr.io IMAGE_NAME: ${{ github.repository }} - VERSION: 0.0.1 + VERSION: 0.27.0 jobs: build: name: Build - runs-on: ubuntu-22.04 + runs-on: ubuntu-24.04 permissions: contents: write packages: write outputs: - image-release: ${{ steps.image-info.outputs.release }} + image-name: ${{ steps.image-info.outputs.image_name }} + image-digest: ${{ steps.image-info.outputs.image_digest }} steps: - name: Checkout source code - uses: actions/checkout@v3.0.2 + uses: actions/checkout@v6.0.0 - name: Set up Carvel - uses: vmware-tanzu/carvel-setup-action@v1.1.1 + uses: carvel-dev/setup-action@v2.0.1 with: token: ${{ secrets.GITHUB_TOKEN }} - name: Log into container registry - uses: redhat-actions/podman-login@v1.4 + uses: redhat-actions/podman-login@v1.7 with: username: ${{ github.actor }} password: ${{ secrets.GITHUB_TOKEN }} registry: ${{ env.REGISTRY }} - - name: Create kind cluster - uses: helm/kind-action@v1.4.0 - with: - cluster_name: carvel-test - kubectl_version: v1.25.2 + - name: Create k3d cluster + run: | + # Install k3d + curl -s https://raw.githubusercontent.com/k3d-io/k3d/main/install.sh | bash + + # Create a Kubernetes cluster + k3d cluster create test-cluster + + # Wait for the generation of a token for the Service Account + while [ $(kubectl get configmap kube-root-ca.crt --no-headers | wc -l) -eq 0 ] ; do + sleep 3 + done - name: Package and publish OCI bundle run: | @@ -49,7 +56,9 @@ jobs: package_file=repo/package-repository.yml image_release=$(yq '.spec.fetch.imgpkgBundle.image' ${package_file}) echo "IMAGE_RELEASE=${image_release}" >> $GITHUB_ENV - echo "::set-output name=release::${image_release}" + + echo "image_name=$(echo ${image_release} | cut -d'@' -f1)" >> $GITHUB_OUTPUT + echo "image_digest=$(echo ${image_release} | cut -d'@' -f2)" >> $GITHUB_OUTPUT - name: Add additional tags to OCI image run: | @@ -68,21 +77,20 @@ jobs: sign: name: Sign - runs-on: ubuntu-22.04 + runs-on: ubuntu-24.04 needs: [build] permissions: packages: write id-token: write env: - IMAGE_RELEASE: ${{ needs.build.outputs.image-release }} + IMAGE_NAME: ${{ needs.build.outputs.image-name }} + IMAGE_DIGEST: ${{ needs.build.outputs.image-digest }} steps: - name: Install Cosign - uses: sigstore/cosign-installer@v2.7.0 - with: - cosign-release: 'v1.12.1' + uses: sigstore/cosign-installer@v3.10.0 - name: Log into container registry - uses: redhat-actions/podman-login@v1.4 + uses: redhat-actions/podman-login@v1.7 with: username: ${{ github.actor }} password: ${{ secrets.GITHUB_TOKEN }} @@ -90,51 +98,18 @@ jobs: - name: Sign image run: | - cosign sign "${IMAGE_RELEASE}" + cosign sign --yes "${IMAGE_NAME}@${IMAGE_DIGEST}" provenance: - name: Provenance - runs-on: ubuntu-22.04 needs: [build,sign] permissions: - packages: write + actions: read id-token: write - env: - IMAGE_RELEASE: ${{ needs.build.outputs.image-release }} - PROVENANCE_FILE: provenance.att - steps: - - name: Install Cosign - uses: sigstore/cosign-installer@v2.7.0 - with: - cosign-release: 'v1.12.1' - - - name: Log into container registry - uses: redhat-actions/podman-login@v1.4 - with: - username: ${{ github.actor }} - password: ${{ secrets.GITHUB_TOKEN }} - registry: ${{ env.REGISTRY }} - - - name: Extract digest - run: | - digest=$(echo ${IMAGE_RELEASE} | cut -d "@" -f2) - echo "IMAGE_DIGEST=${digest}" >> $GITHUB_ENV - - - name: Generate provenance - uses: philips-labs/slsa-provenance-action@v0.7.2 - with: - command: generate - subcommand: container - arguments: --repository ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} --tags ${{ env.VERSION }} --digest ${{ env.IMAGE_DIGEST }} --output-path ${{ env.PROVENANCE_FILE }} - env: - COSIGN_EXPERIMENTAL: 0 - - - name: Attach provenance - run: | - jq '.predicate' "${PROVENANCE_FILE}" > provenance-predicate.att - cosign attest --predicate provenance-predicate.att --type slsaprovenance "${IMAGE_RELEASE}" - - - uses: actions/upload-artifact@v3.1.0 - with: - name: provenance.att - path: ${{ env.PROVENANCE_FILE }} + packages: write + uses: slsa-framework/slsa-github-generator/.github/workflows/generator_container_slsa3.yml@v2.1.0 + with: + image: ${{ needs.build.outputs.image-name }} + digest: ${{ needs.build.outputs.image-digest }} + registry-username: ${{ github.actor }} + secrets: + registry-password: ${{ secrets.GITHUB_TOKEN }} diff --git a/CODE_OF_CONDUCT.md b/CODE_OF_CONDUCT.md new file mode 100644 index 0000000..d65f99f --- /dev/null +++ b/CODE_OF_CONDUCT.md @@ -0,0 +1,128 @@ +# Contributor Covenant Code of Conduct + +## Our Pledge + +We as members, contributors, and leaders pledge to make participation in our +community a harassment-free experience for everyone, regardless of age, body +size, visible or invisible disability, ethnicity, sex characteristics, gender +identity and expression, level of experience, education, socio-economic status, +nationality, personal appearance, race, religion, or sexual identity +and orientation. + +We pledge to act and interact in ways that contribute to an open, welcoming, +diverse, inclusive, and healthy community. + +## Our Standards + +Examples of behavior that contributes to a positive environment for our +community include: + +* Demonstrating empathy and kindness toward other people +* Being respectful of differing opinions, viewpoints, and experiences +* Giving and gracefully accepting constructive feedback +* Accepting responsibility and apologizing to those affected by our mistakes, + and learning from the experience +* Focusing on what is best not just for us as individuals, but for the + overall community + +Examples of unacceptable behavior include: + +* The use of sexualized language or imagery, and sexual attention or + advances of any kind +* Trolling, insulting or derogatory comments, and personal or political attacks +* Public or private harassment +* Publishing others' private information, such as a physical or email + address, without their explicit permission +* Other conduct which could reasonably be considered inappropriate in a + professional setting + +## Enforcement Responsibilities + +Community leaders are responsible for clarifying and enforcing our standards of +acceptable behavior and will take appropriate and fair corrective action in +response to any behavior that they deem inappropriate, threatening, offensive, +or harmful. + +Community leaders have the right and responsibility to remove, edit, or reject +comments, commits, code, wiki edits, issues, and other contributions that are +not aligned to this Code of Conduct, and will communicate reasons for moderation +decisions when appropriate. + +## Scope + +This Code of Conduct applies within all community spaces, and also applies when +an individual is officially representing the community in public spaces. +Examples of representing our community include using an official e-mail address, +posting via an official social media account, or acting as an appointed +representative at an online or offline event. + +## Enforcement + +Instances of abusive, harassing, or otherwise unacceptable behavior may be +reported to the community leaders responsible for enforcement at +community@kadras.io. +All complaints will be reviewed and investigated promptly and fairly. + +All community leaders are obligated to respect the privacy and security of the +reporter of any incident. + +## Enforcement Guidelines + +Community leaders will follow these Community Impact Guidelines in determining +the consequences for any action they deem in violation of this Code of Conduct: + +### 1. Correction + +**Community Impact**: Use of inappropriate language or other behavior deemed +unprofessional or unwelcome in the community. + +**Consequence**: A private, written warning from community leaders, providing +clarity around the nature of the violation and an explanation of why the +behavior was inappropriate. A public apology may be requested. + +### 2. Warning + +**Community Impact**: A violation through a single incident or series +of actions. + +**Consequence**: A warning with consequences for continued behavior. No +interaction with the people involved, including unsolicited interaction with +those enforcing the Code of Conduct, for a specified period of time. This +includes avoiding interactions in community spaces as well as external channels +like social media. Violating these terms may lead to a temporary or +permanent ban. + +### 3. Temporary Ban + +**Community Impact**: A serious violation of community standards, including +sustained inappropriate behavior. + +**Consequence**: A temporary ban from any sort of interaction or public +communication with the community for a specified period of time. No public or +private interaction with the people involved, including unsolicited interaction +with those enforcing the Code of Conduct, is allowed during this period. +Violating these terms may lead to a permanent ban. + +### 4. Permanent Ban + +**Community Impact**: Demonstrating a pattern of violation of community +standards, including sustained inappropriate behavior, harassment of an +individual, or aggression toward or disparagement of classes of individuals. + +**Consequence**: A permanent ban from any sort of public interaction within +the community. + +## Attribution + +This Code of Conduct is adapted from the [Contributor Covenant][homepage], +version 2.0, available at +https://www.contributor-covenant.org/version/2/0/code_of_conduct.html. + +Community Impact Guidelines were inspired by [Mozilla's code of conduct +enforcement ladder](https://github.com/mozilla/diversity). + +[homepage]: https://www.contributor-covenant.org + +For answers to common questions about this code of conduct, see the FAQ at +https://www.contributor-covenant.org/faq. Translations are available at +https://www.contributor-covenant.org/translations. diff --git a/LICENSE b/LICENSE index 7ce99a3..261eeb9 100644 --- a/LICENSE +++ b/LICENSE @@ -186,7 +186,7 @@ same "printed page" as the copyright notice for easier identification within third-party archives. - Copyright 2022 Arktonix + Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. diff --git a/MAINTAINERS.md b/MAINTAINERS.md new file mode 100644 index 0000000..2249643 --- /dev/null +++ b/MAINTAINERS.md @@ -0,0 +1,3 @@ +# Maintainers + +* Thomas Vitale | [ThomasVitale](https://github.com/ThomasVitale) \ No newline at end of file diff --git a/README.md b/README.md index d27f631..fedb0d3 100644 --- a/README.md +++ b/README.md @@ -1,80 +1,90 @@ # Kadras Packages -A repository of [Carvel](https://carvel.dev) packages that can be installed on Kubernetes. +![Release Workflow](https://github.com/kadras-io/kadras-packages/actions/workflows/release.yml/badge.svg) +[![The SLSA Level 3 badge](https://slsa.dev/images/gh-badge-level3.svg)](https://slsa.dev/spec/v1.0/levels) +[![The Apache 2.0 license badge](https://img.shields.io/badge/License-Apache_2.0-blue.svg)](https://opensource.org/licenses/Apache-2.0) +[![Follow us on Bluesky](https://img.shields.io/static/v1?label=Bluesky&message=Follow&color=1DA1F2)](https://bsky.app/profile/kadras.bsky.social) -## Components +The [Kadras](https://kadras.io) collection of Kubernetes-native packages built with [Carvel](https://carvel.dev). -This repository contains the Carvel packages part of the Kadras project. The following packages are -maintained by the [Arktonix](https://github.com/arktonix) organization: +## 📦  Package Repository -* [Argo CD](https://github.com/arktonix/package-for-argo-cd) +This repository contains the following Carvel packages. -## Prerequisites +| Package | Description | +|---------|-------------| +| [cert-manager](https://github.com/kadras-io/package-for-cert-manager) | A cloud-native solution to automatically provision and manage X.509 certificates. | +| [contour](https://github.com/kadras-io/package-for-contour) | An Envoy-based ingress controller that supports dynamic configuration updates and multi-team ingress delegation. | +| [crossplane](https://github.com/kadras-io/package-for-crossplane) | A Kubernetes extension that transforms your Kubernetes cluster into a universal control plane. | +| [dependency-track](https://github.com/kadras-io/package-for-dependency-track) | OWASP Dependency Track is a continuous SBOM Analysis Platform for managing software supply chain security risks. | +| [developer-portal](https://github.com/kadras-io/package-for-developer-portal) | Kadras Developer Portal, based on Backstage. It supports application developers with paved paths to production on Kubernetes. | +| [engineering-platform](https://github.com/kadras-io/engineering-platform) | A curated set of Carvel packages to build an engineering platform supporting application developers with paved paths to production on Kubernetes. | +| [flux](https://github.com/kadras-io/package-for-flux) | A continuous deployment solution for Kubernetes, powered by the GitOps Toolkit. | +| [gitops-configurer](https://github.com/kadras-io/gitops-configurer) | Provides GitOps configuration for the Kadras Engineering Platform. | +| [knative-serving](https://github.com/kadras-io/package-for-knative-serving) | A solution built on Kubernetes to support deploying and serving of applications and functions as serverless containers. | +| [kyverno](https://github.com/kadras-io/package-for-kyverno) | A policy engine designed for Kubernetes. It can validate, mutate, and generate configurations using admission controls and background scans. | +| [metrics-server](https://github.com/kadras-io/package-for-metrics-server) | A scalable and efficient source of container resource metrics for Kubernetes built-in autoscaling pipelines. | +| [postgresql-operator](https://github.com/kadras-io/package-for-postgresql-operator) | CloudNativePG, a Kubernetes operator that covers the full lifecycle of a PostgreSQL database cluster with a primary/standby architecture, using native streaming replication. | +| [rabbitmq-operator](https://github.com/kadras-io/package-for-rabbitmq-operator) | A message broker supporting multiple messaging protocols and streaming. | +| [rbac-configurer](https://github.com/kadras-io/rbac-configurer) | Provides default roles and RBAC configuration for the Kadras Engineering Platform. | +| [secretgen-controller](https://github.com/kadras-io/package-for-secretgen-controller) | Generates various types of Secrets in-cluster as well as export and import Secrets across namespaces. | +| [service-binding](https://github.com/kadras-io/package-for-service-binding) | A standard and automated way for communicating service secrets to workloads. | +| [tempo-operator](https://github.com/kadras-io/package-for-tempo-operator) | A solution to manage Grafana Tempo on Kubernetes and OpenShift clusters. | +| [workspace-provisioner](https://github.com/kadras-io/workspace-provisioner) | Provisions and configures workspaces (namespaces or virtual clusters) to work with the Kadras Engineering Platform. | -* Install the [`kctrl`](https://carvel.dev/kapp-controller/docs/latest/install/#installing-kapp-controller-cli-kctrl) CLI to manage Carvel packages in a convenient way. -* Ensure [kapp-controller](https://carvel.dev/kapp-controller) is deployed in your Kubernetes cluster. You can do that with Carvel -[`kapp`](https://carvel.dev/kapp/docs/latest/install) (recommended choice) or `kubectl`. +## 🚀  Getting Started -```shell -kapp deploy -a kapp-controller -y \ - -f https://github.com/vmware-tanzu/carvel-kapp-controller/releases/latest/download/release.yml -``` +### Prerequisites -## Installation +* Kubernetes 1.32+ +* Carvel [`kctrl`](https://carvel.dev/kapp-controller/docs/latest/install/#installing-kapp-controller-cli-kctrl) CLI. +* Carvel [kapp-controller](https://carvel.dev/kapp-controller) deployed in your Kubernetes cluster. You can install it with Carvel [`kapp`](https://carvel.dev/kapp/docs/latest/install) (recommended choice) or `kubectl`. -You can install the Kadras package repository in a dedicated namespace using `kctrl`: + ```shell + kapp deploy -a kapp-controller -y \ + -f https://github.com/carvel-dev/kapp-controller/releases/latest/download/release.yml + ``` -```shell -kubectl create namespace carvel-packages -kctrl package repository add -r kadras-repo \ - --url ghcr.io/arktonix/kadras-packages:0.0.1 \ - -n carvel-packages -``` +### Installation -Alternatively, you can add the repository by applying the `PackageRepository` manifest: +Install the Kadras package repository in a dedicated namespace using `kctrl`: -```shell -kubectl create namespace carvel-packages -kapp deploy -a kadras-repo -n carvel-packages -y \ - -f https://github.com/arktonix/kadras-packages/releases/latest/download/package-repository.yml -``` + ```shell + kctrl package repository add -r kadras-packages \ + --url ghcr.io/kadras-io/kadras-packages \ + -n kadras-system --create-namespace + ``` -After the installation, you can retrieve the list of available Carvel package repositories in your cluster -with the following command. +
Installation via CRDs +Instead of installing the Kadras package repository with `kctrl`, you can apply the necessary Carvel CRDs directly using [`kapp`](https://carvel.dev/kapp/docs/latest/install), `kubectl` or a GitOps operator. -```shell -kctrl package repository list -n carvel-packages -``` + ```shell + kubectl create namespace kadras-system + kapp deploy -a kadras-repo -n kadras-system -y \ + -f https://github.com/kadras-io/kadras-packages/releases/latest/download/package-repository.yml + ``` +
-The Kadras package repository provides a collection of Carvel packages that you can list as follows. +Verify the list of available Carvel package repositories and their status. -```shell -kctrl package available list -n carvel-packages -``` + ```shell + kctrl package repository list -n kadras-system + ``` -## Update +List all the Carvel packages available in the Kadras package repository. -You can update the repository by applying the `PackageRepository` manifest from the newest release, similar -to the process described in the "Installation" section. Alternatively, you can use the `kctrl` CLI. + ```shell + kctrl package available list -n kadras-system + ``` -```shell -kctrl package repository update -r kadras-repo \ - --url ghcr.io/arktonix/kadras-packages: \ - -n carvel-packages -``` +## 📙  Documentation -## Documentation +For documentation specific to Carvel package management, check out [carvel.dev](https://carvel.dev/kapp-controller/docs/latest/packaging). -You can find more documentation about Carvel package management at [carvel.dev](https://carvel.dev/kapp-controller/docs/latest/packaging). +## 🛡️  Security -## References and inspiration +The security process for reporting vulnerabilities is described in [SECURITY.md](SECURITY.md). -* [Kubernetes native package management with Carvel](https://carvel.dev/kapp-controller/docs/latest/packaging) -* [Tanzu Community Edition, an open-source Kubernetes platform](https://tanzucommunityedition.io) -* [An example of package repository for installing the Tanzu Application Platform OSS stack](https://github.com/vrabbi/tap-oss) +## 🖊️  License -## Supply Chain Security - -This project is compliant with level 2 of the [SLSA Framework](https://slsa.dev). - -The SLSA Level 2 badge +This project is licensed under the **Apache License 2.0**. See [LICENSE](LICENSE) for more information. diff --git a/SECURITY.md b/SECURITY.md new file mode 100644 index 0000000..3ef9d1a --- /dev/null +++ b/SECURITY.md @@ -0,0 +1,5 @@ +# Security Policy + +## Reporting a Vulnerability + +If you know of a vulnerability in this project, please reach out to security@kadras.io and we will get back to you as soon as possible. diff --git a/docs/verify-release.md b/docs/verify-release.md new file mode 100644 index 0000000..677aad1 --- /dev/null +++ b/docs/verify-release.md @@ -0,0 +1,37 @@ +# Verifying the Package Repository Release + +This package repository is published as an OCI artifact, signed with Sigstore [Cosign](https://docs.sigstore.dev/cosign/overview), and associated with a [SLSA Provenance](https://slsa.dev/provenance) attestation. + +Using `cosign`, you can display the supply chain security related artifacts for the `ghcr.io/kadras-io/kadras-packages` images. Use the specific digest you'd like to verify. + +```shell +cosign tree ghcr.io/kadras-io/kadras-packages +``` + +The result: + +```shell +📦 Supply Chain Security Related artifacts for an image: ghcr.io/kadras-io/kadras-packages +└── 💾 Attestations for an image tag: ghcr.io/kadras-io/kadras-packages:sha256-3b5321df10e6b30cd30b4dc8b8c8f0f4b3ccd9605eb9d25af03108d6e148012c.att + └── 🍒 sha256:8e6fc2f6005fb56c588700579cbeecabce064cf604b3cabe6294154cfe69b919 +└── 🔐 Signatures for an image tag: ghcr.io/kadras-io/kadras-packages:sha256-3b5321df10e6b30cd30b4dc8b8c8f0f4b3ccd9605eb9d25af03108d6e148012c.sig + └── 🍒 sha256:74c7b24859642cce47b205f0c9be06164b4d182a2c73d1c435dc4ad7af924691 +``` + +You can verify the signature and its claims: + +```shell +cosign verify \ + --certificate-identity-regexp https://github.com/kadras-io \ + --certificate-oidc-issuer https://token.actions.githubusercontent.com \ + ghcr.io/kadras-io/kadras-packages | jq +``` + +You can also verify the SLSA Provenance attestation associated with the image. + +```shell +cosign verify-attestation --type slsaprovenance \ + --certificate-identity-regexp https://github.com/slsa-framework \ + --certificate-oidc-issuer https://token.actions.githubusercontent.com \ + ghcr.io/kadras-io/kadras-packages | jq .payload -r | base64 --decode | jq +``` diff --git a/repo/packages/argo-cd.packages.kadras.io/2.4.12.yml b/repo/packages/argo-cd.packages.kadras.io/2.4.12.yml deleted file mode 100644 index a1085d6..0000000 --- a/repo/packages/argo-cd.packages.kadras.io/2.4.12.yml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: Package -metadata: - creationTimestamp: null - name: argo-cd.packages.kadras.io.2.4.12 -spec: - licenses: - - Apache 2.0 - refName: argo-cd.packages.kadras.io - releaseNotes: https://github.com/argoproj/argo-cd/releases - releasedAt: "2022-09-24T17:52:23Z" - template: - spec: - deploy: - - kapp: {} - fetch: - - imgpkgBundle: - image: ghcr.io/arktonix/package-for-argo-cd@sha256:d9aefd2d161c82ac0b6efc0e6bf3abce78c9be31aeca07d12787c5f6b8ded948 - template: - - ytt: - paths: - - config - - kbld: - paths: - - '-' - - .imgpkg/images.yml - valuesSchema: - openAPIv3: - additionalProperties: false - properties: - namespace: - default: argocd - description: The namespace where to install Argo CD - type: string - service: - additionalProperties: false - description: Service configuration for the Argo CD Server - properties: - type: - default: ClusterIP - description: The Service type for the Argo CD Server - type: string - type: object - type: object - version: 2.4.12 diff --git a/repo/packages/argo-cd.packages.kadras.io/metadata.yml b/repo/packages/argo-cd.packages.kadras.io/metadata.yml deleted file mode 100644 index b82afe1..0000000 --- a/repo/packages/argo-cd.packages.kadras.io/metadata.yml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: PackageMetadata -metadata: - creationTimestamp: null - name: argo-cd.packages.kadras.io -spec: - categories: - - ci/cd - - gitops - displayName: argo-cd - longDescription: Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. - maintainers: - - name: Thomas Vitale - providerName: Arktonix - shortDescription: Argo CD is a declarative, GitOps continuous delivery tool for - Kubernetes. diff --git a/repo/packages/cert-manager.packages.kadras.io/1.18.2.yml b/repo/packages/cert-manager.packages.kadras.io/1.18.2.yml new file mode 100644 index 0000000..5cce3c3 --- /dev/null +++ b/repo/packages/cert-manager.packages.kadras.io/1.18.2.yml @@ -0,0 +1,231 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: cert-manager.packages.kadras.io.1.18.2 +spec: + licenses: + - Apache 2.0 + refName: cert-manager.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-cert-manager/releases + releasedAt: "2025-08-14T17:36:11Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-cert-manager@sha256:84afdbe2e4b2d84ef5f9774b4608ffb100029c7e0a97bc0568aec9401c8c652b + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + cainjector: + additionalProperties: false + description: Settings for the cainjector controller. + properties: + loglevel: + default: 2 + description: Number of the log level verbosity. + maximum: 5 + minimum: 1 + type: integer + replicas: + default: 1 + description: The number of replicas. In order to enable high availability, + 2 replicas are recommended. + minimum: 1 + type: integer + type: object + controller: + additionalProperties: false + description: Settings for the cert-manager controller. + properties: + dns01: + additionalProperties: false + description: Configures the behaviour of the ACME DNS01 challenge solver. + properties: + recursive_nameservers: + default: [] + description: Each nameserver can be either the IP address and port + of a standard recursive DNS server, or the endpoint to an RFC + 8484 DNS over HTTPS endpoint. + items: + default: "" + type: string + type: array + recursive_nameservers_only: + default: false + description: When true, cert-manager will only ever query the configured + DNS resolvers to perform the ACME DNS01 self check. This is useful + in DNS constrained environments, where access to authoritative + nameservers is restricted. Enabling this option could cause the + DNS01 self check to take longer due to caching performed by the + recursive nameservers. + type: boolean + type: object + loglevel: + default: 2 + description: Number of the log level verbosity. + maximum: 5 + minimum: 1 + type: integer + replicas: + default: 1 + description: The number of replicas. In order to enable high availability, + 2 replicas are recommended. + minimum: 1 + type: integer + type: object + leader_election: + additionalProperties: false + description: Leader election configuration for the cert-manager and cert-manager-cainjector + Deployments. + properties: + namespace: + default: kube-system + description: 'Namespace used to perform leader election. The default + namespace needs changing in environments like GKE. More information: + https://cert-manager.io/docs/installation/compatibility.' + minLength: 1 + type: string + type: object + letsencrypt: + additionalProperties: false + description: Settings for Let's Encrypt. + properties: + challenge: + additionalProperties: false + properties: + dns_provider: + default: digital_ocean + description: 'The DNS provider to use for the ACME dns01 challenge. + Valid options: `cloudflare`, `digital_ocean`.' + enum: + - cloudflare + - digital_ocean + type: string + secret: + additionalProperties: false + properties: + key: + default: "" + description: The key within the Secret that contains the credentials + needed for the dns01 challenge. + type: string + name: + default: "" + description: Name of the Secret containing the credentials needed + for the dns01 challenge. + type: string + namespace: + default: kadras-system + description: Namespace containing the Secret with the credentials + needed for the dns01 challenge. + type: string + type: object + type: + default: http01 + description: 'The type of challenge used by the ACME CA Server. + Valid options: `http01`, `dns01`.' + enum: + - http01 + - dns01 + type: string + type: object + email: + default: "" + description: The email address that Let's Encrypt will use to send info + on expiring certificates or other issues. + type: string + include: + default: false + description: Whether to include a ClusterIssuer for Let's Encrypt. + type: boolean + production: + default: false + description: Whether to use Let's Encrypt staging (recommended for non-production + environments) or production. + type: boolean + type: object + namespace: + default: cert-manager + description: The namespace in which to deploy cert-manager. + minLength: 1 + type: string + policies: + additionalProperties: false + description: Settings for the Kyverno policies. + properties: + include: + default: false + description: Whether to include the out-of-the-box Kyverno policies + to validate and secure the package installation. + type: boolean + type: object + private_pki: + additionalProperties: false + description: Settings for the built-in, private PKI + properties: + include: + default: true + description: Whether to include a ClusterIssuer for a private PKI. + type: boolean + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use the proxy. + type: string + type: object + webhook: + additionalProperties: false + description: Settings for the cert-manager webhook. + properties: + host_network: + default: false + description: 'Whether to run the webhook in the host network so that + it can be reached by the cert-manager controller in environments like + AWS EKS. More information: https://cert-manager.io/docs/installation/compatibility.' + type: boolean + loglevel: + default: 2 + description: Number of the log level verbosity. + maximum: 5 + minimum: 1 + type: integer + replicas: + default: 1 + description: The number of replicas. In order to enable high availability, + at least 3 replicas are recommended. + minimum: 1 + type: integer + secure_port: + default: 6443 + description: 'The port where the webhook is exposed. The default port + needs changing in environments like AWS EKS and AWS Fargate. More + information: https://cert-manager.io/docs/installation/compatibility.' + type: integer + type: object + type: object + version: 1.18.2 diff --git a/repo/packages/cert-manager.packages.kadras.io/metadata.yml b/repo/packages/cert-manager.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..ea7c04c --- /dev/null +++ b/repo/packages/cert-manager.packages.kadras.io/metadata.yml @@ -0,0 +1,23 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: cert-manager.packages.kadras.io +spec: + categories: + - certificate-management + - security + - tls + displayName: cert-manager + iconSVGBase64: <svg id="svg3881" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 792 792"><defs><style>.cls-1,.cls-2{fill:none;}.cls-2{clip-path:url(#clip-path);}.cls-3{clip-path:url(#clip-path-2);}.cls-4{fill:#fff;}.cls-5{fill:#326ce5;}.cls-6{mask:url(#mask);}.cls-7{fill:#fdfdfe;}</style><clipPath id="clip-path"><polygon class="cls-1" points="-512.547 -72.522 -511.547 -72.522 -512.547 -71.522 -512.547 -72.522"/></clipPath><clipPath id="clip-path-2"><polygon class="cls-2" points="-514.547 -74.522 -515.547 -74.522 -514.547 -75.522 -514.547 -74.522"/></clipPath><mask id="mask" x="95.45997" y="220.56415" width="1145.07974" height="588.06611" maskUnits="userSpaceOnUse"><g id="mask-2" data-name="mask"><g id="g3823"><path id="path3819" d="M946.5066,220.56415c-162.388,0-294.033,131.64507-294.033,294.03307s131.645,294.03305,294.03305,294.03305,294.03311-131.66566,294.03311-294.033S1108.89464,220.56415,946.5066,220.56415Zm-.0722,562.49c-148.31081,0-268.35373-120.10486-268.3847-268.41564S798.41233,245.8825,946.816,246.15063s268.28159,120.39361,268.1372,268.65286S1094.72463,783.09541,946.4344,783.05412Z"/></g></g></mask></defs><g id="Text"><g class="cls-3"><g id="g3878"><g id="Text_and_detail" data-name="Text and detail"><path id="Circle" class="cls-4" d="M382.15266,82.87846c-172.4,0-312.16,139.76-312.16,312.16,0,172.4,139.76,312.16,312.16,312.16s312.16-139.72,312.16-312.16-139.76-312.16-312.16-312.16Zm-.08,597.15994c-157.44,0-284.89-127.51-284.92-284.95,0-157.61,127.78-285.3,285.33-285,157.55005.3,284.80994,127.8,284.67005,285.22C667.01258,552.7284,539.51258,680.08839,382.07264,680.0384Z"/><g id="LETTERS"><path id="path3851" class="cls-4" d="M238.15266,536.47846c-1-3.45-5.75-6.88-9.44-6.42-5.24.67-10.46,1.54-16.76,2.48,2.32-6.15,4.28-11.4,6.28-16.65,1.73-4.56-2-6.77-4.34-9.21s-4.17.64-5.76,1.9c-8.47,6.71-16.68,13.75-25.23,20.35-4.06,3.13-1,4.95.64,7.2s3.31,4.78,6.66,1.83c3.86-3.39,7.94-6.54,12-9.83.15.38.29.56.25.68-.8,2.32-1.67,4.62-2.45,6.95-1.63,4.92,1.52,8.51,6.69,7.7,2.15-.34,4.34-1,6.9.1-4.16,3.41-7.77,6.61-11.63,9.46-3.17,2.34-1.65,4.25.26,6s2.71,6.31,6.8,3q13.79-11.12,27.49-22.31C237.45264,538.93842,238.66267,538.21845,238.15266,536.47846Z"/><path id="path3853" class="cls-4" d="M405.30262,200.08845c6.54,2.7,9.13,1.46,10.48-5.3.3-1.47.57-2.93.93-4.38.29-1.18,0-3.17,1.81-2.92s4.13-.12,4.79,2.58,1.48,5.09,2.22,7.63c2.08,7,3.51,8.09,10.64,8.46,2.68.14,3.28-.77,2.57-3.16-1.12-3.81-2.09-7.67-3.28-11.46-.55-1.73-1-2.75,1.37-3.74,5.78-2.44,7.34-7.68,7.75-13.07,0-6.66-4-11.53-11.48-13.53-6.08-1.62-12.32-2.63-18.48-4-2.3-.5-3.45.43-3.88,2.63-2.36,12-4.76,24.08-7.09,36.14-.31,1.63-.54,3.22,1.65,4.12Zm17.54-31c5.05-.51,9.92,2.41,9.87,5.4s-1.8,4.44-5.19,4.53c-2.09-1.76-6.94,1.1-7.65-3.37-.3-1.89-1-6.11,2.97-6.52Z"/><path id="path3855" class="cls-4" d="M339.45264,591.29847c-2.84-.93-5.74-2.1-6.74,2.62-1.09,5.19-2.75,10.25-4.47,16.5-2.63-7.82-5.07-14.52-7.1-21.34-1.33-4.46-5.15-4.42-8.37-5-3.55-.58-2.91,3-3.47,5-3,10.36-5.58,20.86-8.8,31.16-1.58,5.08,2.17,4.62,4.67,5.49,2.66.91,5.47,2,6.48-2.4,1.21-5.27,2.82-10.45,4.45-16.34.67,1.54,1.13,2.42,1.44,3.34,2,6,4.09,11.93,6,17.94,1.37,4.44,5.37,4.17,8.56,4.61s2.53-3,3.06-4.81c3-10.38,5.53-20.89,8.8-31.17,1.49-4.98-1.96-4.76-4.51-5.6Z"/><path id="path3857" class="cls-4" d="M580.31263,528.04847c-3.28-.47-6.51-1.44-9.80005-1.75-2.71-.25-3.39-1.19-3.48-4-.22-7-6.55005-12.74-13.43994-12.82-4.73-.13-8.35,2.24-11.25,5.56-3.61,4.13-6.71,8.7-10.33,12.82-2.46,2.81-2.15,4.55.78,6.76,8.76,6.62,17.44995,13.35,25.93994,20.3,3,2.4,4.51,2.15,6.72-.86,4-5.45,4.16-5.32-1.23-9.5-1.18005-.92-2.42-1.78-3.5-2.81-.83-.79-2.89-1.11-1.73-2.91.93994-1.45,1.75-3.35,4.16-2.86s5,.56,7.32995,1.41c5.37,2,8.71-.09,11.63-4.54,1.93005-2.89,2.03-4.26-1.8-4.8Zm-30,5.43c-.75.06-6.13-4.56-6.08-5.23.13-1.76,6.28-7.65,8-7.65,2.31006.46,4,1.61,4.18994,4.15C556.5326,526.29847,551.45264,533.37849,550.31263,533.47846Z"/><path id="path3859" class="cls-4" d="M331.71265,201.07847c.35,2,1,3.6,3.49,3.21,9-1.56,18.06-2.91,27-4.77,4.72-1,1.47-4.56,1.52-7,.05-2.61-1.37-3.4-3.93-2.9-4.89.95-9.85,1.6-14.74,2.57-2.54.5-3.21-.66-3.45-2.83-.21-1.93-.49-3.43,2.3-3.74,4.13-.44,8.17-1.61,12.3-2.05,4.47-.48,3.65-3.29,3.17-6.13s-1.08-5.17-5-4.09c-3.67,1-7.56,1.16-11.26,2.09-2.6.66-3.87.5-4.41-2.54-.59-3.28,1.23-3.55,3.55-3.9,4.11-.61,8.2-1.4,12.31-2,2.63-.4,4.65-1.13,3.59-4.44-.85-2.66.36-6.86-5.13-5.72-7.81,1.63-15.68,3-23.58,4-3.78.48-4.3,2.17-3.74,5.31q3.045,17.505,6.01,34.93Z"/><path id="path3861" class="cls-4" d="M465.13264,596.01844a88.49049,88.49049,0,0,1-8.92,3.07c-2.51.8-4.32,1.82-2.82,5,1.19,2.46.87,6.55,5.62,4.65.87-.35,1.8-1.17,2.65-.11.85,1.06.29,2.32-.13,3.32-1.22,2.87-3.78,4.1-6.65,4.6a6.21878,6.21878,0,0,1-6.67-3.37,32.7898,32.7898,0,0,1-4-11.2c-.93-5.83,4.62-10.93,9.91-8.38,4.36,2.1,7.64.42,11.34-.66,2.53-.74,2.54-2.25,1.08-4.09-3.38-4.26-8-5.61-13.24-5.83a22.67985,22.67985,0,0,0-15,5.6c-5,4.48-7,10.16-5,16.65,2.53,8.49,4,18,14.56,20.8,8.1,2.13,15.24-.38,21-6.12,6.23-6.24,4.72-13.51,2-20.92-1.19-3.16-2.35-4.5-5.73-3.01Z"/><path id="path3863" class="cls-4" d="M527.1526,577.12849c-3.66,2.86-7.64,5.31-11.31006,8.17-2,1.56-3,1.07-4.29-.81-1.29-1.88-1.69-3,.46-4.41,3.32995-2.19,6.52-4.59,9.76-6.91,1.06006-.76,2.34-1.38,2.22-3.22a13.53972,13.53972,0,0,0-4.18994-5.8c-1.86-1.31-3.30005.69-4.75,1.69-3,2.08-6.14,4-8.94,6.34-2.33,1.94-3,.17-4.15-1.21-1.38-1.61-1.4-2.61.53-3.87,3.75-2.45,7.22-5.33,10.99994-7.71,3.1-1.94,2.43994-3.82.62-6.06-1.61-2-2.59-5-6.15-2.3-6.52,4.86-13.22,9.49-19.89,14.17-2.1,1.47-2.19,2.93-.72,5,6.9,9.57,13.71,19.2,20.54,28.83,1.24,1.74,2.45,2.43,4.49994.94q10.26-7.5,20.68994-14.75c3.27-2.27,1.29-4.16-.11-6.21-1.4-2.05-2.73-4.31-5.82-1.88Z"/><path id="path3865" class="cls-4" d="M268.85267,560.89845c-1.4-1-2.88-.53-4.14.45q-15.18007,11.8-30.33,23.64c-1.33,1-2.32,2.47-.4,3.54,3.54,2,6.78,7,11.49,1.72a1.59,1.59,0,0,1,2.18-.47c3.76,2.46,7.55,4.87,11.3,7.33,1,.68.67,1.74.55,2.72-.53,4.29,2.44,9.12,6.71,9.35,4.46.23,2.36-4.48,3.76-6.69a3.001,3.001,0,0,0,.34-.94c2.6-10.65,5.2-21.31,8-32.85-1.12-4.32-6.07-5.22-9.46-7.8Zm-6.4,26.72c-7.81-4.59-7.81-4.59-1.47-9.65,1.28-1,2.6-2,4.48-3.44A56.33068,56.33068,0,0,1,262.45264,587.61842Z"/><path id="path3867" class="cls-4" d="M255.94263,223.82847c5,6.94,12.68,9,20.82,6,8.46-3.06,15-11.32,14.66-18.87a20.55043,20.55043,0,0,0-1.24-5.29,2.11,2.11,0,0,0-2.13-1.73c-2.9,0-8.23,5.19-8.27,8.3-.05,4.19-2.73,6.29-6.08,7.63-3.17,1.26-6,0-7.87-2.63a73.14334,73.14334,0,0,1-5.94-9.75c-1.4-2.87-1.14-6,1.47-8.23s5.84-3.74,9.55-1.71c2.6,1.43,9.61-1,11.1-3.53,1-1.62-.28-2.53-1.09-3.43a13.88,13.88,0,0,0-10.8-4.68c-13.38.05-23.81,10.35-22.4,21.61.8,6.34,4.73,11.34,8.22,16.31Z"/><path id="path3869" class="cls-4" d="M398.01264,603.60847c-3.39-8.82-5.72-10-14.79-8a3.8801,3.8801,0,0,0-3.27,2.63q-5.7,18.24-11.36,36.54c-.33,1.07-.81,2.33.47,3.17,2.73,1.8,9.9-.72,11.13-3.89.51-1.32.52-2.93,2.71-2.89,4,.08,8,0,12-.19,1.42-.06,2.3.48,2.55,1.76.77,4,3.17,5.18,6.48,4.32,6.77-.17,6.8-.19,4.58-6q-5.24-13.7601-10.5-27.45Zm-10.56,18.07c-3,0-3.44-.84-2.54-3.39,1.09-3.12,2-6.3,3.27-10.36,1.33,3.4,2.31,5.85,3.24,8.31,2.08,5.57,2.03,5.38-3.97,5.44Z"/><path id="path3871" class="cls-4" d="M485.89265,229.15846c2.34,1.28,4.57,4.69,7.27.18,3.57-6,7.44-11.79,11.16-17.68,4.48-7.08,4.6-7.29,11.80005-2.76,3.82995,2.42,4.84-.19,6.44995-2.52,1.72-2.5,2.4-4.41-1-6.41q-12-7.15-23.55-14.92c-3.27-2.18-4.89-1.6-7,1.64-2.34,3.57-1.86,5.47,1.76,7.39,2.1,1.11,4.45,2.13,5.9,4.21-.74,1.19-1.34,2.19-2,3.17-4.53,7.16-8.93,14.4-13.62,21.45-2.52,3.88.39,4.91,2.83,6.25Z"/></g><g id="New_Anchor" data-name="New Anchor"><path id="path3874" class="cls-4" d="M495.34266,446.89845c-2.57-10.54-5.11-20.92-7.68-31.42a3.2,3.2,0,0,0-5.33-1.56l-24.72,23.66a3.06,3.06,0,0,0,1.26,5.14c.92.26,1.82.51,2.74.7,2,.43,1.8,1.1.87,2.51a65.58921,65.58921,0,0,1-20,19.58l-.2.12a86.78041,86.78041,0,0,1-21.7,7,159.35362,159.35362,0,0,1-23.53,2.72,1.84,1.84,0,0,1-1.89929-1.77875q-.00147-.0456-.00073-.09125v-110.38a1.08,1.08,0,0,1,1.08-1.08h0c1,0,2.22.2,5.15.17,5.76-.06,11.76-.06,17.54-.4,1.88-.11,2.93-.05,4.13.85a12.35,12.35,0,0,0,16.71-1.29,12.52,12.52,0,0,0,.11-16.76,12.3,12.3,0,0,0-16.66-1.58,4.07008,4.07008,0,0,1-2.53,1.08q-12.0801-.06-24.14,0a1.90009,1.90009,0,0,1-1.39-.37v-12.62a1.79987,1.79987,0,0,1,.42-1.18,6.41962,6.41962,0,0,1,2-1.41c13-6.6,19.74-17.44,19.75-31.87,0-22.83-22.27-39.44-44.29-33.46-17.46,4.74-28.8,22.08-25.51,39.77,2.42,13,10.07,22.1,22.51,26.92a6.58893,6.58893,0,0,1,1.33.66,1.8,1.8,0,0,1,.71,1.47v10.32a1.78,1.78,0,0,1-1.77991,1.78012l-.02008-.00012c-8.65-.1-17.31-.06-26,0a5.53,5.53,0,0,1-3.31-1.12,12.24,12.24,0,0,0-16.62,1.7,12.37,12.37,0,0,0,16.73,18.07,5.08,5.08,0,0,1,3.3-1.08c8.39,0,16.79.12,25.18,0a3.19,3.19,0,0,1,2.17.46,1,1,0,0,1,.31.76v109.81a1.85,1.85,0,0,1-1.85388,1.84613q-.07315-.0002-.14612-.00611a192.44321,192.44321,0,0,1-30.22-5,92.78849,92.78849,0,0,1-17.68-6.21,1.5603,1.5603,0,0,1-.28-.16,66.87033,66.87033,0,0,1-19.54-21.38,1.38,1.38,0,0,1,1-2.16l2.65-.54a3.08,3.08,0,0,0,1.6-5.08l-23.26-25.35a3,3,0,0,0-5.13,1.14c-3.44,10.89-6.79,21.53-10.19,32.32a3.35,3.35,0,0,0,3.94,4.28l1.8-.41a5.12,5.12,0,0,1,5.69,2.64c13.38,26,33.5,44.81,60.12,56.7,10.4,4.65,14.52,6,23.5,7.37a1.77963,1.77963,0,0,1,1,.51l13.67,13.55a4.91,4.91,0,0,0,6.85,0l13.28-13a1.88009,1.88009,0,0,1,1.12-.52c13.3-1.25,19.23-4.54,33.54-11.09,22.15-10.13,39.74-27.76,51.06-49.32,1-1.92,1.88-2.15,3.58-1.58.65.22,1.31.43,2,.63a4.12,4.12,0,0,0,5.21-4.98Zm-114.1-131.83a17.72,17.72,0,0,1-17.0863-18.33182q.00284-.07909.00629-.15817c.48-10.46,9.18-18.18,19-17.43,10.34.8,17.46,9.11,16.94,18.69-.56,10.42-9.1,17.96-18.86,17.23Z"/></g></g></g></g></g><g id="Background_wavy_outline" data-name="Background wavy outline"><g id="path3838"><path class="cls-5" d="M777.74751,396.3365c0,39.89055-24.43136,75.42907-36.09539,111.38006-12.10741,37.302-13.65436,80.32774-36.25011,111.38007-22.82261,31.36171-63.41444,46.02679-94.77621,68.84939-31.05234,22.59569-57.42267,56.80386-94.71428,68.92159-35.99228,11.68462-77.27507-.11342-117.1553-.11342s-81.16308,11.798-117.145.11342c-37.302-12.11773-63.67226-46.32584-94.7246-68.92159-31.36171-22.8226-71.9536-37.48761-94.77621-68.84939-22.59569-31.042-24.14263-74.06775-36.25011-111.38007C44.17571,471.72428,19.76493,436.18582,19.76493,396.3365s24.43142-75.42907,36.09539-111.38007c12.10741-37.302,13.65436-80.32773,36.25011-111.38007,22.82261-31.35142,63.41444-46.02678,94.77621-68.83907,31.05234-22.59572,57.42261-56.81414,94.7246-68.92157,35.982-11.6846,77.26475.10313,117.145.10313s81.16308-11.78773,117.145-.10313c37.30206,12.10743,63.67226,46.32585,94.7246,68.92157,31.36177,22.81229,71.9536,37.48765,94.77621,68.83907,22.59575,31.05234,24.1427,74.07808,36.25011,111.38007C753.31615,320.90743,777.74751,356.45626,777.74751,396.3365Z"/></g></g><g id="Waves"><g class="cls-6"><g id="g3847"><g id="path3841"><path class="cls-4" d="M708.0293,377.02659c-22.21484,0-33.49121-5.31543-44.39746-10.45606-11.09472-5.22949-21.57519-10.16943-43.11816-10.16943-21.54492,0-32.02637,4.94043-43.124,10.17041-10.90625,5.14014-22.1836,10.45508-44.39161,10.45508-22.209,0-33.48339-5.31494-44.38671-10.45508-11.09473-5.23047-21.5752-10.17041-43.11915-10.17041-21.543,0-32.0205,4.93994-43.11328,10.16943-10.90332,5.14063-22.17773,10.45606-44.39209,10.45606-22.21484,0-33.48925-5.31543-44.39257-10.45606C302.50147,361.341,292.02442,356.4011,270.481,356.4011c-21.54443,0-32.02636,4.94043-43.124,10.17041-10.90625,5.14014-22.1831,10.45508-44.3916,10.45508s-33.48291-5.31494-44.38672-10.45508C127.48389,361.341,117.0044,356.4011,95.46,356.4011v-3c22.21582,0,33.49267,5.31592,44.398,10.457,11.09326,5.229,21.5708,10.16846,43.10742,10.16846s32.01709-4.93945,43.1123-10.16846c10.90821-5.14111,22.1875-10.457,44.40332-10.457,22.21485,0,33.48926,5.31543,44.39258,10.45606,11.09278,5.22949,21.56983,10.16943,43.11328,10.16943,21.54248,0,32.02-4.93994,43.1128-10.16943,10.90332-5.14063,22.17773-10.45606,44.39257-10.45606,22.21582,0,33.49219,5.31592,44.39844,10.457,11.09278,5.229,21.57031,10.16846,43.10742,10.16846,21.53614,0,32.01661-4.93945,43.11231-10.16846,10.9082-5.14111,22.1875-10.457,44.40332-10.457,22.21484,0,33.49121,5.31543,44.39746,10.45606,11.09473,5.22949,21.5752,10.16943,43.11816,10.16943Z"/></g><g id="path3843"><path class="cls-4" d="M708.0293,419.27854c-22.43847,0-33.81836-5.36426-44.82421-10.55176-10.99024-5.18066-21.37208-10.07421-42.69141-10.07421-21.32031,0-31.7041,4.89355-42.69824,10.07519-11.00489,5.1875-22.38575,10.55078-44.81739,10.55078-22.43261,0-33.81054-5.36328-44.81347-10.55078-10.99121-5.18164-21.37207-10.07519-42.69239-10.07519-21.31933,0-31.69824,4.89355-42.68652,10.07421-11.00293,5.1875-22.38037,10.55176-44.81885,10.55176-22.439,0-33.8164-5.36426-44.81884-10.55176-10.98877-5.18066-21.36768-10.07421-42.687-10.07421-21.3208,0-31.7041,4.89355-42.69775,10.07519-11.00537,5.1875-22.38574,10.55078-44.81787,10.55078s-33.81006-5.36328-44.813-10.55078c-10.99072-5.18164-21.37207-10.07519-42.69238-10.07519v-5c22.43994,0,33.81933,5.36474,44.82471,10.55273,10.98876,5.17969,21.36767,10.07324,42.68066,10.07324s31.69482-4.89355,42.686-10.07324c11.00782-5.188,22.38965-10.55273,44.82959-10.55273,22.439,0,33.81641,5.36425,44.81885,10.55175,10.98877,5.18067,21.36768,10.07422,42.687,10.07422,21.31885,0,31.69776-4.89355,42.686-10.07422,11.00293-5.1875,22.38086-10.55175,44.81933-10.55175,22.43946,0,33.81934,5.36474,44.82422,10.55273,10.98926,5.17969,21.36817,10.07324,42.68164,10.07324,21.3125,0,31.69434-4.89355,42.68555-10.07324,11.00781-5.188,22.39063-10.55273,44.83008-10.55273,22.43848,0,33.81836,5.36425,44.82422,10.55175,10.99023,5.18067,21.37207,10.07422,42.6914,10.07422Z"/></g><g id="path3845"><path class="cls-4" d="M708.0293,469.78049c-22.66211,0-34.1455-5.4121-45.25-10.64648-10.88671-5.13184-21.16992-9.97852-42.26562-9.97852-21.09668,0-31.38184,4.84766-42.27149,9.9795-11.10546,5.2334-22.58886,10.6455-45.24414,10.6455-22.65625,0-34.13671-5.4121-45.24023-10.6455-10.88574-5.13184-21.16895-9.9795-42.26563-9.9795-21.0957,0-31.376,4.84668-42.26074,9.97852-11.10156,5.23438-22.58252,10.64648-45.24463,10.64648-22.66308,0-34.14306-5.4121-45.2456-10.64648-10.88428-5.13184-21.16455-9.97852-42.26026-9.97852-21.09668,0-31.38232,4.84766-42.27148,9.9795-11.105,5.2334-22.58838,10.6455-45.24414,10.6455-22.65625,0-34.13672-5.4121-45.23926-10.6455-10.88672-5.13184-21.16943-9.9795-42.26611-9.9795v-7c22.66406,0,34.14648,5.41309,45.251,10.64747,10.88428,5.13086,21.16553,9.97753,42.2544,9.97753s31.37256-4.84667,42.25976-9.97753c11.10694-5.23438,22.59229-10.64747,45.25586-10.64747,22.6626,0,34.14307,5.41211,45.24561,10.64649,10.88428,5.13184,21.165,9.97851,42.26025,9.97851,21.09473,0,31.37549-4.84667,42.26026-9.97851,11.10156-5.23438,22.582-10.64649,45.24511-10.64649,22.66407,0,34.14649,5.41309,45.251,10.64747,10.88477,5.13086,21.166,9.97753,42.25488,9.97753s31.37207-4.84667,42.25977-9.97753c11.10742-5.23438,22.5918-10.64747,45.25586-10.64747,22.66211,0,34.14551,5.41211,45.25,10.64649,10.88672,5.13184,21.16992,9.97851,42.26562,9.97851Z"/></g></g></g></g><g id="wQjLs5.tif"><path class="cls-7" d="M69.97291,396.08172C70.6446,213.94918,216.27906,70.56717,392.5182,67.52905c187.22819-3.22757,332.834,146.93812,334.99608,324.238,2.25017,184.52244-146.15893,333.33921-328.41178,333.43561C217.223,725.29886,70.2973,578.46061,69.97291,396.08172Zm628.85858.10588c.087-165.02914-132.68641-298.09593-296.30859-300.02194C233.12872,94.17171,98.45934,230.62774,98.67461,396.5698A299.75958,299.75958,0,0,0,398.88386,696.55966C565.4402,696.503,699.11342,561.48738,698.83149,396.1876Z"/><path class="cls-7" d="M412.51678,420.83544q0,27.77351.00011,55.547c.00009,4.51579.04789,4.50986,4.53561,4.31713a165.17329,165.17329,0,0,0,29.487-4.2981c16.03543-3.6372,27.73135-13.19016,36.84-26.41364.899-1.30519.94647-2.17583-.9482-2.72638-6.37557-1.85276-6.77481-3.54612-1.95345-8.21029q11.4316-11.05884,22.96284-22.01472c2.981-2.84862,5.68513-2.20684,6.67288,1.725q4.00776,15.95289,7.797,31.9604c.87882,3.70353-1.83845,6.25218-5.57439,5.41785a12.16786,12.16786,0,0,1-1.8267-.5459c-1.85224-.73389-2.9823.0209-3.87188,1.64981a133.82736,133.82736,0,0,1-12.57828,19.3174c-9.49524,11.939-20.73307,21.86926-34.218,29.00371-10.1126,5.35023-20.3709,10.5033-31.53,13.4623a36.55951,36.55951,0,0,1-8.19914,1.445c-2.50462.078-4.26165,1.35775-5.94075,3.03594-3.77927,3.77713-7.6287,7.48452-11.47795,11.1908q-3.95936,3.81219-7.93154-.05583-6.42373-6.26729-12.77642-12.607a6.788,6.788,0,0,0-3.68046-1.99465c-20.80362-4.064-38.77235-13.92633-54.96386-27.25025A122.72966,122.72966,0,0,1,292.256,453.82869c-1.79252-3.467-3.72457-4.3321-7.62975-3.56234-3.879.76461-5.91529-1.38023-4.74629-5.14457q5.10108-16.42556,10.32191-32.81382c.95065-2.98756,3.80347-3.611,5.93528-1.29452q11.97693,13.01463,23.87712,26.09993c2.15078,2.35765.90718,5.38157-1.94892,5.68573a16.07623,16.07623,0,0,0-1.85514.45367c-1.88247.43418-2.03016,1.41677-1.09155,2.96479a68.14571,68.14571,0,0,0,19.78648,21.43968c4.39344,2.99136,9.66647,4.45113,14.79768,5.88678a203.78489,203.78489,0,0,0,35.2242,6.41915c2.46668.24052,3.24724-.43626,3.26142-3.12583.03152-5.9855.01018-11.97126.01018-17.95693q.00008-46.92759-.00024-93.85519c-.00006-3.59733-.23705-3.85153-3.72235-3.85454-7.89721-.00678-15.795.04724-23.69137-.03172a12.42517,12.42517,0,0,0-6.52984,1.87989c-5.47079,3.15842-10.90349,2.513-15.6066-1.70228-3.95359-3.5436-5.09-9.6431-2.788-14.96355,2.95926-6.83927,12.14641-9.64767,18.41925-5.58938a11.37135,11.37135,0,0,0,6.50616,1.94147c7.97857-.07857,15.9584-.0228,23.93772-.03314,3.03683-.00395,3.46463-.44242,3.47361-3.45626.00783-2.63366-.11638-5.27441.03978-7.8988.12007-2.01719-.74443-3.00685-2.51544-3.76524-7.2923-3.12258-13.76888-7.34228-18.01393-14.3021-14.78963-24.2479-.19341-51.56636,24.04645-56.40073a37.12876,37.12876,0,0,1,40.17752,19.57806c8.14333,16.34855,4.16244,38.98029-15.70441,49.09212-2.784,1.417-4.08927,3.094-3.77158,6.29807a72.48632,72.48632,0,0,1,.04142,8.85219c-.03473,1.4505.55743,2.016,1.96313,2.01271,8.141-.01891,16.2821-.00684,24.42315-.01286a7.33752,7.33752,0,0,0,3.91345-1.62311,12.88346,12.88346,0,0,1,16.069,1.34006,13.52581,13.52581,0,0,1,2.45849,15.85854,13.24886,13.24886,0,0,1-14.9215,6.27536,3.39939,3.39939,0,0,1-1.32441-.51711c-4.0766-3.46512-8.93825-2.76294-13.67086-2.54561a145.182,145.182,0,0,1-16.01207.15113c-2.35869-.15209-2.93316.70685-2.92357,2.962C412.55133,383.32515,412.51681,402.08037,412.51678,420.83544ZM399.01337,312.08036c9.99882.24248,18.41706-8.17787,18.66371-18.66837a18.87076,18.87076,0,0,0-37.72842-.96046C379.6315,303.69258,387.5072,311.80135,399.01337,312.08036Z"/><path class="cls-7" d="M209.05294,537.02758c-4.17115,2.65838-7.71537,6.10479-11.55114,9.18481-.62059.49828-1.23735,1.00568-1.89242,1.45567a2.72568,2.72568,0,0,1-3.36577.05443,16.46006,16.46006,0,0,1-5.19667-6.69386c-.63166-1.65422.81665-2.77233,1.98348-3.7178,5.3205-4.311,10.69275-8.5582,16.00448-12.87986q6.20452-5.04825,12.2971-10.23295c1.61614-1.38066,3.02286-1.57149,4.54943.04584.76332.80872,1.64349,1.50584,2.43847,2.28632,2.45244,2.40787,2.746,5.11525,1.46839,8.283-2.13141,5.28455-4.04769,10.65586-6.16875,16.29435,5.56028-.8,10.82407-1.50256,16.06844-2.32847a10.358,10.358,0,0,1,10.99034,5.40615c1.02021,1.92315.34677,3.28862-1.20421,4.53933q-10.689,8.61926-21.33467,17.29226c-2.40923,1.95752-4.76456,3.98257-7.20322,5.90222-2.82074,2.22031-3.90528,2.03662-6.044-.76845-.77-1.00989-1.58377-1.99084-2.43216-2.936-1.79944-2.00459-1.74822-3.5382.34-5.26187,3.49951-2.88867,7.044-5.72285,10.55594-8.59656.51045-.41766,1.48264-.74365,1.14813-1.5298-.28564-.67134-1.24914-.59206-1.947-.547-1.58713.10242-3.17194.26232-4.75214.44648-5.27235.61439-8.39667-3.10381-6.81184-8.15241.76087-2.42389,1.57437-4.83123,2.36245-7.247-.00076-.1748.00005-.34855.00086-.52237Z"/><path class="cls-7" d="M124.83943,400.61821a49.9315,49.9315,0,0,1,9.28427,3.97456c16.3791,8.31538,33.77766,10.14157,51.79721,8.71766,11.63718-.91951,22.39278-4.5979,32.75543-9.69762a100.347,100.347,0,0,1,43.64423-10.81909c16.29382-.20053,31.73817,2.65256,46.40921,9.89727,7.96874,3.935,16.1333,7.504,24.96248,9.2165a114.8072,114.8072,0,0,0,30.22024,1.46737,83.07775,83.07775,0,0,0,16.43728-2.90548c1.22182-.34116,1.48115-.01838,1.53988,1.16962.19139,3.874.26313,3.996-3.41964,4.76233-22.63978,4.71138-44.76095,3.81762-66.01766-6.24183-5.101-2.41392-10.14122-5.01893-15.41254-6.99385a75.00911,75.00911,0,0,0-18.29309-4.28871c-13.72664-1.47319-27.38561-1.2009-40.77338,2.6734-7.05613,2.042-13.66044,5.24007-20.26763,8.3644a92.68582,92.68582,0,0,1-37.55286,9.04313c-11.61992.31812-23.04916-.509-34.20041-3.9568-6.93357-2.14379-13.40275-5.41861-20.0276-8.31306a1.53835,1.53835,0,0,1-1.10171-1.61859C124.88329,403.64318,124.83943,402.21256,124.83943,400.61821Z"/><path class="cls-7" d="M464.49871,163.96918c-.26722,6.07518-2.07214,11.27242-8.09521,14.01345-1.78726.81337-2.11038,2.00136-1.5267,3.84864,1.29055,4.08452,2.42882,8.219,3.54669,12.35548.6111,2.26118-.09574,3.30506-2.41985,3.13249-6.32272-.46951-8.90036-.32759-11.10084-7.6666-.84316-2.81211-1.80267-5.59654-2.48866-8.44665-.75683-3.14426-2.67515-3.50892-5.63728-3.39682-1.00754.03815-1.16858.80485-1.33738,1.66094-.539,2.7335-1.11427,5.46345-1.79945,8.16333-.55076,2.17018-1.61989,4.11862-4.0467,4.5225a9.5177,9.5177,0,0,1-7.577-2.10089c-1.30493-1.03064-.72347-2.67881-.45677-4.05477q2.86242-14.76743,5.80084-29.52011c.55421-2.807,1.093-5.61767,1.70464-8.41227.3451-1.577,1.26465-2.65375,3.03621-2.31506,8.41807,1.60929,17.04086,2.49662,24.93126,6.12827C461.92977,154.13513,464.47337,158.614,464.49871,163.96918Zm-26.40908-1.01946c-.19034,3.27377,1.99669,5.87631,5.51242,5.414a13.424,13.424,0,0,1,3.05606.21483c2.06351.20651,3.961-.35826,4.89424-2.52671a4.12054,4.12054,0,0,0-1.13421-5.15448,10.72717,10.72717,0,0,0-7.69731-2.60856C439.55573,158.35407,438.07551,159.84025,438.08963,162.94972Z"/><path class="cls-7" d="M342.2831,622.50718c1.43768-5.3819,2.88656-10.76087,4.3093-16.14674,1.0825-4.09775,2.22059-4.75142,6.34736-3.57514.613.17474,1.22679.34657,1.84014.52,4.33612,1.226,4.85469,2.15332,3.61925,6.51-2.75869,9.7284-5.53762,19.451-8.26828,29.1872-.53629,1.91215-.89729,3.87371-1.32978,5.81458a2.28468,2.28468,0,0,1-2.68923,2.0617c-6.48549-.48133-8.094-1.4942-9.78068-7.04728-1.81851-5.9871-3.99838-11.8647-6.04163-17.78282a23.37683,23.37683,0,0,0-1.1367-2.2523c-1.38006,5.0849-2.68277,9.53173-3.78543,14.02762-1.8065,7.36561-2.48343,7.06972-8.85965,5.2735-4.04836-1.1405-4.6659-2.2012-3.48673-6.3449,3.31145-11.63688,6.93669-23.189,9.59838-35.0026a2.54662,2.54662,0,0,1,3.026-2.27568c5.63514.3088,7.7399,1.88912,9.51649,7.23565q3.29431,9.91381,6.60418,19.82249Z"/><path class="cls-7" d="M578.60084,516.9168c8.15959.2214,13.74292,5.30449,14.76189,12.90512.55708,4.15545.70132,4.23865,4.977,4.93512,3.38175.551,6.749,1.2023,10.1052,1.89421,2.36909.4884,2.74042,1.321,1.63632,3.48821-2.52315,4.9526-6.37615,8.55329-13.14462,6.19284a43.08717,43.08717,0,0,0-7.00433-1.47141,4.60683,4.60683,0,0,0-5.13139,3.59093c-.28046,1.141.60935,1.39055,1.15035,1.834,2.45709,2.01406,4.96493,3.96667,7.469,5.92273a2.94242,2.94242,0,0,1,.67881,4.4034,35.24644,35.24644,0,0,1-3.30709,4.35463c-1.7594,1.90409-3.135,1.98746-5.22522.37019-4.52461-3.50054-8.97585-7.09574-13.4852-10.61628Q565.03873,549.222,557.9372,543.799c-3.63035-2.75853-3.8993-4.26987-1.09235-7.826,3.49565-4.42865,6.9371-8.90606,10.5875-13.20486C570.47154,519.18909,574.22216,516.73849,578.60084,516.9168Zm3.6265,16.15188c.08694-2.7894-3.35422-5.1474-5.43817-3.9451a20.14664,20.14664,0,0,0-6.69088,6.31964c-.37764.56382-.63221,1.16675-.13705,1.74642a23.347,23.347,0,0,0,5.33129,4.682.88184.88184,0,0,0,1.10117-.14762A20.748,20.748,0,0,0,582.22734,533.06868Z"/><path class="cls-7" d="M339.10668,153.64432c.11363-2.74291,1.59552-3.61207,3.57964-3.929,5.02684-.80313,10.06357-1.54646,15.08378-2.38861,3.449-.57858,6.86354-1.36819,10.31791-1.90681,3.59907-.56114,4.29083.01322,5.00182,3.60458,1.20659,6.09468.94468,6.433-5.30021,7.37618-4.00721.60517-8.00728,1.26065-12.00273,1.93935-2.24427.3812-3.12081,1.57071-2.80722,3.63433.41666,2.74187,1.159,3.46113,3.73641,3.06113,4.16211-.64592,8.30616-1.42151,12.43963-2.23482,3.55887-.7003,4.634-.10081,5.46994,3.38356.18473.77.23355,1.57192.36036,2.35664.52068,3.22187-.31037,4.465-3.41809,4.98918-4.00162.675-7.9952,1.42541-12.01857,1.93595-3.898.49463-3.90641,1.94866-3.14429,5.5802.40594,1.93429,2.23337,1.78384,3.75928,1.52138,4.69931-.80821,9.38462-1.69751,14.08133-2.52135.85748-.15042,1.74326-.13772,2.61551-.20656a2.42653,2.42653,0,0,1,1.75536.63731c.57777.47573,2.01651,7.61077,1.68105,8.245-.6356,1.20159-1.85356,1.45848-3.01378,1.67022-7.97,1.45463-15.94738,2.86841-23.92264,4.29376-1.0162.18159-2.031.37405-3.05168.52683-3.15995.473-4.05143-.11-4.597-3.22293-1.63376-9.32226-3.22231-18.65244-4.82727-27.97976C340.26542,160.40793,339.649,156.80528,339.10668,153.64432Z"/><path class="cls-7" d="M494.66911,622.29209c.06864,6.20874-3.30787,10.43744-8.00549,13.89373-7.67676,5.64843-18.118,5.75624-25.14853.29063-2.74761-2.136-4.31035-5.11835-5.58222-8.20351a69.40613,69.40613,0,0,1-3.7418-12.53979c-1.08255-5.28537.51914-9.8949,4.1311-13.84474a23.66265,23.66265,0,0,1,24.96263-6.097,14.12324,14.12324,0,0,1,6.80536,5.42375c1.07153,1.5588.6936,2.768-1.03548,3.3676-4.13142,1.43311-8.16994,2.86014-12.70206.95324a7.46406,7.46406,0,0,0-10.24409,7.86705,28.59581,28.59581,0,0,0,5.0581,13.73665c1.82988,2.552,4.45477,3.16537,8.12766,2.03616,3.05658-.93986,5.57427-3.78164,5.65838-6.42892.04087-1.28613-.6083-1.94647-1.90835-1.79458a8.82634,8.82634,0,0,0-1.34156.47057,6.40393,6.40393,0,0,1-1.8447.44169c-3.85177-.09261-2.98119-3.74066-4.19267-5.78787-.84561-1.429-.64258-3.15462,1.118-3.83811,4.35649-1.69128,8.76867-3.24962,13.20791-4.71126a2.67,2.67,0,0,1,3.32092,1.69882A33.77829,33.77829,0,0,1,494.66911,622.29209Z"/><path class="cls-7" d="M511.82,461.30754a113.1003,113.1003,0,0,0,19.57007,2.01166c14.47072.23812,28.322-2.34648,41.41785-8.73113,11.265-5.49207,22.79255-10.23148,35.4471-11.5479,19.17828-1.99509,37.817-.33529,55.50848,7.94042,1.10977.51913,3.04551.76479,3.05048,1.93212a20.62742,20.62742,0,0,1-1.30686,6.27069c-.3231.99592-1.1997.1351-1.76239-.10936-6.69749-2.90934-13.35738-5.87255-20.58272-7.355-10.3928-2.1323-20.85372-2.29208-31.37994-1.56436-12.06035.83372-23.13,4.92071-33.812,10.2465a98.4118,98.4118,0,0,1-48.795,10.22517A112.236,112.236,0,0,1,509.063,468.2257c-1.34685-.303-1.839-.67253-.89554-1.9976a24.54364,24.54364,0,0,0,1.98993-3.5377C510.63584,461.70544,511.23694,461.12932,511.82,461.30754Z"/><path class="cls-7" d="M539.29226,566.60069c.10471,1.08256-.67594,1.82043-1.63638,2.49007-3.85289,2.68633-7.71021,5.36722-11.51977,8.114-.90981.656-2.306,1.15559-2.02367,2.64944a5.734,5.734,0,0,0,2.79831,3.7095c.88221.55125,1.79565-.14575,2.59232-.72232,3.67538-2.65961,7.40512-5.24591,11.03443-7.96649a2.61628,2.61628,0,0,1,3.97361.31377c.27492.28857.59192.54166.83959.851,4.2117,5.259,3.48758,6.08035-.75294,8.8362-2.93284,1.90607-5.7429,4.00373-8.57774,6.05732-2.43639,1.76488-2.56976,2.71912-.84088,5.09337,1.43859,1.97559,2.45639,2.12514,4.82543.452,3.77032-2.66283,7.44914-5.45562,11.23005-8.10289,2.88969-2.02324,3.73905-1.82014,5.85878,1.01077,3.551,4.74225,3.49851,5.278-1.20349,8.64146q-9.716,6.94981-19.48465,13.82585c-2.55216,1.80056-3.51459,1.7145-5.33544-.82579q-10.78529-15.04633-21.4412-30.18511c-1.79073-2.54338-1.47209-3.71779,1.08861-5.54325q10.20891-7.27745,20.41615-14.55723c2.45352-1.75045,3.87205-1.59763,5.57509.887C537.72282,563.10944,539.19474,564.38862,539.29226,566.60069Z"/><path class="cls-7" d="M269.5823,612.05061c.51448-1.77237-.3955-2.87961-2.03724-3.8653-3.259-1.95664-6.42392-4.075-9.57268-6.20786a2.40868,2.40868,0,0,0-3.3804.22842c-3.42369,2.913-4.65639,2.92725-8.41256.39258-.85607-.57768-1.66755-1.22107-2.51763-1.808-2.61857-1.80786-2.72391-2.58133-.15167-4.59936,10.45083-8.19906,20.95985-16.324,31.43015-24.49845a3.91185,3.91185,0,0,1,5.21041-.18158c2.38669,1.68123,5.24458,2.61126,7.412,4.67566a4.63183,4.63183,0,0,1,1.49238,4.89968c-2.62823,10.57583-5.16261,21.17493-7.75587,31.75947-.50779,2.07252-1.31206,4.04454-1.40745,6.24732-.09118,2.10585-1.47873,3.01016-3.61925,2.77765C272.36157,621.446,269.379,617.18661,269.5823,612.05061Zm6.19394-26.48052c-1.9764,1.50981-3.54294,2.68416-5.08572,3.889-5.70612,4.45631-5.62187,5.2683.65194,8.922,1.05337.61352,1.51734.55459,1.8611-.59924A57.927,57.927,0,0,0,275.77624,585.57009Z"/><path class="cls-7" d="M406.00176,606.74647c4.03884-.02157,6.27334,2.15876,7.75213,5.32034,2.35509,5.035,4.13832,10.30029,6.11539,15.48668q3.77017,9.89015,7.47844,19.80379c1.09769,2.94578.59525,3.60174-2.61481,3.76369a31.211,31.211,0,0,0-3.31542.30447c-3.30428.52424-5.34622-.459-6.1992-3.6909-.66951-2.537-2.11318-2.97672-4.35953-2.85254-3.49538.19328-7.00216.30114-10.50146.25262-1.79331-.02479-2.98122.57136-3.38041,2.28013-.84254,3.60671-7.48271,6.07216-10.763,5.31489-2.13043-.49179-2.33431-2.02452-1.73692-3.9123q3.63394-11.48382,7.1857-22.99354c1.39327-4.48069,2.8359-8.94781,4.12364-13.45889.82416-2.887,2.28493-4.72149,5.527-5.02059C402.956,607.19278,404.61024,606.91111,406.00176,606.74647Zm-.6161,14.30415c-.22042.23368-.37653.32541-.41807.45414q-1.17142,3.62918-2.3177,7.26664c-1.99435,6.31941-1.50141,6.87037,5.15772,6.16658,1.86508-.19708,2.37346-.9333,1.71716-2.66849C408.12553,628.56993,406.78306,624.84892,405.38566,621.05062Z"/><path class="cls-7" d="M280.41153,176.005a15.20468,15.20468,0,0,1,12.24148,5.4112c1.35232,1.54223,1.325,3.0487-.412,4.252-3.50491,2.4281-7.17987,4.00986-11.59734,2.17787-3.30867-1.37216-7.004-.12943-9.67351,2.8811-2.14456,2.41848-2.41035,5.19553-.53787,8.62222,1.63866,2.99885,3.4344,5.91873,5.28875,8.79083,1.72151,2.66632,3.92088,4.69637,7.46555,3.9816,4.21616-.85018,7.15482-3.6032,7.67421-7.44391.62242-4.60271,3.41663-7.3732,7.3511-9.23638,1.87806-.88934,3.11844-.22749,3.85724,1.79041,2.735,7.47071.23138,13.64858-4.93514,18.91025-5.11952,5.21381-11.36713,8.04-18.90012,7.34012a15.478,15.478,0,0,1-10.06457-4.94913,45.53606,45.53606,0,0,1-9.67556-14.97055c-3.6161-9.56479.2922-19.16,9.38878-24.14282A26.90939,26.90939,0,0,1,280.41153,176.005Z"/><path class="cls-7" d="M130.40863,452.35641c7.9892,3.50987,15.33983,7.21147,23.45863,8.76472,19.98858,3.82417,39.5819,3.21335,58.4993-5.23486,7.18258-3.20764,14.22538-6.76867,21.73193-9.20659a98.5915,98.5915,0,0,1,32.5303-4.35744c2.21407.0404,5.03889-.84579,6.47529.54961,1.23252,1.19739-.18806,4.01143.59178,6.08819.44707,1.19037-.61669.98189-1.27854.96441-4.37794-.11558-8.75165-.16925-13.13492-.074-12.9032.28048-24.91544,3.8555-36.445,9.42258-10.21024,4.93-20.65521,9.14476-32.06778,10.447-19.64067,2.24111-38.77517.92054-56.92139-7.754-.65435-.3128-1.328-.51857-1.51775-1.34988C131.73172,457.993,131.11264,455.37451,130.40863,452.35641Z"/><path class="cls-7" d="M354.38937,375.5389c-16.1197.8158-31.20515-3.06312-45.54114-10.28237-23.52439-11.84632-47.99405-13.31726-73.1069-6.209-6.57947,1.86232-12.72055,5.00113-18.86986,7.96969-14.41281,6.95768-29.64912,9.33029-45.50207,8.7917a92.27192,92.27192,0,0,1-26.51165-4.38939c-5.80962-1.95373-11.29422-4.68308-16.92528-7.06382-1.79653-.75953-1.31056-2.15031-.91727-3.18888.53169-1.404,1.45079-.11675,2.0635.16665,9.82642,4.545,19.68809,9.001,30.59454,10.29239,17.79081,2.10655,35.25044,1.45741,52.02239-5.88052,8.65453-3.78646,17.059-8.22,26.23605-10.74344,12.06079-3.31636,24.33425-3.70511,36.74035-2.93322,13.37522.83222,25.6077,5.34427,37.43274,11.19708a92.4739,92.4739,0,0,0,45.286,9.34156,109.098,109.098,0,0,0,22.44424-2.98777c.61274-.1527,1.76437-1.2094,1.98929.41927.15614,1.13059.35782,2.33359-1.39523,2.75435a95.95314,95.95314,0,0,1-16.72225,2.713C360.6112,375.68924,357.49583,375.5389,354.38937,375.5389Z"/><path class="cls-7" d="M515.14274,412.4614a129.653,129.653,0,0,0,18.804,1.301,90.35589,90.35589,0,0,0,40.79067-9.45608c9.96558-4.861,20.18637-9.03313,31.34486-10.45077a126.50648,126.50648,0,0,1,33.333.15431c11.518,1.58266,21.91011,6.38507,32.28718,11.23407.87228.4076,1.45888,5.03041.705,5.64614-.73967.60414-1.34527-.1399-1.94439-.41435-6.1396-2.81235-12.22224-5.76144-18.60922-7.99006-11.14358-3.88822-22.68684-4.59252-34.36908-4.33084a88.48505,88.48505,0,0,0-38.50033,10.02683,97.64341,97.64341,0,0,1-46.74008,10.91515c-4.61617-.0872-9.23509-.27981-13.83547-.78961a2.06186,2.06186,0,0,1-2.12155-1.79777C516.01963,415.27246,515.60463,414.06742,515.14274,412.4614Z"/><path class="cls-7" d="M542.52427,201.26269a9.725,9.725,0,0,1-1.50664-.48238c-.85029-.42095-1.65474-.93395-2.48264-1.40089-5.82989-3.2881-6.48853-3.44832-9.87759,1.96666-4.24122,6.77666-8.567,13.50072-12.89333,20.22363-1.92773,2.9956-3.09988,3.18921-6.00495,1.20247-.98009-.67027-1.97076-1.327-2.97949-1.953-3.19478-1.98272-3.45279-3.06237-1.384-6.33181,3.13309-4.9517,6.30909-9.87636,9.4368-14.83144,1.98941-3.15177,3.83616-6.398,5.93385-9.47442.695-1.01922.42249-1.47535-.22352-2.17837-1.548-1.68477-3.68262-2.44562-5.57919-3.565-3.23154-1.90732-3.79108-3.68447-1.92129-6.81463,2.53935-4.25106,4.06845-4.81844,7.49113-2.66075q12.56026,7.91814,25.08295,15.89578c2.99125,1.91028,3.2274,2.95169,1.3879,6.05255C545.93941,198.7061,545.13192,200.85343,542.52427,201.26269Z"/><path class="cls-7" d="M671.1713,367.44238c-6.62985-2.8604-12.94561-6.06574-19.6652-8.32069-10.95736-3.67693-22.26191-4.35429-33.70478-4.15654-14.39074.24868-27.77619,4.21544-40.49231,10.6896-19.78213,10.07173-40.67789,12.0325-62.34133,8.84915-9.56437-1.40546-18.36362-5.01329-27.02684-9.04526a133.028,133.028,0,0,0-18.35369-7.35021c-1.47694-.43593-1.42014-1.01606-1.1877-2.17589.29613-1.47765,1.12362-1.151,2.09813-.8756a108.12077,108.12077,0,0,1,19.00641,7.60931c22.32488,11.19546,45.58675,12.55823,69.49159,6.74018,7.43879-1.81049,14.30514-5.325,21.19534-8.61044a92.65829,92.65829,0,0,1,38.52261-9.05772c13.43316-.27062,26.55247,1.12694,39.07752,6.29042,3.6742,1.51466,7.23539,3.30472,10.91672,4.80009C670.817,363.68556,671.68528,365.0037,671.1713,367.44238Z"/><path class="cls-7" d="M501.83656,408.97006c-.29239.33824-.4002.45113-.4948.57417-2.906,3.77877-6.07339,2.65049-9.6955.9407-8.748-4.12934-17.45843-8.40152-27.05938-10.38222a111.79683,111.79683,0,0,0-29.68436-1.711,73.23082,73.23082,0,0,0-14.14267,2.14116c-1.441.37922-1.95292.0511-1.94845-1.54825.00994-3.53528-.09524-3.62961,3.41242-4.237,18.05111-3.12594,35.932-2.95845,53.45586,3.064,7.82512,2.68928,15.10325,6.67612,22.76435,9.76044C499.54032,408.01337,500.62956,408.47213,501.83656,408.97006Z"/><path class="cls-7" d="M443.55191,449.61857a95.4557,95.4557,0,0,0-22.75034,2.5697c-1.73052.44631-1.97231-.16046-1.98064-1.69325-.03084-5.677-.08735-5.74386,5.17375-6.59032,15.42874-2.4823,30.768-2.33187,45.99432,1.574,2.55371.65508,2.80006,3.22425,4.41244,4.64847.54284.47955-2.95242,3.42779-3.97654,3.12428a77.76842,77.76842,0,0,0-16.13941-3.0198C450.71317,449.95553,447.13014,449.81817,443.55191,449.61857Z"/><path class="cls-7" d="M342.6917,463.0349c4.76184-.03909,9.47559.44122,14.21314.27714a97.55222,97.55222,0,0,0,23.30149-3.32314c1.24386-.35171,1.62711-.33876,1.69005,1.10484.26772,6.13809.23054,5.85568-5.63385,7.58649-7.19391,2.12324-14.01088.492-20.85536-1.27383C351.07667,466.28914,346.701,465.21552,342.6917,463.0349Z"/></g></svg> + longDescription: Adds certificates and certificate issuers as resource types in + Kubernetes clusters, and simplifies the process of obtaining, renewing and using + those certificates. It can issue certificates from a variety of supported sources. + It will ensure certificates are valid and up to date, and attempt to renew certificates + at a configured time before expiry. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: X.509 certificate management for Kubernetes and OpenShift. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-cert-manager + for community support. diff --git a/repo/packages/contour.packages.kadras.io/1.33.0.yml b/repo/packages/contour.packages.kadras.io/1.33.0.yml new file mode 100644 index 0000000..f21dff3 --- /dev/null +++ b/repo/packages/contour.packages.kadras.io/1.33.0.yml @@ -0,0 +1,226 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: contour.packages.kadras.io.1.33.0 +spec: + licenses: + - Apache 2.0 + refName: contour.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-contour/releases + releasedAt: "2025-09-15T14:46:26Z" + template: + spec: + deploy: + - kapp: + rawOptions: + - --wait-timeout=5m + - --kube-api-qps=25 + - --kube-api-burst=50 + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-contour@sha256:2de76924ca9bda2f1f67cbdfc00433572f9ac482cb35e80ee3c7100d217a06fb + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + certificates: + additionalProperties: false + description: TLS configuration to secure the communication between Contour + and Envoy. + properties: + duration: + default: 8760h + description: If using cert-manager, how long the certificates should + be valid for. If `useCertManager` is false, this field is ignored. + type: string + renewBefore: + default: 360h + description: If using cert-manager, how long before expiration the certificates + should be renewed. If `useCertManager` is false, this field is ignored. + type: string + useCertManager: + default: false + description: 'Whether to use cert-manager to provision TLS certificates + for securing the communication between Contour and Envoy. If `false`, + the `contour-certgen` Job will be used to provision certificates. + If `true`, cert-manager must be installed in the cluster. See: https://github.com/kadras-io/package-for-cert-manager.' + type: boolean + type: object + contour: + additionalProperties: false + description: Settings for the Contour component. + properties: + config: + additionalProperties: false + description: Configuration for the Contour Deployment. + properties: + logFormat: + default: text + description: Log output format for Contour. Either `text` (default) + or `json`. + enum: + - json + - text + type: string + logLevel: + default: info + description: The Contour log level. Valid options are `info` and + `debug`. + enum: + - info + - debug + type: string + useProxyProtocol: + default: false + description: Whether to enable PROXY protocol for all Envoy listeners. + type: boolean + type: object + configMapData: + default: {} + description: The YAML contents of the `contour` ConfigMap. See https://projectcontour.io/docs/latest/configuration/#configuration-file + for more information. + nullable: true + replicas: + default: 2 + description: The number of Contour replicas. In order to enable high + availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + envoy: + additionalProperties: false + description: Settings for the Envoy component. + properties: + config: + additionalProperties: false + description: Configuration for the Envoy workload. + properties: + logLevel: + default: info + description: The Envoy log level. + enum: + - trace + - debug + - info + - warning + - warn + - error + - critical + - "off" + type: string + type: object + service: + additionalProperties: false + description: Envoy service settings. + properties: + annotations: + default: null + description: Annotations to set on the Envoy service. + nullable: true + externalTrafficPolicy: + default: Local + description: The external traffic policy for the Envoy service. + enum: + - Cluster + - Local + type: string + loadBalancerIP: + default: "" + description: The desired load balancer IP. If `type` is not `LoadBalancer', + this field is ignored. It is up to the cloud provider whether + to honor this request. If not specified, the load balancer IP + will be assigned by the cloud provider. + type: string + nodePorts: + additionalProperties: false + description: NodePort settings for the Envoy service. If type is + not `NodePort` or `LoadBalancer`, these settings are ignored. + properties: + http: + default: 0 + description: The node port number to expose Envoy's HTTP listener + on. If not specified, a node port will be auto-assigned by + Kubernetes. + type: integer + https: + default: 0 + description: The node port number to expose Envoy's HTTPS listener + on. If not specified, a node port will be auto-assigned by + Kubernetes. + type: integer + type: object + type: + default: LoadBalancer + description: The type of Kubernetes service to provision for Envoy. + enum: + - NodePort + - ClusterIP + - LoadBalancer + type: string + type: object + workload: + additionalProperties: false + description: Envoy workload settings. + properties: + hostNetwork: + default: false + description: Whether to enable host networking for the Envoy pods. + type: boolean + hostPorts: + additionalProperties: false + description: Host port settings for the Envoy pods. + properties: + enabled: + default: true + description: Whether to enable host ports. If false, `http` + & `https` are ignored. + type: boolean + http: + default: 80 + description: If enabled, the host port number to expose Envoy's + HTTP listener on. + type: integer + https: + default: 443 + description: If enabled, the host port number to expose Envoy's + HTTPS listener on. + type: integer + type: object + replicas: + default: 2 + description: The number of Envoy replicas to deploy when `type` + is set to `Deployment`. + type: integer + terminationGracePeriodSeconds: + default: 300 + description: The termination grace period, in seconds, for the Envoy + pods. + minimum: 30 + type: integer + type: + default: DaemonSet + description: The type of Kubernetes workload that Envoy is deployed + as. Options are `Deployment` or `DaemonSet`. If not specified, + it defaults to `DaemonSet`. + enum: + - Deployment + - DaemonSet + type: string + type: object + type: object + namespace: + default: projectcontour + description: The namespace in which to deploy Contour and Envoy. + minLength: 1 + type: string + type: object + version: 1.33.0 diff --git a/repo/packages/contour.packages.kadras.io/metadata.yml b/repo/packages/contour.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..34fcf44 --- /dev/null +++ b/repo/packages/contour.packages.kadras.io/metadata.yml @@ -0,0 +1,21 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: contour.packages.kadras.io +spec: + categories: + - ingress + - envoy + - gateway + displayName: contour + iconSVGBase64: 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 + longDescription: Kubernetes ingress controller providing the control plane for the + Envoy edge and service proxy. Contour supports dynamic configuration updates and + multi-team ingress delegation out of the box while maintaining a lightweight profile. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: High performance ingress controller using Envoy. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-contour + for community support. diff --git a/repo/packages/crossplane.packages.kadras.io/2.0.2.yml b/repo/packages/crossplane.packages.kadras.io/2.0.2.yml new file mode 100644 index 0000000..2d66683 --- /dev/null +++ b/repo/packages/crossplane.packages.kadras.io/2.0.2.yml @@ -0,0 +1,487 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: crossplane.packages.kadras.io.2.0.2 +spec: + refName: crossplane.packages.kadras.io + releasedAt: "2025-08-14T20:03:47Z" + template: + spec: + deploy: + - kapp: + intoNs: crossplane-system + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-crossplane@sha256:764e5de98ade05c75454843952d324a9a7aa66c5e27be8930d9e29d144c36bf7 + template: + - helmTemplate: + name: crossplane + namespace: crossplane-system + path: config/helm/upstream/crossplane + valuesFrom: + - path: config/helm/values.yml + - ytt: + ignoreUnknownComments: true + paths: + - '-' + - config/carvel + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + properties: + affinity: + default: {} + description: Add `affinities` to the Crossplane pod deployment. + type: object + args: + default: [] + description: Add custom arguments to the Crossplane pod. + items: {} + type: array + configuration: + properties: + packages: + default: [] + description: A list of Configuration packages to install. + items: {} + type: array + type: object + customAnnotations: + default: {} + description: Add custom `annotations` to the Crossplane pod deployment. + type: object + customLabels: + default: {} + description: Add custom `labels` to the Crossplane pod deployment. + type: object + deploymentStrategy: + default: RollingUpdate + description: The deployment strategy for the Crossplane and RBAC Manager + pods. + type: string + dnsPolicy: + default: "" + description: Specify the `dnsPolicy` to be used by the Crossplane pod. + type: string + extraEnvVarsCrossplane: + default: {} + description: Add custom environmental variables to the Crossplane pod deployment + application container. Replaces any `.` in a variable name with `_`. For + example, `SAMPLE.KEY=value1` becomes `SAMPLE_KEY=value1`. + type: object + extraEnvVarsCrossplaneInit: + default: {} + description: Add custom environmental variables to the Crossplane pod deployment + init container. Replaces any `.` in a variable name with `_`. For example, + `SAMPLE.KEY=value1` becomes `SAMPLE_KEY=value1`. + type: object + extraEnvVarsRBACManager: + default: {} + description: Add custom environmental variables to the RBAC Manager pod + deployment. Replaces any `.` in a variable name with `_`. For example, + `SAMPLE.KEY=value1` becomes `SAMPLE_KEY=value1`. + type: object + extraObjects: + default: [] + description: To add arbitrary Kubernetes Objects during a Helm Install + items: {} + type: array + extraVolumeMountsCrossplane: + default: {} + description: Add custom `volumeMounts` to the Crossplane pod. + type: object + extraVolumesCrossplane: + default: {} + description: Add custom `volumes` to the Crossplane pod. + type: object + function: + properties: + packages: + default: [] + description: A list of Function packages to install + items: {} + type: array + type: object + functionCache: + properties: + medium: + default: "" + description: Set to `Memory` to hold the function cache in a RAM backed + file system. Useful for Crossplane development. + type: string + pvc: + default: "" + description: The name of a PersistentVolumeClaim to use as the function + cache. Disables the default function cache `emptyDir` Volume. + type: string + sizeLimit: + default: 512Mi + description: The size limit for the function cache. If medium is `Memory` + the `sizeLimit` can't exceed Node memory. + type: string + type: object + hostNetwork: + default: false + description: 'Enable `hostNetwork` for the Crossplane deployment. Caution: + enabling `hostNetwork` grants the Crossplane Pod access to the host network + namespace. Consider setting `dnsPolicy` to `ClusterFirstWithHostNet`.' + type: boolean + image: + properties: + ignoreTag: + default: false + description: Do not use the {{ .image.tag }} value to compute the image + uri. + type: boolean + pullPolicy: + default: IfNotPresent + description: The image pull policy used for Crossplane and RBAC Manager + pods. + type: string + repository: + default: xpkg.crossplane.io/crossplane/crossplane + description: Repository for the Crossplane pod image. + type: string + tag: + default: "" + description: The Crossplane image tag. Defaults to the value of `appVersion` + in `Chart.yaml`. + type: string + type: object + imagePullSecrets: + default: [] + description: The imagePullSecret names to add to the Crossplane ServiceAccount. + items: {} + type: array + leaderElection: + default: true + description: Enable [leader election](https://docs.crossplane.io/latest/concepts/pods/#leader-election) + for the Crossplane pod. + type: boolean + metrics: + properties: + enabled: + default: false + description: Enable Prometheus path, port and scrape annotations and + expose port 8080 for both the Crossplane and RBAC Manager pods. + type: boolean + port: + default: "" + description: The port the metrics server listens on. + type: string + type: object + nodeSelector: + default: {} + description: Add `nodeSelectors` to the Crossplane pod deployment. + type: object + packageCache: + properties: + configMap: + default: "" + description: The name of a ConfigMap to use as the package cache. Disables + the default package cache `emptyDir` Volume. + type: string + medium: + default: "" + description: Set to `Memory` to hold the package cache in a RAM backed + file system. Useful for Crossplane development. + type: string + pvc: + default: "" + description: The name of a PersistentVolumeClaim to use as the package + cache. Disables the default package cache `emptyDir` Volume. + type: string + sizeLimit: + default: 20Mi + description: The size limit for the package cache. If medium is `Memory` + the `sizeLimit` can't exceed Node memory. + type: string + type: object + podSecurityContextCrossplane: + default: {} + description: Add a custom `securityContext` to the Crossplane pod. + type: object + podSecurityContextRBACManager: + default: {} + description: Add a custom `securityContext` to the RBAC Manager pod. + type: object + priorityClassName: + default: "" + description: The PriorityClass name to apply to the Crossplane and RBAC + Manager pods. + type: string + provider: + properties: + defaultActivations: + default: [] + description: Define entries for the default managed resource activation + policy. If defined, a default MRAP will contain these activations. + items: + default: '*' + type: string + type: array + packages: + default: [] + description: A list of Provider packages to install. + items: {} + type: array + type: object + rbacManager: + properties: + affinity: + default: {} + description: Add `affinities` to the RBAC Manager pod deployment. + type: object + args: + default: [] + description: Add custom arguments to the RBAC Manager pod. + items: {} + type: array + deploy: + default: true + description: Deploy the RBAC Manager pod and its required roles. + type: boolean + leaderElection: + default: true + description: Enable [leader election](https://docs.crossplane.io/latest/concepts/pods/#leader-election) + for the RBAC Manager pod. + type: boolean + nodeSelector: + default: {} + description: Add `nodeSelectors` to the RBAC Manager pod deployment. + type: object + replicas: + default: 1 + description: The number of RBAC Manager pod `replicas` to deploy. + type: integer + revisionHistoryLimit: + description: The number of RBAC Manager ReplicaSets to retain. + oneOf: + - default: null + nullable: true + type: integer + - default: null + nullable: true + type: number + - default: null + nullable: true + type: boolean + - default: null + nullable: true + type: string + - default: null + nullable: true + type: object + - default: null + items: {} + nullable: true + type: array + skipAggregatedClusterRoles: + default: false + description: Don't install aggregated Crossplane ClusterRoles. + type: boolean + tolerations: + default: [] + description: Add `tolerations` to the RBAC Manager pod deployment. + items: {} + type: array + topologySpreadConstraints: + default: [] + description: Add `topologySpreadConstraints` to the RBAC Manager pod + deployment. + items: {} + type: array + type: object + readiness: + properties: + port: + default: "" + description: The port the readyz server listens on. + type: string + type: object + registryCaBundleConfig: + properties: + key: + default: "" + description: The ConfigMap key containing a custom CA bundle to enable + fetching packages from registries with unknown or untrusted certificates. + type: string + name: + default: "" + description: The ConfigMap name containing a custom CA bundle to enable + fetching packages from registries with unknown or untrusted certificates. + type: string + type: object + replicas: + default: 1 + description: helm-docs renders these comments into markdown. Use markdown + formatting where appropiate. -- The number of Crossplane pod `replicas` + to deploy. + type: integer + resourcesCrossplane: + properties: + limits: + properties: + cpu: + default: 500m + description: CPU resource limits for the Crossplane pod. + type: string + memory: + default: 1024Mi + description: Memory resource limits for the Crossplane pod. + type: string + type: object + requests: + properties: + cpu: + default: 100m + description: CPU resource requests for the Crossplane pod. + type: string + memory: + default: 256Mi + description: Memory resource requests for the Crossplane pod. + type: string + type: object + type: object + resourcesRBACManager: + properties: + limits: + properties: + cpu: + default: 100m + description: CPU resource limits for the RBAC Manager pod. + type: string + memory: + default: 512Mi + description: Memory resource limits for the RBAC Manager pod. + type: string + type: object + requests: + properties: + cpu: + default: 100m + description: CPU resource requests for the RBAC Manager pod. + type: string + memory: + default: 256Mi + description: Memory resource requests for the RBAC Manager pod. + type: string + type: object + type: object + revisionHistoryLimit: + description: The number of Crossplane ReplicaSets to retain. + oneOf: + - default: null + nullable: true + type: integer + - default: null + nullable: true + type: number + - default: null + nullable: true + type: boolean + - default: null + nullable: true + type: string + - default: null + nullable: true + type: object + - default: null + items: {} + nullable: true + type: array + runtimeClassName: + default: "" + description: The runtimeClassName name to apply to the Crossplane and RBAC + Manager pods. + type: string + securityContextCrossplane: + properties: + allowPrivilegeEscalation: + default: false + description: Enable `allowPrivilegeEscalation` for the Crossplane pod. + type: boolean + readOnlyRootFilesystem: + default: true + description: Set the Crossplane pod root file system as read-only. + type: boolean + runAsGroup: + default: 65532 + description: The group ID used by the Crossplane pod. + type: integer + runAsUser: + default: 65532 + description: The user ID used by the Crossplane pod. + type: integer + type: object + securityContextRBACManager: + properties: + allowPrivilegeEscalation: + default: false + description: Enable `allowPrivilegeEscalation` for the RBAC Manager + pod. + type: boolean + readOnlyRootFilesystem: + default: true + description: Set the RBAC Manager pod root file system as read-only. + type: boolean + runAsGroup: + default: 65532 + description: The group ID used by the RBAC Manager pod. + type: integer + runAsUser: + default: 65532 + description: The user ID used by the RBAC Manager pod. + type: integer + type: object + service: + properties: + customAnnotations: + default: {} + description: Configure annotations on the service object. Only enabled + when webhooks.enabled = true + type: object + type: object + serviceAccount: + properties: + create: + default: true + description: Specifies whether Crossplane ServiceAccount should be created + type: boolean + customAnnotations: + default: {} + description: Add custom `annotations` to the Crossplane ServiceAccount. + type: object + name: + default: "" + description: Provide the name of an already created Crossplane ServiceAccount. + Required when `serviceAccount.create` is `false` + type: string + type: object + tolerations: + default: [] + description: Add `tolerations` to the Crossplane pod deployment. + items: {} + type: array + topologySpreadConstraints: + default: [] + description: Add `topologySpreadConstraints` to the Crossplane pod deployment. + items: {} + type: array + webhooks: + properties: + enabled: + default: true + description: Enable webhooks for Crossplane and installed Provider packages. + type: boolean + port: + default: "" + description: The port the webhook server listens on. + type: string + type: object + type: object + version: 2.0.2 diff --git a/repo/packages/crossplane.packages.kadras.io/metadata.yml b/repo/packages/crossplane.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..93fe9b9 --- /dev/null +++ b/repo/packages/crossplane.packages.kadras.io/metadata.yml @@ -0,0 +1,19 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: crossplane.packages.kadras.io +spec: + categories: + - control plane + displayName: crossplane + iconSVGBase64: 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 + longDescription: Crossplane is an open source Kubernetes extension that transforms + your Kubernetes cluster into a universal control plane. Crossplane lets you manage + anything, anywhere, all through standard Kubernetes APIs. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Transform your Kubernetes cluster into a universal control plane. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-crossplane + for community support. diff --git a/repo/packages/dependency-track.packages.kadras.io/4.13.4.yml b/repo/packages/dependency-track.packages.kadras.io/4.13.4.yml new file mode 100644 index 0000000..faa8fc4 --- /dev/null +++ b/repo/packages/dependency-track.packages.kadras.io/4.13.4.yml @@ -0,0 +1,211 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: dependency-track.packages.kadras.io.4.13.4 +spec: + licenses: + - Apache 2.0 + refName: dependency-track.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-dependency-track/releases + releasedAt: "2025-09-15T15:45:57Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-dependency-track@sha256:8572050568c80b0b94fb93df767bc7d5eeecd3ac0fd847af8dd1d743538f1eab + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + api_server: + additionalProperties: false + description: Settings for the API Server component. + properties: + logging: + additionalProperties: false + description: Settings for logging. + properties: + format: + default: console + description: 'Log encoding format. Options: `console`, `json`.' + enum: + - console + - json + type: string + level: + default: info + description: 'Log verbosity level. Options: `trace`, `debug`, `info`, + `warn`, `error`.' + enum: + - trace + - debug + - info + - warn + - error + type: string + type: object + metrics: + additionalProperties: false + description: Settings for metrics. + properties: + enabled: + default: true + description: Whether to enable the generation of Prometheus metrics. + type: boolean + type: object + resources: + additionalProperties: false + description: Resource configuration for the API Server component. + properties: + limits: + additionalProperties: false + properties: + cpu: + default: "4" + description: CPU limits configuration for the API Server component. + type: string + memory: + default: 5Gi + description: Memory limits configuration for the API Server + component. + type: string + type: object + requests: + additionalProperties: false + properties: + cpu: + default: "0.5" + description: CPU requests configuration for the API Server component. + type: string + memory: + default: 5Gi + description: Memory requests configuration for the API Server + component. + type: string + type: object + type: object + storage: + additionalProperties: false + description: Storage configuration for the API Server component. + properties: + class_name: + default: "" + description: Class name for the PersistenceVolume to create. + type: string + size: + default: 1Gi + description: Size of the PersistenceVolume to create. + type: string + type: object + type: object + domain_name: + default: "" + description: Domain name for Dependency Track. It must be a valid DNS name. + minLength: 4 + type: string + frontend: + additionalProperties: false + description: Settings for the Frontend component. + properties: + replicas: + default: 1 + description: The number of Frontend replicas. In order to enable high + availability, it should be greater than 1. + minimum: 1 + type: integer + resources: + additionalProperties: false + description: Resource configuration for the Frontend component. + properties: + limits: + additionalProperties: false + properties: + cpu: + default: 500m + description: CPU limits configuration for the Frontend component. + type: string + memory: + default: 128Mi + description: Memory limits configuration for the Frontend component. + type: string + type: object + requests: + additionalProperties: false + properties: + cpu: + default: 150m + description: CPU requests configuration for the Frontend component. + type: string + memory: + default: 64Mi + description: Memory requests configuration for the Frontend + component. + type: string + type: object + type: object + type: object + ingress_issuer: + default: "" + description: A reference to the ClusterIssuer to use for enabling TLS in + Dependency Track. + example: kadras-ca-issuer + minLength: 4 + type: string + x-example-description: Kadras private CA + postgresql: + additionalProperties: false + description: Settings for the PostgreSQL database. + properties: + instances: + default: 1 + description: Number of instances for the PostgreSQL database cluster. + Define at least 3 for production scenarios. + minimum: 1 + type: integer + storage: + additionalProperties: false + description: Storage configuration for each PostgreSQL instance. + properties: + size: + default: 1Gi + description: Size of the PersistenceVolume to create for each PostgreSQL + instance. + type: string + type: object + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use the proxy. + type: string + type: object + system_requirement_check: + default: true + description: Whether Dependency Track will check for memory and CPU requirements + at startup time. + type: boolean + type: object + version: 4.13.4 diff --git a/repo/packages/dependency-track.packages.kadras.io/metadata.yml b/repo/packages/dependency-track.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..972b733 --- /dev/null +++ b/repo/packages/dependency-track.packages.kadras.io/metadata.yml @@ -0,0 +1,25 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: dependency-track.packages.kadras.io +spec: + categories: + - supply-chain + - security + displayName: dependency-track + longDescription: Dependency-Track is an intelligent Component Analysis platform + that allows organizations to identify and reduce risk in the software supply chain. + Dependency-Track takes a unique and highly beneficial approach by leveraging the + capabilities of Software Bill of Materials (SBOM). This approach provides capabilities + that traditional Software Composition Analysis (SCA) solutions cannot achieve. + Dependency-Track monitors component usage across all versions of every application + in its portfolio in order to proactively identify risk across an organization. + The platform has an API-first design and is ideal for use in CI/CD environments. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Dependency Track is a continuous SBOM Analysis Platform for managing + software supply chain security risks. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-dependency-track + for community support. diff --git a/repo/packages/developer-portal.packages.kadras.io/0.8.0.yml b/repo/packages/developer-portal.packages.kadras.io/0.8.0.yml new file mode 100644 index 0000000..11223c1 --- /dev/null +++ b/repo/packages/developer-portal.packages.kadras.io/0.8.0.yml @@ -0,0 +1,681 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: developer-portal.packages.kadras.io.0.8.0 +spec: + refName: developer-portal.packages.kadras.io + releasedAt: "2025-09-24T16:17:36Z" + template: + spec: + deploy: + - kapp: + intoNs: backstage + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-developer-portal@sha256:b455104c820ab67c804113843d00528eac7ac6f1bf2abfc9140db15ff6a01d36 + template: + - helmTemplate: + name: backstage + namespace: backstage + path: config/helm/upstream/backstage + valuesFrom: + - path: config/helm/values.yml + - ytt: + ignoreUnknownComments: true + paths: + - '-' + - config/carvel + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + properties: + backstage: + description: Backstage parameters @default -- See below + properties: + affinity: + default: {} + description: 'Affinity for pod assignment
Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity' + type: object + annotations: + default: {} + description: Additional custom annotations for the `Deployment` resource + type: object + appConfig: + default: {} + description: 'Allows to define the appConfig as a multiline string that + generates a ConfigMap automatically, not requiring to have it pre + provisioned as with the extraAppConfig key. DO NOT USE if you need + to put sensitive data in the appConfig. E.g: appConfig: app: baseUrl: + https://somedomain.tld -- Generates ConfigMap and configures it in + the Backstage pods' + type: object + args: + default: [] + description: Backstage container command arguments + items: {} + type: array + autoscaling: + description: 'Autoscaling configuration.
Ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/' + properties: + enabled: + default: false + type: boolean + maxReplicas: + default: 100 + type: integer + minReplicas: + default: 1 + type: integer + targetCPUUtilizationPercentage: + default: 80 + type: integer + type: object + command: + default: [] + description: Backstage container command + items: + default: node + type: string + type: array + containerPorts: + description: Container ports on the Deployment + properties: + backend: + default: 7007 + type: integer + type: object + containerSecurityContext: + default: {} + description: 'Security settings for a Container.
Ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container' + type: object + extraAppConfig: + default: [] + description: Extra app configuration files to inline into command arguments + items: {} + type: array + extraContainers: + default: [] + description: Deployment sidecars + items: {} + type: array + extraEnvVars: + default: [] + description: Backstage container environment variables + items: {} + type: array + extraEnvVarsCM: + default: [] + description: Backstage container environment variables from existing + ConfigMaps + items: {} + type: array + extraEnvVarsSecrets: + default: [] + description: Backstage container environment variables from existing + Secrets + items: {} + type: array + extraPorts: + default: [] + description: Backstage container additional ports + items: {} + type: array + extraVolumeMounts: + default: [] + description: Backstage container additional volume mounts + items: {} + type: array + extraVolumes: + default: [] + description: Backstage container additional volumes + items: {} + type: array + hostAliases: + default: [] + description: 'Host Aliases for the pod
Ref: https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/' + items: {} + type: array + image: + properties: + digest: + default: "" + description: Backstage image digest (digest takes precedence over + image tag) + type: string + pullPolicy: + default: Always + description: 'Specify a imagePullPolicy. Defaults to ''Always'' + if image tag is ''latest'', else set to ''IfNotPresent''
+ Ref: https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy' + type: string + pullSecrets: + default: [] + description: 'Optionally specify an array of imagePullSecrets. Secrets + must be manually created in the namespace.
Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ +
E.g: `pullSecrets: [myRegistryKeySecretName]`' + items: {} + type: array + registry: + default: ghcr.io + description: Backstage image registry + type: string + repository: + default: backstage/backstage + description: Backstage image repository + type: string + tag: + default: latest + description: Backstage image tag (immutable tags are recommended) + type: string + type: object + initContainers: + default: [] + description: Backstage container init containers + items: {} + type: array + installDir: + default: /app + description: Directory containing the backstage installation + type: string + livenessProbe: + description: 'Liveness Probe Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes + ' + type: object + revisionHistoryLimit: + default: 10 + description: Define the [count of deployment revisions](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy) + to be kept. May be set to 0 in case of GitOps deployment approach. + type: integer + startupProbe: + description: 'Startup Probe Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes + ' + items: {} + type: array + extraTls: + default: [] + description: 'The TLS configuration for additional hostnames to be covered + with this ingress record.
Ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls + ' + items: {} + type: array + host: + default: "" + description: 'Hostname to be used to expose the route to access the + backstage application (e.g: backstage.IP.nip.io)' + type: string + path: + default: / + description: 'Path to be used to expose the full route to access the + backstage application (e.g: IP.nip.io/backstage)' + type: string + tls: + description: Ingress TLS parameters + properties: + enabled: + default: false + description: Enable TLS configuration for the host defined at `ingress.host` + parameter + type: boolean + secretName: + default: "" + description: The name to which the TLS Secret will be called + type: string + type: object + type: object + kubeVersion: + default: "" + description: |- + Common parameters + -- Override Kubernetes version + type: string + metrics: + description: Metrics configuration + properties: + serviceMonitor: + description: ServiceMonitor configuration
Allows configuring + your backstage instance as a scrape target for [Prometheus](https://github.com/prometheus/prometheus) + using a ServiceMonitor custom resource that [Prometheus Operator](https://github.com/prometheus-operator/prometheus-operator) + can understand. + properties: + annotations: + default: {} + description: ServiceMonitor annotations + type: object + enabled: + default: false + description: If enabled, a ServiceMonitor resource for Prometheus + Operator is created
Prometheus Operator must be installed + in your cluster prior to enabling. + type: boolean + interval: + description: ServiceMonitor scrape interval + oneOf: + - default: null + nullable: true + type: integer + - default: null + nullable: true + type: number + - default: null + nullable: true + type: boolean + - default: null + nullable: true + type: string + - default: null + nullable: true + type: object + - default: null + items: {} + nullable: true + type: array + labels: + default: {} + description: Additional ServiceMonitor labels + type: object + path: + default: /metrics + description: ServiceMonitor endpoint path
Note that the /metrics + endpoint is NOT present in a freshly scaffolded Backstage app. + To setup, follow the [Prometheus metrics tutorial](https://github.com/backstage/backstage/blob/master/contrib/docs/tutorials/prometheus-metrics.md). + type: string + port: + default: http-backend + description: ServiceMonitor endpoint port
The port where + the metrics are exposed. If using OpenTelemetry as [documented + here](https://backstage.io/docs/tutorials/setup-opentelemetry/), + then the port needs to be explicitly specified. OpenTelemetry's + default port is 9464. + type: string + type: object + type: object + nameOverride: + default: "" + description: String to partially override common.names.fullname + type: string + networkPolicy: + description: '@section NetworkPolicy parameters' + properties: + egressRules: + description: Egress Rules + properties: + customRules: + default: [] + description: Additional custom egress rules + items: {} + type: array + denyConnectionsToExternal: + default: false + description: Deny external connections. Should not be enabled when + working with an external database. + type: boolean + type: object + enabled: + default: false + description: Specifies whether a NetworkPolicy should be created + type: boolean + ingressRules: + description: Ingress Rules + properties: + customRules: + default: [] + description: Additional custom ingress rules + items: {} + type: array + namespaceSelector: + default: {} + description: Namespace selector label allowed to access the Backstage + instance + type: object + podSelector: + default: {} + description: Pod selector label allowed to access the Backstage + instance + type: object + type: object + type: object + postgresql: + description: PostgreSQL [chart configuration](https://github.com/bitnami/charts/blob/master/bitnami/postgresql/values.yaml) + @default -- See below + properties: + architecture: + default: standalone + description: PostgreSQL architecture (`standalone` or `replication`) + type: string + auth: + description: The authentication details of the Postgres database + properties: + existingSecret: + default: "" + description: Name of existing secret to use for PostgreSQL credentials + type: string + password: + default: "" + description: Password for the custom user to create + type: string + secretKeys: + description: The secret keys Postgres will look for to retrieve + the relevant password + properties: + adminPasswordKey: + default: admin-password + description: The key in which Postgres will look for, for the + admin password, in the existing Secret + type: string + replicationPasswordKey: + default: replication-password + description: The key in which Postgres will look for, for the + replication password, in the existing Secret + type: string + userPasswordKey: + default: user-password + description: The key in which Postgres will look for, for the + user password, in the existing Secret + type: string + type: object + username: + default: bn_backstage + description: Name for a custom user to create + type: string + type: object + enabled: + default: false + description: Switch to enable or disable the PostgreSQL helm chart + type: boolean + type: object + service: + description: |- + @section Traffic Exposure parameters + Service parameters -- Service parameters @default -- See below + properties: + annotations: + default: {} + description: Additional custom annotations for Backstage service + type: object + clusterIP: + default: "" + description: 'Backstage service Cluster IP
E.g `clusterIP: None`' + type: string + externalTrafficPolicy: + default: Cluster + description: 'Backstage service external traffic policy Ref: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip' + type: string + extraPorts: + default: [] + description: Extra ports to expose in the Backstage service (normally + used with the `sidecar` value) + items: {} + type: array + ipFamilies: + default: [] + description: 'IP Families
Ref: https://kubernetes.io/docs/concepts/services-networking/dual-stack' + items: {} + type: array + ipFamilyPolicy: + default: "" + description: 'IP Family Policy
Ref: https://kubernetes.io/docs/concepts/services-networking/dual-stack' + type: string + loadBalancerIP: + default: "" + description: 'Backstage service Load Balancer IP
Ref: https://kubernetes.io/docs/concepts/services-networking/service/#loadbalancer' + type: string + loadBalancerSourceRanges: + default: [] + description: 'Load Balancer sources
Ref: https://kubernetes.io/docs/concepts/services-networking/service/#loadbalancer +
E.g `loadBalancerSourceRanges: [10.10.10.0/24]`' + items: {} + type: array + nodePorts: + description: Node port for the Backstage client connections Choose port + between `30000-32767` + properties: + backend: + default: "" + type: string + type: object + ports: + description: Backstage svc port for client connections + properties: + backend: + default: 7007 + type: integer + name: + default: http-backend + description: Backstage svc port name + type: string + targetPort: + default: backend + description: Backstage svc target port referencing receiving pod + container port + type: string + type: object + sessionAffinity: + default: None + description: 'Control where client requests go, to the same pod or round-robin + (values: `ClientIP` or `None`)
Ref: https://kubernetes.io/docs/concepts/services-networking/service/#session-stickiness' + type: string + type: + default: ClusterIP + description: Kubernetes Service type + type: string + type: object + serviceAccount: + description: Service Account Configuration @default -- See below + properties: + annotations: + default: {} + description: Additional custom annotations for the ServiceAccount. + type: object + automountServiceAccountToken: + default: true + description: Auto-mount the service account token in the pod + type: boolean + create: + default: false + description: Enable the creation of a ServiceAccount for Backstage pods + type: boolean + labels: + default: {} + description: Additional custom labels to the service ServiceAccount. + type: object + name: + default: "" + description: Name of the ServiceAccount to use If not set and `serviceAccount.create` + is true, a name is generated + type: string + type: object + type: object + version: 0.8.0 diff --git a/repo/packages/developer-portal.packages.kadras.io/metadata.yml b/repo/packages/developer-portal.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..667c92b --- /dev/null +++ b/repo/packages/developer-portal.packages.kadras.io/metadata.yml @@ -0,0 +1,17 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: developer-portal.packages.kadras.io +spec: + categories: + - control plane + displayName: developer-portal + longDescription: Kadras Developer Portal is based on Backstage and supports application + developers with paved paths to production on Kubernetes. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Internal developer portal. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-developer-portal + for community support. diff --git a/repo/packages/engineering-platform.packages.kadras.io/0.27.0.yml b/repo/packages/engineering-platform.packages.kadras.io/0.27.0.yml new file mode 100644 index 0000000..494bf13 --- /dev/null +++ b/repo/packages/engineering-platform.packages.kadras.io/0.27.0.yml @@ -0,0 +1,255 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: engineering-platform.packages.kadras.io.0.27.0 +spec: + licenses: + - Apache 2.0 + refName: engineering-platform.packages.kadras.io + releaseNotes: https://github.com/kadras-io/kadras-engineering-platform/releases + releasedAt: "2025-09-24T16:27:22Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/kadras-engineering-platform@sha256:478450ba6ff5c780bac64e697df2f66666c8d27a08e66393836839cd0e3a139f + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + cert_manager: + default: {} + description: Configuration for the Cert Manager package. + nullable: true + contour: + default: {} + description: Configuration for the Contour package. + nullable: true + crossplane: + default: {} + description: Configuration for the Crossplane package. + nullable: true + dependency_track: + default: {} + description: Configuration for the Dependency Track package. + nullable: true + developer_portal: + default: {} + description: Configuration for the Developer Portal package. + nullable: true + flux: + default: {} + description: Configuration for the Flux package. + nullable: true + gitops_configurer: + default: {} + description: Configuration for the GitOps Configurer package. + nullable: true + knative: + additionalProperties: false + description: Configuration for Knative related packages. + properties: + serving: + default: {} + description: Configuration for the Knative Serving package. + nullable: true + type: object + kyverno: + additionalProperties: false + description: Configuration for the Kyverno related packages. + properties: + core: + default: {} + description: Configuration for the Kyverno package. + nullable: true + type: object + metrics_server: + default: {} + description: Configuration for the Metrics Server package. + nullable: true + platform: + additionalProperties: false + description: Configuration for the platform packages. + properties: + additional_packages: + default: [] + description: A list of packages to include in the installation. + items: + default: "" + type: string + type: array + ca_cert_data: + default: "" + description: PEM-encoded certificate data to trust TLS connections with + a custom CA. + type: string + cosign: + additionalProperties: false + description: Settings for Cosign, used for signing and verifying OCI + artifacts. + properties: + secret: + additionalProperties: false + description: Configuration for the Secret holding the Cosign key + pair. + properties: + name: + default: "" + description: The name of the Secret holding the Cosign key pair. + type: string + namespace: + default: kadras-system + description: The namespace of the Secret holding the Cosign + key pair. + type: string + type: object + type: object + excluded_packages: + default: [] + description: A list of packages to exclude from being installed. + items: + default: "" + type: string + type: array + git: + additionalProperties: false + description: Settings for the Git server that the platform will use. + properties: + secret: + additionalProperties: false + description: Configuration for the Secret holding the credentials + to access the Git server. + properties: + name: + default: "" + description: 'The name of the Secret holding the credentials + to access the Git server. The credentials should provide read-only + access to the Git server except when installing the platform + with one of these profiles: `standalone`, `build`.' + type: string + namespace: + default: kadras-system + description: The namespace of the Secret holding the credentials + to access the Git server. + type: string + type: object + server: + default: https://github.com + description: The server hosting the Git repositories used by the + plaform. + example: https://github.com + type: string + x-example-description: GitHub + type: object + ingress: + additionalProperties: false + description: Setting for the Ingress controller that the platform will + use. + properties: + domain: + default: "" + description: The base domain name the platform will use to configure + the Ingress controller. It must be a valid DNS name. + type: string + issuer: + additionalProperties: false + description: A reference to the ClusterIssuer the platform will + use to enable TLS communications. + properties: + email: + default: "" + description: The email address that Let's Encrypt will use to + send info on expiring certificates or other issues. Required + when the type is `letsencrypt_staging` or `letsencrypt`. + type: string + name: + default: "" + description: A reference to a custom ClusterIssuer previously + created on the cluster where the platform will be installed. + Required when the type is `custom`. + type: string + type: + default: private + description: 'The type of ClusterIssuer the platform will use + to enable TLS communications. Options: `private`, `letsencrypt_staging`, + `letsencrypt`, `custom`.' + enum: + - private + - letsencrypt_staging + - letsencrypt + - custom + type: string + type: object + type: object + namespace: + default: kadras-system + description: The namespace where to install the platform. + type: string + oci: + additionalProperties: false + description: Settings for accessing the OCI registry that the platform + will use. + properties: + pull_secret: + additionalProperties: false + description: Configuration for the Secret holding the credentials + to pull images from the OCI registry. + properties: + name: + default: "" + description: The name of the Secret holding the credentials + to pull images from the OCI registry. + type: string + namespace: + default: kadras-system + description: The namespace of the Secret holding the credentials + to pull images from the OCI registry. + type: string + type: object + type: object + profile: + default: run + description: 'The platform profile to install. Options: `standalone`, + `run`.' + enum: + - standalone + - run + type: string + type: object + postgresql_operator: + default: {} + description: Configuration for the PostgreSQL Operator package. + nullable: true + rabbitmq_operator: + default: {} + description: Configuration for the RabbitMQ Operator package. + nullable: true + secretgen_controller: + default: {} + description: Configuration for the Secretgen Controller package. + nullable: true + service_binding: + default: {} + description: Configuration for the Service Binding package. + nullable: true + tempo_operator: + default: {} + description: Configuration for the Tempo Operator package. + nullable: true + workspace_provisioner: + default: {} + description: Configuration for the Workspace Provisioner package. + nullable: true + type: object + version: 0.27.0 diff --git a/repo/packages/engineering-platform.packages.kadras.io/metadata.yml b/repo/packages/engineering-platform.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..5c24704 --- /dev/null +++ b/repo/packages/engineering-platform.packages.kadras.io/metadata.yml @@ -0,0 +1,18 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: engineering-platform.packages.kadras.io +spec: + categories: + - internal developer platform + - application platform + displayName: engineering-platform + longDescription: A cloud native platform aimed at supporting application developers + with paved paths to production on Kubernetes and shipped as a Carvel package. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Cloud native engineering platform on Kubernetes. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/kadras-engineering-platform + for community support. diff --git a/repo/packages/flux.packages.kadras.io/2.6.4.yml b/repo/packages/flux.packages.kadras.io/2.6.4.yml new file mode 100644 index 0000000..105657e --- /dev/null +++ b/repo/packages/flux.packages.kadras.io/2.6.4.yml @@ -0,0 +1,107 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: flux.packages.kadras.io.2.6.4 +spec: + licenses: + - Apache 2.0 + refName: flux.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-flux/releases + releasedAt: "2025-08-14T17:42:46Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-flux@sha256:71304d88eb8251a0db355dc64676d7fd5c1c738d57a3d52b20662e1f0e108d5a + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + logging: + additionalProperties: false + description: Settings for logging. + properties: + encoding: + default: json + description: 'Log encoding format. Options: `console`, `json`.' + enum: + - console + - json + type: string + level: + default: info + description: 'Log verbosity level. Options: `trace`, `debug`, `info`, + `error`.' + enum: + - trace + - debug + - info + - error + type: string + type: object + optional_components: + additionalProperties: false + description: Settings for which Flux optional components to deploy. + properties: + helm_controller: + default: false + description: Whether to deploy the Helm Controller. + type: boolean + image_automation_controller: + default: false + description: Whether to deploy the Image Automation Controller. + type: boolean + image_reflector_controller: + default: false + description: Whether to deploy the Image Reflector Controller. + type: boolean + kustomize_controller: + default: true + description: Whether to deploy the Kustomize Controller. + type: boolean + notification_controller: + default: false + description: Whether to deploy the Notification Controller. + type: boolean + type: object + policies: + additionalProperties: false + description: Settings for the Kyverno policies. + properties: + include: + default: false + description: Whether to include the out-of-the-box Kyverno policies + to validate and secure the package installation. + type: boolean + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use the proxy. + type: string + type: object + type: object + version: 2.6.4 diff --git a/repo/packages/flux.packages.kadras.io/metadata.yml b/repo/packages/flux.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..06bd653 --- /dev/null +++ b/repo/packages/flux.packages.kadras.io/metadata.yml @@ -0,0 +1,22 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: flux.packages.kadras.io +spec: + categories: + - gitops + displayName: flux + iconSVGBase64: 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 + longDescription: Flux is a tool for keeping Kubernetes clusters in sync with sources + of configuration (like Git repositories and OCI artifacts), and automating updates + to configuration when there is new code to deploy. It's constructed with the GitOps + Toolkit, a set of composable APIs and specialized tools for building continuous + deployment on top of Kubernetes. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Flux is a continuous deployment solution for Kubernetes powered + by the GitOps Toolkit. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-flux + for community support. diff --git a/repo/packages/gitops-configurer.packages.kadras.io/0.1.0.yml b/repo/packages/gitops-configurer.packages.kadras.io/0.1.0.yml new file mode 100644 index 0000000..4baffa4 --- /dev/null +++ b/repo/packages/gitops-configurer.packages.kadras.io/0.1.0.yml @@ -0,0 +1,79 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: gitops-configurer.packages.kadras.io.0.1.0 +spec: + licenses: + - Apache 2.0 + refName: gitops-configurer.packages.kadras.io + releaseNotes: https://github.com/kadras-io/gitops-configurer/releases + releasedAt: "2024-03-11T17:43:26Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/gitops-configurer@sha256:e60a1a8e9cb7f856acc9078f3cdbc9354ab6b18328de9b64155ccd37cb75c224 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + git: + additionalProperties: false + description: Configuration for synchronizing changes from Git. + properties: + branch: + default: main + description: The Git branch to check out and synchronize. + type: string + path: + default: "" + description: The path within the Git repository containing the manifests + to reconcile with the cluster. + type: string + secret_name: + default: "" + description: The name of the Secret in the same namespace holding the + credentials to access the Git server. The credentials should provide + read-only access to the Git server. + type: string + url: + default: "" + description: The URL of the Git repository to synchronize in the cluster. + type: string + type: object + name: + default: gitops-configurer + description: The name of the GitOps resource. + type: string + namespace: + default: kadras-system + description: The namespace where the GitOps resource should be installed. + type: string + service_account: + default: "" + description: The `ServiceAccount` used by the GitOps controller to reconcile + changes to the cluster. + type: string + sync_period: + default: 1m0s + description: 'The interval at which the GitOps controller should synchronize + changes from Git. The format is a Go duration string. Example: `1m0s`.' + type: string + type: + default: carvel-app + description: 'The type of GitOps controller to use. Options: `carvel-app`, + `flux-kustomization`.' + type: string + type: object + version: 0.1.0 diff --git a/repo/packages/gitops-configurer.packages.kadras.io/metadata.yml b/repo/packages/gitops-configurer.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..4503402 --- /dev/null +++ b/repo/packages/gitops-configurer.packages.kadras.io/metadata.yml @@ -0,0 +1,16 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: gitops-configurer.packages.kadras.io +spec: + categories: + - gitops + displayName: gitops-configurer + longDescription: Simplify onboarding of GitOps workflows based on Carvel or Flux. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Simplify onboarding of GitOps workflows. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/gitops-configurer + for community support. diff --git a/repo/packages/knative-serving.packages.kadras.io/1.19.5.yml b/repo/packages/knative-serving.packages.kadras.io/1.19.5.yml new file mode 100644 index 0000000..4ccf79f --- /dev/null +++ b/repo/packages/knative-serving.packages.kadras.io/1.19.5.yml @@ -0,0 +1,310 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: knative-serving.packages.kadras.io.1.19.5 +spec: + capacityRequirementsDescription: For prototyping purposes, one-node cluster that + has at least 3 CPUs and 4 GB of memory. For production purposes, if you have only + one node, at least 6 CPUs, 6 GB of memory, and 30 GB of disk storage. If you have + multiple nodes, for each node at least 2 CPUs, 4 GB of memory, and 20 GB of disk + storage. + licenses: + - Apache 2.0 + refName: knative-serving.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-knative-serving/releases + releasedAt: "2025-09-15T14:59:32Z" + template: + spec: + deploy: + - kapp: + rawOptions: + - --wait-timeout=5m + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-knative-serving@sha256:80e7b2444be3b3d078a29a2d2e581e85ed0ea2e5b15108f049d1880775ed2633 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + ca_cert_data: + default: "" + description: PEM-encoded certificate data to trust TLS connections with + a custom CA. + type: string + config: + additionalProperties: false + description: Settings for the Knative Serving ConfigMaps. + properties: + deployment: + additionalProperties: false + description: Deployment configuration stored in the `config-deployment` + ConfigMap. + properties: + progress-deadline: + default: 600s + description: The duration to wait for the deployment to be ready + before considering it failed. + type: string + queue-sidecar-cpu-limit: + default: 1000m + description: The queue proxy's CPU limit. If omitted, a default + value (currently `1000m`), is used when `queueproxy.resource-defaults` + is set to `Enabled`. + type: string + queue-sidecar-cpu-request: + default: 25m + description: The queue proxy's CPU request. If omitted, a default + value (currently '25m'), is used. + type: string + queue-sidecar-memory-limit: + default: 200Mi + description: The queue proxy's memory limit. If omitted, a default + value (currently `800Mi`), is used when `queueproxy.resource-defaults` + is set to `Enabled`. + type: string + queue-sidecar-memory-request: + default: 50Mi + description: The queue proxy's memory request. If omitted, a default + value (currently `400Mi`), is used when `queueproxy.resource-defaults` + is set to `Enabled`. + type: string + type: object + network: + additionalProperties: false + description: Network configuration stored in the `config-network` ConfigMap. + properties: + default-external-scheme: + default: http + description: Defines the scheme used for external URLs if autoTLS + is not enabled. This can be used for making Knative report all + URLs as `https`, for example, if you're fronting Knative with + an external loadbalancer that deals with TLS termination and Knative + doesn't know about that otherwise. + enum: + - http + - https + type: string + domain-template: + default: '{{.Name}}.{{.Namespace}}.{{.Domain}}' + description: The golang text template string to use when constructing + the Knative Service's DNS name. + type: string + http-protocol: + default: Redirected + description: 'Controls the behavior of the HTTP endpoint for the + Knative ingress. `Enabled`: The Knative ingress will be able to + serve HTTP connection. `Redirected`: The Knative ingress will + send a 301 redirect for all http connections, asking the clients + to use HTTPS.' + enum: + - Enabled + - Redirected + type: string + namespace-wildcard-cert-selector: + default: "" + description: A LabelSelector which determines which namespaces should + have a wildcard certificate provisioned. + type: string + rollout-duration: + default: 0 + description: The minimal duration in seconds over which the Configuration + traffic targets are rolled out to the newest revision. + minimum: 0 + type: integer + type: object + tracing: + additionalProperties: false + description: Network configuration stored in the `config-tracing` ConfigMap. + properties: + backend: + default: none + description: The type of distributed tracing backend. + enum: + - zipkin + - none + type: string + debug: + default: "false" + description: Enable the Zipkin debug mode. This allows all spans + to be sent to the server bypassing sampling. + enum: + - "true" + - "false" + type: string + sample-rate: + default: "0.1" + description: The percentage (0-1) of requests to trace. + maxLength: 3 + minLength: 1 + type: string + zipkin-endpoint: + default: http://tempo.observability-system.svc.cluster.local:9411/api/v2/spans + description: The Zipkin collector endpoint where traces are sent. + type: string + type: object + type: object + domain_name: + default: "" + description: Domain name for Knative Services. It must be a valid DNS name. + Stored in the `config-domain` ConfigMap. + minLength: 4 + type: string + ingress: + additionalProperties: false + description: Settings for the Ingress controller. + properties: + contour: + additionalProperties: false + description: Ingress configuration stored in the `config-contour` ConfigMap. + properties: + default-tls-secret: + default: "" + description: If auto-TLS is disabled, fallback to this certificate. + An operator is required to setup a TLSCertificateDelegation for + this Secret to be used. + type: string + external: + additionalProperties: false + description: Configuration for the external Ingress controller + properties: + namespace: + default: projectcontour + description: The namespace where the external Ingress controller + is installed. + minLength: 1 + type: string + type: object + internal: + additionalProperties: false + description: Configuration for the internal Ingress controller + properties: + namespace: + default: projectcontour + description: The namespace where the internal Ingress controller + is installed. + minLength: 1 + type: string + type: object + type: object + type: object + ingress_issuer: + default: "" + description: A reference to the ClusterIssuer to use if you want to enable + autoTLS. Stored in the `config-certmanager` ConfigMap. + example: kadras-ca-issuer + type: string + x-example-description: Kadras private CA + min_kubernetes_version: + default: "" + description: The minimum Kubernetes version that this package will accept + as valid. If not set, Knative Serving will accept the last 3 minor versions + of Kubernetes. + type: string + policies: + additionalProperties: false + description: Settings for the Kyverno policies. + properties: + include: + default: false + description: Whether to include the out-of-the-box Kyverno policies + to validate and secure the package installation. + type: boolean + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use a proxy. + type: string + type: object + workloads: + additionalProperties: false + description: Settings for the Knative Serving workloads. + properties: + activator: + additionalProperties: false + properties: + minReplicas: + default: 1 + description: The minimum number of replicas as controlled by a HorizontalPodAutoscaler. + In order to enable high availability, it should be greater than + 1. + maximum: 20 + minimum: 1 + type: integer + type: object + autoscaler: + additionalProperties: false + properties: + replicas: + default: 1 + description: The number of replicas for this Deployment. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + controller: + additionalProperties: false + properties: + replicas: + default: 1 + description: The number of replicas for this Deployment. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + domain_mapping: + additionalProperties: false + properties: + replicas: + default: 1 + description: The number of replicas for this Deployment. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + domain_mapping_webhook: + additionalProperties: false + properties: + replicas: + default: 1 + description: The number of replicas for this Deployment. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + webhook: + additionalProperties: false + properties: + minReplicas: + default: 1 + description: The minimum number of replicas as controlled by a HorizontalPodAutoscaler. + In order to enable high availability, it should be greater than + 1. + maximum: 5 + minimum: 1 + type: integer + type: object + type: object + type: object + version: 1.19.5 diff --git a/repo/packages/knative-serving.packages.kadras.io/metadata.yml b/repo/packages/knative-serving.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..26e208c --- /dev/null +++ b/repo/packages/knative-serving.packages.kadras.io/metadata.yml @@ -0,0 +1,19 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: knative-serving.packages.kadras.io +spec: + categories: + - serverless + - deployment + displayName: knative-serving + iconSVGBase64: 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 + longDescription: Knative Serving builds on Kubernetes to define and control the + deployment of applications and functions as serverless containers. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Solution for running serverless deployments on Kubernetes. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-knative-serving + for community support. diff --git a/repo/packages/kyverno.packages.kadras.io/1.15.1.yml b/repo/packages/kyverno.packages.kadras.io/1.15.1.yml new file mode 100644 index 0000000..762815c --- /dev/null +++ b/repo/packages/kyverno.packages.kadras.io/1.15.1.yml @@ -0,0 +1,182 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: kyverno.packages.kadras.io.1.15.1 +spec: + licenses: + - Apache 2.0 + refName: kyverno.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-kyverno/releases + releasedAt: "2025-09-15T14:32:28Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-kyverno@sha256:069b230b662c880274eafe7566be3a1824806858d044f2f3ce19d999a837674f + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + admission_controller: + additionalProperties: false + description: Settings for the Admission Controller component. + properties: + replicas: + default: 1 + description: The number of replicas for the Admission Controller. In + order to enable high availability, it should be at least 3 (2 is not + permitted). + minimum: 1 + type: integer + type: object + background_controller: + additionalProperties: false + description: Settings for the Background Controller component. + properties: + replicas: + default: 1 + description: The number of replicas for the Background Controller. In + order to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + ca_cert_data: + default: "" + description: PEM-encoded certificate data to trust TLS connections with + a custom CA. + type: string + cleanup_controller: + additionalProperties: false + description: Settings for the Cleanup Controller component. + properties: + replicas: + default: 1 + description: The number of replicas for the Cleanup Controller. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + logging: + additionalProperties: false + description: Settings for logging. + properties: + encoding: + default: text + description: 'Log encoding format. Options: `text`, `json`.' + enum: + - text + - json + type: string + level: + default: 2 + description: Number of the log level verbosity (from `1` to `6`). + maximum: 6 + minimum: 1 + type: integer + type: object + metrics: + additionalProperties: false + description: Settings for metrics via Prometheus or OpenTelemetry. + properties: + collector: + default: "" + description: The endpoint where the OpenTelemetry-based collector receives + telemetry data. + type: string + type: + default: prometheus + description: Whether to use OpenTelemetry (`grpc`) or Prometheus (`prometheus`) + for exporting metrics. + enum: + - grpc + - prometheus + type: string + type: object + optional_components: + additionalProperties: false + description: Settings for which Kyverno optional components to deploy. + properties: + background_controller: + default: true + description: Whether to deploy the Background Controller, responsible + for processing of generate and mutate-existing rules. + type: boolean + cleanup_controller: + default: true + description: Whether to deploy the Cleanup Controller, responsible for + processing `CleanupPolicy` resources. + type: boolean + reports_controller: + default: true + description: Whether to deploy the Reports Controller, responsible for + handling `PolicyReport` resources. + type: boolean + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use the proxy. + type: string + type: object + reports_controller: + additionalProperties: false + description: Settings for the Reports Controller component. + properties: + replicas: + default: 1 + description: The number of replicas for the Reports Controller. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + tracing: + additionalProperties: false + description: Settings for tracing via OpenTelemetry. + properties: + ca_cert_secret: + default: "" + description: The Secret containing the certificate which is used by + the Opentelemetry Tracing Client. If empty string is set, an insecure + connection will be used. + type: string + enabled: + default: false + description: Whether to configure Kyverno to export OpenTelemetry traces + to a distributed tracing backend. + type: boolean + endpoint: + default: "" + description: The endpoint where the distributed tracing backend accepts + OpenTelemetry traces. + type: string + port: + default: 4317 + description: The port exposed by the distributed tracing backend to + accept OpenTelemetry traces. + type: integer + type: object + type: object + version: 1.15.1 diff --git a/repo/packages/kyverno.packages.kadras.io/metadata.yml b/repo/packages/kyverno.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..7ef45e8 --- /dev/null +++ b/repo/packages/kyverno.packages.kadras.io/metadata.yml @@ -0,0 +1,19 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: kyverno.packages.kadras.io +spec: + categories: + - policy-management + - policies + displayName: kyverno + iconSVGBase64: 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 + longDescription: Kyverno is a policy engine designed for Kubernetes. It can validate, + mutate, and generate configurations using admission controls and background scans. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: A Kubernetes-native policy engine. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-kyverno + for community support. diff --git a/repo/packages/metrics-server.packages.kadras.io/0.8.0.yml b/repo/packages/metrics-server.packages.kadras.io/0.8.0.yml new file mode 100644 index 0000000..10b6dd8 --- /dev/null +++ b/repo/packages/metrics-server.packages.kadras.io/0.8.0.yml @@ -0,0 +1,148 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: metrics-server.packages.kadras.io.0.8.0 +spec: + licenses: + - Apache 2.0 + refName: metrics-server.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-metrics-server/releases + releasedAt: "2025-08-14T17:45:10Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-metrics-server@sha256:907424062bd661d214af87933d935b36b2a8d4a7d36d640c26a1dda0c0aeb271 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + daemonset: + additionalProperties: false + properties: + updateStrategy: + default: null + description: Update strategy of daemonsets + nullable: true + type: string + type: object + deployment: + additionalProperties: false + properties: + rollingUpdate: + additionalProperties: false + properties: + maxSurge: + default: null + description: The maxSurge of rollingUpdate. Applied only if RollingUpdate + is used as updateStrategy + nullable: true + type: integer + maxUnavailable: + default: null + description: The maxUnavailable of rollingUpdate. Applied only if + RollingUpdate is used as updateStrategy + nullable: true + type: integer + type: object + updateStrategy: + default: null + description: Update strategy of deployments + nullable: true + type: string + type: object + metricsServer: + additionalProperties: false + properties: + config: + additionalProperties: false + properties: + apiServiceInsecureTLS: + default: true + description: Whether to enable insecure TLS for metrics-server api + service + type: boolean + args: + default: [] + description: Arguments passed into metrics-server container + items: + default: "" + type: string + type: array + probe: + additionalProperties: false + properties: + failureThreshold: + default: 3 + description: Probe failureThreshold of metrics-server deployment + type: integer + periodSeconds: + default: 10 + description: Probe period of metrics-server deployment + type: integer + type: object + securePort: + default: 4443 + description: The HTTPS secure port used by metrics-server + type: integer + tolerations: + default: [] + description: Metrics-server deployment tolerations + nullable: true + updateStrategy: + default: RollingUpdate + description: The update strategy of the metrics-server deployment + type: string + type: object + createNamespace: + default: true + description: Whether to create namespace specified for metrics-server + type: boolean + image: + additionalProperties: false + properties: + name: + default: "" + description: The path of image + type: string + pullPolicy: + default: IfNotPresent + description: The pull policy of image + type: string + repository: + default: "" + description: The repository of metrics-server image + type: string + tag: + default: "" + description: The image tag + type: string + type: object + namespace: + default: null + description: The namespace value used by older templates, will be overwriten + if top level namespace is present, kept for backward compatibility + nullable: true + type: string + type: object + namespace: + default: kube-system + description: The namespace in which metrics-server is deployed + type: string + nodeSelector: + default: null + description: NodeSelector configuration applied to all the deployments + nullable: true + type: object + version: 0.8.0 diff --git a/repo/packages/metrics-server.packages.kadras.io/metadata.yml b/repo/packages/metrics-server.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..bea30f4 --- /dev/null +++ b/repo/packages/metrics-server.packages.kadras.io/metadata.yml @@ -0,0 +1,21 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: metrics-server.packages.kadras.io +spec: + categories: + - monitoring + - metrics + - observability + displayName: metrics-server + iconSVGBase64: <svg xmlns="http://www.w3.org/2000/svg" role="img" viewBox="-0.17 0.08 230.10 223.35"><defs><style>.cls-1{fill:#fff}.cls-2{fill:#326ce5}</style></defs><path d="M134.358 126.466a3.59 3.59 0 0 0-.855-.065 3.685 3.685 0 0 0-1.425.37 3.725 3.725 0 0 0-1.803 4.825l-.026.037 8.528 20.603a43.53 43.53 0 0 0 17.595-22.102l-21.976-3.714zm-34.194 2.92a3.72 3.72 0 0 0-3.568-2.894 3.656 3.656 0 0 0-.733.065l-.037-.045-21.785 3.698a43.695 43.695 0 0 0 17.54 21.946l8.442-20.4-.066-.08a3.683 3.683 0 0 0 .207-2.29zm18.245 8a3.718 3.718 0 0 0-6.557.008h-.018l-10.713 19.372a43.637 43.637 0 0 0 23.815 1.225q2.197-.5 4.292-1.2l-10.738-19.406zm33.914-45l-16.483 14.753.009.047a3.725 3.725 0 0 0 1.46 6.395l.02.089 21.35 6.15a44.278 44.278 0 0 0-6.356-27.432zM121.7 94.039a3.725 3.725 0 0 0 5.913 2.84l.065.027 18.036-12.788a43.85 43.85 0 0 0-25.287-12.19l1.253 22.105zm-19.1 2.921a3.72 3.72 0 0 0 5.904-2.85l.092-.043 1.253-22.14a44.682 44.682 0 0 0-4.501.776 43.467 43.467 0 0 0-20.937 11.409l18.154 12.869zm-9.678 16.729a3.72 3.72 0 0 0 1.462-6.396l.018-.088-16.574-14.824a43.454 43.454 0 0 0-6.168 27.51l21.245-6.13zm16.098 6.512l6.114 2.94 6.096-2.934 1.514-6.581-4.219-5.276h-6.79l-4.231 5.268z" class="cls-2"/><path d="M216.208 133.167l-17.422-75.675a13.602 13.602 0 0 0-7.293-9.073l-70.521-33.67a13.589 13.589 0 0 0-11.705 0L38.76 48.437a13.598 13.598 0 0 0-7.295 9.072l-17.394 75.673a13.315 13.315 0 0 0-.004 5.81 13.506 13.506 0 0 0 .491 1.718 13.1 13.1 0 0 0 1.343 2.726c.239.365.491.72.765 1.064l48.804 60.678c.213.264.448.505.681.75a13.423 13.423 0 0 0 2.574 2.133 13.924 13.924 0 0 0 3.857 1.677 13.298 13.298 0 0 0 3.43.473h.759l77.504-.018a12.993 12.993 0 0 0 1.41-.083 13.47 13.47 0 0 0 1.989-.378 13.872 13.872 0 0 0 1.381-.442c.353-.135.705-.27 1.045-.433a13.941 13.941 0 0 0 1.479-.822 13.303 13.303 0 0 0 3.237-2.865l1.488-1.85 47.299-58.84a13.185 13.185 0 0 0 2.108-3.785 13.67 13.67 0 0 0 .5-1.724 13.282 13.282 0 0 0-.004-5.81zm-73.147 29.432a14.516 14.516 0 0 0 .703 1.703 3.314 3.314 0 0 0-.327 2.49 39.372 39.372 0 0 0 3.742 6.7 35.06 35.06 0 0 1 2.263 3.364c.17.315.392.803.553 1.136a4.24 4.24 0 1 1-7.63 3.607c-.161-.33-.385-.77-.522-1.082a35.275 35.275 0 0 1-1.225-3.868 39.305 39.305 0 0 0-2.896-7.097 3.335 3.335 0 0 0-2.154-1.307c-.135-.233-.635-1.15-.903-1.623a54.617 54.617 0 0 1-38.948-.1l-.955 1.73a3.429 3.429 0 0 0-1.819.887 29.517 29.517 0 0 0-3.268 7.582 34.9 34.9 0 0 1-1.218 3.868c-.135.31-.361.744-.522 1.073v.009l-.007.008a4.238 4.238 0 1 1-7.619-3.616c.159-.335.372-.82.54-1.135a35.177 35.177 0 0 1 2.262-3.373 41.228 41.228 0 0 0 3.82-6.866 4.188 4.188 0 0 0-.376-2.387l.768-1.84a54.922 54.922 0 0 1-24.338-30.387l-1.839.313a4.68 4.68 0 0 0-2.428-.855 39.524 39.524 0 0 0-7.356 2.165 35.589 35.589 0 0 1-3.787 1.45c-.305.084-.745.168-1.093.244-.028.01-.052.022-.08.029a.605.605 0 0 1-.065.006 4.236 4.236 0 1 1-1.874-8.224l.061-.015.037-.01c.353-.083.805-.2 1.127-.262a35.27 35.27 0 0 1 4.05-.326 39.388 39.388 0 0 0 7.564-1.242 5.835 5.835 0 0 0 1.814-1.83l1.767-.516a54.613 54.613 0 0 1 8.613-38.073l-1.353-1.206a4.688 4.688 0 0 0-.848-2.436 39.366 39.366 0 0 0-6.277-4.41 35.25 35.25 0 0 1-3.499-2.046c-.256-.191-.596-.478-.874-.704l-.063-.044a4.473 4.473 0 0 1-1.038-6.222 4.066 4.066 0 0 1 3.363-1.488 5.03 5.03 0 0 1 2.942 1.11c.287.225.68.526.935.745a35.253 35.253 0 0 1 2.78 2.95 39.383 39.383 0 0 0 5.69 5.142 3.333 3.333 0 0 0 2.507.243q.754.55 1.522 1.082A54.289 54.289 0 0 1 102.86 61.89a55.052 55.052 0 0 1 7.63-1.173l.1-1.784a4.6 4.6 0 0 0 1.37-2.184 39.476 39.476 0 0 0-.47-7.654 35.466 35.466 0 0 1-.576-4.014c-.011-.307.006-.731.01-1.081 0-.04-.01-.08-.01-.118a4.242 4.242 0 1 1 8.441-.004c0 .37.022.86.009 1.2a35.109 35.109 0 0 1-.579 4.013 39.533 39.533 0 0 0-.478 7.656 3.344 3.344 0 0 0 1.379 2.11c.015.305.065 1.323.102 1.884a55.309 55.309 0 0 1 35.032 16.927l1.606-1.147a4.69 4.69 0 0 0 2.56-.278 39.532 39.532 0 0 0 5.69-5.148 35.004 35.004 0 0 1 2.787-2.95c.259-.222.65-.52.936-.746a4.242 4.242 0 1 1 5.258 6.598c-.283.229-.657.548-.929.75a35.095 35.095 0 0 1-3.507 2.046 39.495 39.495 0 0 0-6.277 4.41 3.337 3.337 0 0 0-.792 2.39c-.235.216-1.06.947-1.497 1.343a54.837 54.837 0 0 1 8.792 37.983l1.704.496a4.745 4.745 0 0 0 1.82 1.83 39.464 39.464 0 0 0 7.568 1.246 35.64 35.64 0 0 1 4.046.324c.355.065.868.207 1.23.29a4.236 4.236 0 1 1-1.878 8.223l-.061-.008c-.028-.007-.054-.022-.083-.03-.348-.075-.785-.151-1.09-.231a35.14 35.14 0 0 1-3.785-1.462 39.477 39.477 0 0 0-7.363-2.165 3.337 3.337 0 0 0-2.362.877q-.9-.171-1.804-.316a54.92 54.92 0 0 1-24.328 30.605z" class="cls-2"/><path d="M225.407 135.107L206.4 52.547a14.838 14.838 0 0 0-7.958-9.9l-76.935-36.73a14.825 14.825 0 0 0-12.771 0L31.808 42.669a14.838 14.838 0 0 0-7.961 9.895L4.873 135.129a14.668 14.668 0 0 0 1.995 11.185c.261.4.538.788.838 1.162l53.246 66.205a14.98 14.98 0 0 0 11.499 5.487l85.387-.02a14.986 14.986 0 0 0 11.5-5.48l53.227-66.211a14.72 14.72 0 0 0 2.842-12.347zm-9.197 3.866a13.677 13.677 0 0 1-.498 1.723 13.184 13.184 0 0 1-2.11 3.786l-47.299 58.838-1.486 1.852a13.305 13.305 0 0 1-3.24 2.865 13.945 13.945 0 0 1-1.474.822q-.513.237-1.045.43a13.873 13.873 0 0 1-1.383.445 13.473 13.473 0 0 1-1.989.379 12.988 12.988 0 0 1-1.41.082l-77.504.018h-.76a13.298 13.298 0 0 1-3.429-.472 13.925 13.925 0 0 1-3.855-1.679 13.424 13.424 0 0 1-2.576-2.132c-.233-.246-.468-.487-.68-.75l-48.805-60.679q-.408-.514-.765-1.066a13.102 13.102 0 0 1-1.343-2.726 13.505 13.505 0 0 1-.491-1.719 13.315 13.315 0 0 1 .004-5.809l17.394-75.675a13.598 13.598 0 0 1 7.295-9.07l70.508-33.685a13.589 13.589 0 0 1 11.705 0l70.519 33.67a13.602 13.602 0 0 1 7.293 9.073l17.422 75.674a13.282 13.282 0 0 1 .002 5.807z" class="cls-1"/><path d="M185.814 127.106c-.36-.083-.874-.225-1.227-.29a35.642 35.642 0 0 0-4.046-.326 39.464 39.464 0 0 1-7.57-1.242 4.745 4.745 0 0 1-1.82-1.832l-1.704-.496a54.837 54.837 0 0 0-8.79-37.983c.436-.396 1.262-1.127 1.495-1.342a3.338 3.338 0 0 1 .792-2.39 39.495 39.495 0 0 1 6.277-4.41 35.095 35.095 0 0 0 3.507-2.046c.272-.202.644-.522.929-.75a4.242 4.242 0 1 0-5.256-6.6c-.288.227-.68.525-.936.747a35.004 35.004 0 0 0-2.789 2.95 39.533 39.533 0 0 1-5.69 5.148 4.69 4.69 0 0 1-2.56.278l-1.606 1.147a55.309 55.309 0 0 0-35.032-16.927c-.039-.561-.087-1.577-.102-1.884a3.344 3.344 0 0 1-1.377-2.11 39.533 39.533 0 0 1 .478-7.656 35.112 35.112 0 0 0 .575-4.012c.013-.34-.007-.834-.007-1.201a4.242 4.242 0 1 0-8.441.004c0 .04.009.078.01.118-.004.35-.021.774-.01 1.08a35.476 35.476 0 0 0 .576 4.015 39.475 39.475 0 0 1 .47 7.654 4.601 4.601 0 0 1-1.37 2.182l-.1 1.786a55.052 55.052 0 0 0-7.63 1.173 54.289 54.289 0 0 0-27.574 15.754q-.77-.531-1.526-1.082a3.333 3.333 0 0 1-2.506-.243 39.383 39.383 0 0 1-5.69-5.141 35.255 35.255 0 0 0-2.777-2.95c-.257-.22-.65-.52-.938-.75a5.03 5.03 0 0 0-2.942-1.11 4.066 4.066 0 0 0-3.363 1.49 4.473 4.473 0 0 0 1.038 6.222l.065.046c.276.226.616.515.872.702a35.256 35.256 0 0 0 3.499 2.048 39.367 39.367 0 0 1 6.276 4.412 4.69 4.69 0 0 1 .849 2.434l1.351 1.208a54.613 54.613 0 0 0-8.611 38.073l-1.767.514a5.835 5.835 0 0 1-1.814 1.827 39.39 39.39 0 0 1-7.565 1.247 35.266 35.266 0 0 0-4.049.326c-.324.06-.774.174-1.127.262l-.037.008-.06.018a4.236 4.236 0 1 0 1.875 8.224l.063-.01c.028-.006.052-.02.08-.025.348-.08.786-.163 1.092-.246a35.59 35.59 0 0 0 3.786-1.451 39.527 39.527 0 0 1 7.358-2.165 4.68 4.68 0 0 1 2.426.857l1.84-.315a54.922 54.922 0 0 0 24.34 30.387l-.769 1.84a4.188 4.188 0 0 1 .377 2.387 41.228 41.228 0 0 1-3.82 6.864 35.183 35.183 0 0 0-2.263 3.372c-.168.318-.381.805-.542 1.138a4.238 4.238 0 1 0 7.621 3.616l.007-.008v-.01c.16-.33.387-.763.522-1.072a34.903 34.903 0 0 0 1.218-3.868 29.517 29.517 0 0 1 3.268-7.582 3.43 3.43 0 0 1 1.819-.888l.957-1.73a54.617 54.617 0 0 0 38.946.099c.268.478.768 1.392.9 1.623a3.335 3.335 0 0 1 2.155 1.31 39.306 39.306 0 0 1 2.898 7.096 35.275 35.275 0 0 0 1.225 3.868c.137.312.36.75.522 1.082a4.24 4.24 0 1 0 7.63-3.607c-.161-.333-.383-.82-.55-1.136a35.06 35.06 0 0 0-2.263-3.364 39.372 39.372 0 0 1-3.742-6.7 3.314 3.314 0 0 1 .324-2.49 14.519 14.519 0 0 1-.703-1.703 54.92 54.92 0 0 0 24.328-30.605c.546.087 1.497.253 1.806.316a3.337 3.337 0 0 1 2.36-.877 39.476 39.476 0 0 1 7.36 2.165 35.135 35.135 0 0 0 3.788 1.462c.305.08.74.156 1.09.233.029.008.055.02.083.028l.06.009a4.236 4.236 0 1 0 1.878-8.224zm-40.1-42.987l-18.037 12.787-.063-.03a3.723 3.723 0 0 1-5.913-2.838l-.02-.01-1.253-22.103a43.85 43.85 0 0 1 25.285 12.194zm-33.978 24.228h6.788l4.22 5.276-1.513 6.58-6.096 2.934-6.114-2.94-1.516-6.583zm-6.386-35.648a44.672 44.672 0 0 1 4.503-.774l-1.255 22.137-.092.044a3.72 3.72 0 0 1-5.904 2.852l-.035.02-18.154-12.872a43.467 43.467 0 0 1 20.937-11.407zm-27.52 19.68l16.574 14.824-.018.09a3.72 3.72 0 0 1-1.462 6.395l-.017.072-21.245 6.13a43.454 43.454 0 0 1 6.168-27.51zm22.191 39.38l-8.441 20.397a43.696 43.696 0 0 1-17.536-21.948l21.783-3.7.037.049a3.655 3.655 0 0 1 .73-.065 3.72 3.72 0 0 1 3.364 5.185zm24.916 26.23a43.637 43.637 0 0 1-23.815-1.223l10.713-19.372h.018a3.725 3.725 0 0 1 6.557-.006h.08l10.74 19.404q-2.091.698-4.293 1.199zm13.841-5.751l-8.528-20.605.026-.037a3.725 3.725 0 0 1 1.803-4.823 3.685 3.685 0 0 1 1.425-.37 3.59 3.59 0 0 1 .855.063l.037-.046 21.977 3.714a43.53 43.53 0 0 1-17.595 22.105zm19.903-32.42l-21.352-6.15-.02-.09a3.725 3.725 0 0 1-1.46-6.395l-.008-.043 16.482-14.751a44.279 44.279 0 0 1 6.357 27.43z" class="cls-1"/></svg> + longDescription: Metrics Server is a scalable and efficient source of container + resource metrics for Kubernetes built-in autoscaling pipelines. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Scalable and efficient source of container resource metrics for + Kubernetes built-in autoscaling pipelines. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-metrics-server + for community support. diff --git a/repo/packages/postgresql-operator.packages.kadras.io/1.27.0.yml b/repo/packages/postgresql-operator.packages.kadras.io/1.27.0.yml new file mode 100644 index 0000000..054ae8e --- /dev/null +++ b/repo/packages/postgresql-operator.packages.kadras.io/1.27.0.yml @@ -0,0 +1,31 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: postgresql-operator.packages.kadras.io.1.27.0 +spec: + licenses: + - Apache 2.0 + refName: postgresql-operator.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-postgresql-operator/releases + releasedAt: "2025-08-14T17:53:47Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-postgresql-operator@sha256:7ba0b9f3ab4414eecd25540f29d5176abd8290c2850c3c85115c78ea2d9b25b8 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + default: null + nullable: true + version: 1.27.0 diff --git a/repo/packages/postgresql-operator.packages.kadras.io/metadata.yml b/repo/packages/postgresql-operator.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..afa8ece --- /dev/null +++ b/repo/packages/postgresql-operator.packages.kadras.io/metadata.yml @@ -0,0 +1,19 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: postgresql-operator.packages.kadras.io +spec: + categories: + - database + displayName: postgresql-operator + longDescription: CloudNativePG is a Kubernetes operator that covers the full lifecycle + of a PostgreSQL database cluster with a primary/standby architecture, using native + streaming replication. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: CloudNativePG is a Kubernetes operator that covers the full lifecycle + of a PostgreSQL database cluster. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-postgresql-operator + for community support. diff --git a/repo/packages/rabbitmq-operator.packages.kadras.io/2.16.1.yml b/repo/packages/rabbitmq-operator.packages.kadras.io/2.16.1.yml new file mode 100644 index 0000000..1b18205 --- /dev/null +++ b/repo/packages/rabbitmq-operator.packages.kadras.io/2.16.1.yml @@ -0,0 +1,44 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: rabbitmq-operator.packages.kadras.io.2.16.1 +spec: + licenses: + - Apache 2.0 + refName: rabbitmq-operator.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-rabbitmq-operator/releases + releasedAt: "2025-09-15T15:15:32Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-rabbitmq-operator@sha256:d8066a1d87ead89aa1b8801f54fbf8a111313c56ab9bf0fec2611b5b0fe06534 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + logging: + additionalProperties: false + description: Logging configuration. + properties: + level: + default: info + description: The Operator log level. Valid options are `info` and `debug`. + enum: + - info + - debug + type: string + type: object + type: object + version: 2.16.1 diff --git a/repo/packages/rabbitmq-operator.packages.kadras.io/metadata.yml b/repo/packages/rabbitmq-operator.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..651112e --- /dev/null +++ b/repo/packages/rabbitmq-operator.packages.kadras.io/metadata.yml @@ -0,0 +1,20 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: rabbitmq-operator.packages.kadras.io +spec: + categories: + - eventing + - messaging + - streaming + displayName: rabbitmq-operator + longDescription: Operator for RabbitMQ, an open-source message broker supporting + multiple messaging protocols and streaming. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Operator for RabbitMQ, a message broker supporting multiple messaging + protocols and streaming. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-rabbitmq-operator + for community support. diff --git a/repo/packages/rbac-configurer.packages.kadras.io/0.2.1.yml b/repo/packages/rbac-configurer.packages.kadras.io/0.2.1.yml new file mode 100644 index 0000000..859b647 --- /dev/null +++ b/repo/packages/rbac-configurer.packages.kadras.io/0.2.1.yml @@ -0,0 +1,31 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: rbac-configurer.packages.kadras.io.0.2.1 +spec: + licenses: + - Apache 2.0 + refName: rbac-configurer.packages.kadras.io + releaseNotes: https://github.com/kadras-io/rbac-configurer/releases + releasedAt: "2023-09-08T16:07:10Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/rbac-configurer@sha256:3421d6fb80f732536d46401ef5e43e1e476b332f94660fb04d59ef4021df3f7d + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + default: null + nullable: true + version: 0.2.1 diff --git a/repo/packages/rbac-configurer.packages.kadras.io/metadata.yml b/repo/packages/rbac-configurer.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..76cf3f5 --- /dev/null +++ b/repo/packages/rbac-configurer.packages.kadras.io/metadata.yml @@ -0,0 +1,18 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: rbac-configurer.packages.kadras.io +spec: + categories: + - rbac + displayName: rbac-configurer + longDescription: Default roles and RBAC configuration for the Kadras Engineering + Platform, supporting users and service accounts. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Default roles and RBAC configuration for the Kadras Engineering + Platform. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/rbac-configurer + for community support. diff --git a/repo/packages/secretgen-controller.packages.kadras.io/0.19.2.yml b/repo/packages/secretgen-controller.packages.kadras.io/0.19.2.yml new file mode 100644 index 0000000..b3dd67c --- /dev/null +++ b/repo/packages/secretgen-controller.packages.kadras.io/0.19.2.yml @@ -0,0 +1,35 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: secretgen-controller.packages.kadras.io.0.19.2 +spec: + licenses: + - Apache 2.0 + refName: secretgen-controller.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-secretgen-controller/releases + releasedAt: "2025-05-30T18:30:26Z" + template: + spec: + deploy: + - kapp: + rawOptions: + - --wait-timeout=5m + - --kube-api-qps=50 + - --kube-api-burst=100 + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-secretgen-controller@sha256:a75097ef7dc675acb9144cd6b7c76fccfb3d7aa57969cf3b0ec36a0f48fe35df + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + default: null + nullable: true + version: 0.19.2 diff --git a/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml b/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..f805679 --- /dev/null +++ b/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml @@ -0,0 +1,18 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: secretgen-controller.packages.kadras.io +spec: + categories: + - secrets management + displayName: secretgen-controller + iconSVGBase64: <?xml version="1.0" encoding="UTF-8"?><svg id="artwork" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 400 400"><defs><style>.cls-1{fill:none;}.cls-2{fill:#fff;}.cls-3{fill:#1e4488;}.cls-4{fill:#208fce;}.cls-5{fill:#17bed2;}.cls-6{fill:#727074;}.cls-7{fill:#794499;}</style></defs><circle class="cls-2" cx="226.38587" cy="198.95652" r="145.17574"/><path class="cls-1" d="M145.2919,319.37558c56.46741,38.03507,131.78503,31.69919,181.10465-15.23489-72.39742,18.75796-145.23924,17.48838-181.10465,15.23489Z"/><path class="cls-1" d="M336.96576,202.2257c10.66442-.31739,22.21754-.19043,34.56414-.8887v-2.38045c-.21411-80.19558-65.39904-145.03338-145.59462-144.81927-53.4453,.14269-102.49204,29.63276-127.68109,76.77012,29.64453,15.86967,77.66616,36.53197,153.99928,59.35256,15.1714,4.57047,68.74737,12.44181,84.7123,11.96574Z"/><path class="cls-1" d="M48.74082,72.12614s0,2.6661,.22217,7.49049c-.06349-2.47566-.15871-4.95133-.22217-7.49049Z"/><path class="cls-6" d="M226.38587,32.32501c-61.4245-.00398-117.86619,33.79761-146.8579,87.94971,5.20525,3.17393,11.33094,6.79222,18.59925,10.63267,37.59973-70.8353,125.50364-97.77807,196.33894-60.17836,47.44831,25.18579,77.11565,74.50911,77.12718,128.2275v2.38045c-.08839,6.11807-.56542,12.22431-1.42826,18.28186-.01569,.11585-.01569,.23329,0,.34913-1.15434,7.80906-2.92675,15.51419-5.30046,23.04277-.52901,1.7139-1.10029,3.39608-1.7139,5.04654-2.29618,6.37637-5.04325,12.5812-8.22048,18.56751-.38086,.73002-.76176,1.49175-1.17434,2.22174-3.60564,6.56655-7.72339,12.83863-12.31488,18.75796l-.57128,.69827c-46.8979,60.07252-132.26924,73.64266-195.48257,31.07281-11.14049-.69827-18.72621-1.49175-21.58276-1.84089v.15871l-1.0474-.25392h-.38088l-16.79011-4.15785-.79348-.44435c62.84646,67.20314,168.27249,70.73488,235.4756,7.88844,9.10782-8.51738,17.23056-18.03039,24.21563-28.3603,2.09481-3.17393,4.03091-6.34787,5.93524-9.5218,.09357-.19697,.19958-.38781,.31741-.57131,2.96481-5.14425,5.65585-10.44152,8.06177-15.86967,.38086-.85695,.79348-1.71393,1.17434-2.60262,2.53262-6.02321,4.7053-12.1915,6.50657-18.47229,.44435-1.55522,.92042-3.17393,1.33305-4.72915,2.06744-8.04579,3.52103-16.23692,4.34827-24.50277,.01559-.12648,.01559-.2544,0-.38088,.57443-5.51453,.86051-11.0553,.85698-16.59968h0c.08766-92.02801-74.44472-166.70249-166.47277-166.79015-.05289-.00005-.10582-.00007-.15875-.00007Z"/><path class="cls-6" d="M66.70527,219.71405c-.4126-1.80914-.85695-3.55481-1.26958-5.45917,.41263,1.84089,.85698,3.65003,1.26958,5.45917Z"/><path class="cls-6" d="M67.68921,223.99886c.34913,1.42826,.69827,2.79305,1.0474,4.15785-.73002-2.79305-1.36479-5.61785-2.03132-8.44268,.31739,1.42831,.6665,2.92004,.98391,4.28483Z"/><path class="cls-6" d="M65.43572,214.25488c-.76174-3.45958-1.5235-6.95092-2.22174-10.4105,.72999,3.58656,1.45998,7.04614,2.22174,10.4105Z"/><path class="cls-5" d="M282.78668,239.10679s-139.20873-21.10666-200.97348-52.90947c-6.35789-3.13345-12.35956-6.943-17.90098-11.36269l.76174,3.55481c2.28524,10.53746,5.07829,21.51927,8.44268,32.75499,1.58697,.60306,4.60219,1.71393,8.91875,3.17393,37.83328,13.48922,173.26503,58.59081,272.9583,52.24295,3.17723-5.98631,5.9243-12.19114,8.22048-18.56751,.5925-1.65046,1.16378-3.33262,1.7139-5.04654-27.44032,1.31656-54.94364,.03066-82.14137-3.84048Z"/><path class="cls-5" d="M49.50256,176.48509v-.69827l-22.21754,31.73934h0l10.60093,20.09101h0l18.12316-16.15531c-2.38043-10.53748-4.57045-22.15409-6.50655-34.97676Z"/><path class="cls-7" d="M200.3279,200.60698c-54.87734-15.86967-90.96495-31.32673-113.18249-42.78464-8.15701-4.18959-14.44141-7.83962-19.0436-10.75963-5.58613-3.49132-8.82353-5.90352-10.09311-6.88743v.47609c1.17436,8.69658,2.66609,17.9962,4.57047,27.80367,.4126,2.09481,.85695,4.25306,1.30132,6.34787,5.54143,4.41968,11.54309,8.22927,17.90098,11.36269,61.76475,31.73934,200.97348,52.90947,200.97348,52.90947,27.18427,3.90092,54.67689,5.21871,82.10965,3.93567,2.37372-7.52858,4.14613-15.2337,5.30046-23.04277-.01569-.11585-.01569-.23329,0-.34913-46.14897,5.84005-105.02546-.34913-169.83718-19.01186Z"/><path class="cls-7" d="M99.14288,268.8783l-4.57047-1.46001v.19043c8.23491,17.44835,17.96215,34.15248,29.07324,49.92596,2.85655,.34913,10.44222,1.14262,21.58276,1.84089,35.86546,2.25349,108.70723,3.52307,181.10465-15.23489,5.17852-4.92702,9.98436-10.23148,14.37792-15.86967l.57128-.69827c-81.08859,12.15191-163.87704,5.76019-242.13938-18.69444Z"/><path class="cls-7" d="M44.96383,139.31832l-30.59672,40.75331h0l12.69573,27.32757,22.21754-31.73934c-1.62927-10.79136-3.05756-22.42913-4.28481-34.91327,.06347-.3174,.03175-.88871-.03175-1.42827Z"/><path class="cls-7" d="M71.08531,264.18087l-7.39527,5.49092s13.74314,17.74228,15.04444,19.0436c2.47566,2.53916,4.7609,4.60219,6.79222,6.34787-5.63754-9.7819-10.42655-20.02887-14.31445-30.62847-.05269-.07904-.09534-.16432-.12694-.25392Z"/><path class="cls-3" d="M252.12647,190.25995c-76.33312-22.66188-124.3547-43.54637-153.87229-59.35256-7.26831-3.84046-13.394-7.42701-18.59925-10.63267-9.13455-5.26925-17.56945-11.66741-25.10583-19.0436,.50784,10.44224,1.5235,23.67754,3.55481,38.88069,1.26958,.98392,4.50698,3.39611,10.09311,6.88744,4.63394,2.92001,10.91834,6.57004,19.0436,10.75963,22.21754,11.4579,58.30515,26.97844,113.18249,42.78464,64.81172,18.66272,123.78341,24.85191,169.77373,19.0436,.86284-6.05755,1.33988-12.1638,1.42826-18.28186-12.18789,.69827-23.89972,.57131-34.56414,.8887-16.06015,.50782-69.63611-7.36353-84.9345-11.934Z"/><path class="cls-3" d="M82.03538,214.38184c-4.31655-1.5235-7.33178-2.63437-8.91875-3.17393v.53956c5.69004,19.08632,12.80921,37.71708,21.29709,55.73427l4.57047,1.46001c78.2799,24.47495,161.09121,30.87759,242.2029,18.72621,4.59149-5.91933,8.70924-12.19141,12.31488-18.75794,.41263-.73002,.79348-1.49175,1.17434-2.22174-99.37591,6.28438-234.80765-38.78547-272.64094-52.30644Z"/><path class="cls-3" d="M63.34091,203.84438c-1.0474-5.01482-2.06306-10.25182-3.17393-15.67924-6.40739-35.85691-10.15229-72.13884-11.20398-108.54854,0-4.82438-.22217-7.49049-.22217-7.49049l-7.61745,4.88787c.2539,8.95049,.60306,17.60475,1.0474,25.96278,0,1.23783,.15871,2.41218,.22217,3.65003L6.87662,162.55152l7.42702,17.74228,30.66021-40.88027c0,.53956,0,1.11087,.15871,1.65045,1.22725,12.44181,2.65553,24.07956,4.28481,34.91327v.69827c1.9361,12.69573,4.12612,24.43928,6.34787,34.91327l-17.80579,16.12359h0c.31739,.60306,7.68091,14.15574,12.69573,21.93189,5.01482,7.77615,12.28313,18.47229,13.33051,19.99579l7.39527-5.52264c-.01194,.09485-.01194,.19079,0,.28564,3.88789,10.5996,8.67691,20.84657,14.31445,30.62847,2.12728,3.71994,4.5471,7.26475,7.23657,10.60093,.24724,.28513,.53615,.53123,.85695,.73002l11.14051,6.34787,.79348,.44435s-20.66232-20.821-36.81763-85.02969c-2.22174-7.99833-4.03089-16.09187-5.55438-24.28062Z"/><path class="cls-4" d="M123.64565,317.53469c-11.10012-15.77465-20.81676-32.47875-29.0415-49.92599v-.19043c-8.48789-18.01719-15.60705-36.64795-21.29709-55.73427v-.53956c-3.36436-11.23573-6.15744-22.21754-8.44268-32.75499l-.76174-3.55481c-.44435-2.12653-.8887-4.28481-1.30132-6.34787-1.90436-9.80744-3.39611-19.0436-4.57047-27.80367v-.47609c-2.03132-15.20315-3.17393-28.5654-3.55481-38.88069-.76174-15.86967-.34913-25.1693-.34913-25.1693l-5.33221-3.99915c0,2.53914,0,5.01482,.22217,7.49049,0,1.39653,0,3.01524,.19043,4.72917,.8785,34.82328,4.47603,69.52472,10.75968,103.78765,.98391,5.42742,1.99957,10.66442,3.17393,15.67924,1.46001,7.1096,2.98351,13.8701,4.47526,20.15447,.34913,1.42826,.69827,2.79305,1.0474,4.15785,16.15531,64.20867,36.81763,85.02969,36.81763,85.02969l16.79011,4.15785h.4126l1.0474,.25392-.28567-.06349Z"/></svg> + longDescription: A cloud-native solution to generate and share Secrets, passwords, + keys, and certificates. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Secrets generation and sharing. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-secretgen-controller + for community support. diff --git a/repo/packages/service-binding.packages.kadras.io/1.0.0.yml b/repo/packages/service-binding.packages.kadras.io/1.0.0.yml new file mode 100644 index 0000000..7687f06 --- /dev/null +++ b/repo/packages/service-binding.packages.kadras.io/1.0.0.yml @@ -0,0 +1,31 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: service-binding.packages.kadras.io.1.0.0 +spec: + licenses: + - Apache 2.0 + refName: service-binding.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-service-binding/releases + releasedAt: "2024-07-29T20:35:04Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-service-binding@sha256:09ffb5fb4f9851305af3155be23d2831a25a9c3f41455333d6d14cb7f7badc0d + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + default: null + nullable: true + version: 1.0.0 diff --git a/repo/packages/service-binding.packages.kadras.io/metadata.yml b/repo/packages/service-binding.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..eeb4854 --- /dev/null +++ b/repo/packages/service-binding.packages.kadras.io/metadata.yml @@ -0,0 +1,23 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: service-binding.packages.kadras.io +spec: + categories: + - service-binding + displayName: service-binding + iconSVGBase64: <svg xmlns="http://www.w3.org/2000/svg" role="img" viewBox="-0.17 0.08 230.10 223.35"><defs><style>.cls-1{fill:#fff}.cls-2{fill:#326ce5}</style></defs><path d="M134.358 126.466a3.59 3.59 0 0 0-.855-.065 3.685 3.685 0 0 0-1.425.37 3.725 3.725 0 0 0-1.803 4.825l-.026.037 8.528 20.603a43.53 43.53 0 0 0 17.595-22.102l-21.976-3.714zm-34.194 2.92a3.72 3.72 0 0 0-3.568-2.894 3.656 3.656 0 0 0-.733.065l-.037-.045-21.785 3.698a43.695 43.695 0 0 0 17.54 21.946l8.442-20.4-.066-.08a3.683 3.683 0 0 0 .207-2.29zm18.245 8a3.718 3.718 0 0 0-6.557.008h-.018l-10.713 19.372a43.637 43.637 0 0 0 23.815 1.225q2.197-.5 4.292-1.2l-10.738-19.406zm33.914-45l-16.483 14.753.009.047a3.725 3.725 0 0 0 1.46 6.395l.02.089 21.35 6.15a44.278 44.278 0 0 0-6.356-27.432zM121.7 94.039a3.725 3.725 0 0 0 5.913 2.84l.065.027 18.036-12.788a43.85 43.85 0 0 0-25.287-12.19l1.253 22.105zm-19.1 2.921a3.72 3.72 0 0 0 5.904-2.85l.092-.043 1.253-22.14a44.682 44.682 0 0 0-4.501.776 43.467 43.467 0 0 0-20.937 11.409l18.154 12.869zm-9.678 16.729a3.72 3.72 0 0 0 1.462-6.396l.018-.088-16.574-14.824a43.454 43.454 0 0 0-6.168 27.51l21.245-6.13zm16.098 6.512l6.114 2.94 6.096-2.934 1.514-6.581-4.219-5.276h-6.79l-4.231 5.268z" class="cls-2"/><path d="M216.208 133.167l-17.422-75.675a13.602 13.602 0 0 0-7.293-9.073l-70.521-33.67a13.589 13.589 0 0 0-11.705 0L38.76 48.437a13.598 13.598 0 0 0-7.295 9.072l-17.394 75.673a13.315 13.315 0 0 0-.004 5.81 13.506 13.506 0 0 0 .491 1.718 13.1 13.1 0 0 0 1.343 2.726c.239.365.491.72.765 1.064l48.804 60.678c.213.264.448.505.681.75a13.423 13.423 0 0 0 2.574 2.133 13.924 13.924 0 0 0 3.857 1.677 13.298 13.298 0 0 0 3.43.473h.759l77.504-.018a12.993 12.993 0 0 0 1.41-.083 13.47 13.47 0 0 0 1.989-.378 13.872 13.872 0 0 0 1.381-.442c.353-.135.705-.27 1.045-.433a13.941 13.941 0 0 0 1.479-.822 13.303 13.303 0 0 0 3.237-2.865l1.488-1.85 47.299-58.84a13.185 13.185 0 0 0 2.108-3.785 13.67 13.67 0 0 0 .5-1.724 13.282 13.282 0 0 0-.004-5.81zm-73.147 29.432a14.516 14.516 0 0 0 .703 1.703 3.314 3.314 0 0 0-.327 2.49 39.372 39.372 0 0 0 3.742 6.7 35.06 35.06 0 0 1 2.263 3.364c.17.315.392.803.553 1.136a4.24 4.24 0 1 1-7.63 3.607c-.161-.33-.385-.77-.522-1.082a35.275 35.275 0 0 1-1.225-3.868 39.305 39.305 0 0 0-2.896-7.097 3.335 3.335 0 0 0-2.154-1.307c-.135-.233-.635-1.15-.903-1.623a54.617 54.617 0 0 1-38.948-.1l-.955 1.73a3.429 3.429 0 0 0-1.819.887 29.517 29.517 0 0 0-3.268 7.582 34.9 34.9 0 0 1-1.218 3.868c-.135.31-.361.744-.522 1.073v.009l-.007.008a4.238 4.238 0 1 1-7.619-3.616c.159-.335.372-.82.54-1.135a35.177 35.177 0 0 1 2.262-3.373 41.228 41.228 0 0 0 3.82-6.866 4.188 4.188 0 0 0-.376-2.387l.768-1.84a54.922 54.922 0 0 1-24.338-30.387l-1.839.313a4.68 4.68 0 0 0-2.428-.855 39.524 39.524 0 0 0-7.356 2.165 35.589 35.589 0 0 1-3.787 1.45c-.305.084-.745.168-1.093.244-.028.01-.052.022-.08.029a.605.605 0 0 1-.065.006 4.236 4.236 0 1 1-1.874-8.224l.061-.015.037-.01c.353-.083.805-.2 1.127-.262a35.27 35.27 0 0 1 4.05-.326 39.388 39.388 0 0 0 7.564-1.242 5.835 5.835 0 0 0 1.814-1.83l1.767-.516a54.613 54.613 0 0 1 8.613-38.073l-1.353-1.206a4.688 4.688 0 0 0-.848-2.436 39.366 39.366 0 0 0-6.277-4.41 35.25 35.25 0 0 1-3.499-2.046c-.256-.191-.596-.478-.874-.704l-.063-.044a4.473 4.473 0 0 1-1.038-6.222 4.066 4.066 0 0 1 3.363-1.488 5.03 5.03 0 0 1 2.942 1.11c.287.225.68.526.935.745a35.253 35.253 0 0 1 2.78 2.95 39.383 39.383 0 0 0 5.69 5.142 3.333 3.333 0 0 0 2.507.243q.754.55 1.522 1.082A54.289 54.289 0 0 1 102.86 61.89a55.052 55.052 0 0 1 7.63-1.173l.1-1.784a4.6 4.6 0 0 0 1.37-2.184 39.476 39.476 0 0 0-.47-7.654 35.466 35.466 0 0 1-.576-4.014c-.011-.307.006-.731.01-1.081 0-.04-.01-.08-.01-.118a4.242 4.242 0 1 1 8.441-.004c0 .37.022.86.009 1.2a35.109 35.109 0 0 1-.579 4.013 39.533 39.533 0 0 0-.478 7.656 3.344 3.344 0 0 0 1.379 2.11c.015.305.065 1.323.102 1.884a55.309 55.309 0 0 1 35.032 16.927l1.606-1.147a4.69 4.69 0 0 0 2.56-.278 39.532 39.532 0 0 0 5.69-5.148 35.004 35.004 0 0 1 2.787-2.95c.259-.222.65-.52.936-.746a4.242 4.242 0 1 1 5.258 6.598c-.283.229-.657.548-.929.75a35.095 35.095 0 0 1-3.507 2.046 39.495 39.495 0 0 0-6.277 4.41 3.337 3.337 0 0 0-.792 2.39c-.235.216-1.06.947-1.497 1.343a54.837 54.837 0 0 1 8.792 37.983l1.704.496a4.745 4.745 0 0 0 1.82 1.83 39.464 39.464 0 0 0 7.568 1.246 35.64 35.64 0 0 1 4.046.324c.355.065.868.207 1.23.29a4.236 4.236 0 1 1-1.878 8.223l-.061-.008c-.028-.007-.054-.022-.083-.03-.348-.075-.785-.151-1.09-.231a35.14 35.14 0 0 1-3.785-1.462 39.477 39.477 0 0 0-7.363-2.165 3.337 3.337 0 0 0-2.362.877q-.9-.171-1.804-.316a54.92 54.92 0 0 1-24.328 30.605z" class="cls-2"/><path d="M225.407 135.107L206.4 52.547a14.838 14.838 0 0 0-7.958-9.9l-76.935-36.73a14.825 14.825 0 0 0-12.771 0L31.808 42.669a14.838 14.838 0 0 0-7.961 9.895L4.873 135.129a14.668 14.668 0 0 0 1.995 11.185c.261.4.538.788.838 1.162l53.246 66.205a14.98 14.98 0 0 0 11.499 5.487l85.387-.02a14.986 14.986 0 0 0 11.5-5.48l53.227-66.211a14.72 14.72 0 0 0 2.842-12.347zm-9.197 3.866a13.677 13.677 0 0 1-.498 1.723 13.184 13.184 0 0 1-2.11 3.786l-47.299 58.838-1.486 1.852a13.305 13.305 0 0 1-3.24 2.865 13.945 13.945 0 0 1-1.474.822q-.513.237-1.045.43a13.873 13.873 0 0 1-1.383.445 13.473 13.473 0 0 1-1.989.379 12.988 12.988 0 0 1-1.41.082l-77.504.018h-.76a13.298 13.298 0 0 1-3.429-.472 13.925 13.925 0 0 1-3.855-1.679 13.424 13.424 0 0 1-2.576-2.132c-.233-.246-.468-.487-.68-.75l-48.805-60.679q-.408-.514-.765-1.066a13.102 13.102 0 0 1-1.343-2.726 13.505 13.505 0 0 1-.491-1.719 13.315 13.315 0 0 1 .004-5.809l17.394-75.675a13.598 13.598 0 0 1 7.295-9.07l70.508-33.685a13.589 13.589 0 0 1 11.705 0l70.519 33.67a13.602 13.602 0 0 1 7.293 9.073l17.422 75.674a13.282 13.282 0 0 1 .002 5.807z" class="cls-1"/><path d="M185.814 127.106c-.36-.083-.874-.225-1.227-.29a35.642 35.642 0 0 0-4.046-.326 39.464 39.464 0 0 1-7.57-1.242 4.745 4.745 0 0 1-1.82-1.832l-1.704-.496a54.837 54.837 0 0 0-8.79-37.983c.436-.396 1.262-1.127 1.495-1.342a3.338 3.338 0 0 1 .792-2.39 39.495 39.495 0 0 1 6.277-4.41 35.095 35.095 0 0 0 3.507-2.046c.272-.202.644-.522.929-.75a4.242 4.242 0 1 0-5.256-6.6c-.288.227-.68.525-.936.747a35.004 35.004 0 0 0-2.789 2.95 39.533 39.533 0 0 1-5.69 5.148 4.69 4.69 0 0 1-2.56.278l-1.606 1.147a55.309 55.309 0 0 0-35.032-16.927c-.039-.561-.087-1.577-.102-1.884a3.344 3.344 0 0 1-1.377-2.11 39.533 39.533 0 0 1 .478-7.656 35.112 35.112 0 0 0 .575-4.012c.013-.34-.007-.834-.007-1.201a4.242 4.242 0 1 0-8.441.004c0 .04.009.078.01.118-.004.35-.021.774-.01 1.08a35.476 35.476 0 0 0 .576 4.015 39.475 39.475 0 0 1 .47 7.654 4.601 4.601 0 0 1-1.37 2.182l-.1 1.786a55.052 55.052 0 0 0-7.63 1.173 54.289 54.289 0 0 0-27.574 15.754q-.77-.531-1.526-1.082a3.333 3.333 0 0 1-2.506-.243 39.383 39.383 0 0 1-5.69-5.141 35.255 35.255 0 0 0-2.777-2.95c-.257-.22-.65-.52-.938-.75a5.03 5.03 0 0 0-2.942-1.11 4.066 4.066 0 0 0-3.363 1.49 4.473 4.473 0 0 0 1.038 6.222l.065.046c.276.226.616.515.872.702a35.256 35.256 0 0 0 3.499 2.048 39.367 39.367 0 0 1 6.276 4.412 4.69 4.69 0 0 1 .849 2.434l1.351 1.208a54.613 54.613 0 0 0-8.611 38.073l-1.767.514a5.835 5.835 0 0 1-1.814 1.827 39.39 39.39 0 0 1-7.565 1.247 35.266 35.266 0 0 0-4.049.326c-.324.06-.774.174-1.127.262l-.037.008-.06.018a4.236 4.236 0 1 0 1.875 8.224l.063-.01c.028-.006.052-.02.08-.025.348-.08.786-.163 1.092-.246a35.59 35.59 0 0 0 3.786-1.451 39.527 39.527 0 0 1 7.358-2.165 4.68 4.68 0 0 1 2.426.857l1.84-.315a54.922 54.922 0 0 0 24.34 30.387l-.769 1.84a4.188 4.188 0 0 1 .377 2.387 41.228 41.228 0 0 1-3.82 6.864 35.183 35.183 0 0 0-2.263 3.372c-.168.318-.381.805-.542 1.138a4.238 4.238 0 1 0 7.621 3.616l.007-.008v-.01c.16-.33.387-.763.522-1.072a34.903 34.903 0 0 0 1.218-3.868 29.517 29.517 0 0 1 3.268-7.582 3.43 3.43 0 0 1 1.819-.888l.957-1.73a54.617 54.617 0 0 0 38.946.099c.268.478.768 1.392.9 1.623a3.335 3.335 0 0 1 2.155 1.31 39.306 39.306 0 0 1 2.898 7.096 35.275 35.275 0 0 0 1.225 3.868c.137.312.36.75.522 1.082a4.24 4.24 0 1 0 7.63-3.607c-.161-.333-.383-.82-.55-1.136a35.06 35.06 0 0 0-2.263-3.364 39.372 39.372 0 0 1-3.742-6.7 3.314 3.314 0 0 1 .324-2.49 14.519 14.519 0 0 1-.703-1.703 54.92 54.92 0 0 0 24.328-30.605c.546.087 1.497.253 1.806.316a3.337 3.337 0 0 1 2.36-.877 39.476 39.476 0 0 1 7.36 2.165 35.135 35.135 0 0 0 3.788 1.462c.305.08.74.156 1.09.233.029.008.055.02.083.028l.06.009a4.236 4.236 0 1 0 1.878-8.224zm-40.1-42.987l-18.037 12.787-.063-.03a3.723 3.723 0 0 1-5.913-2.838l-.02-.01-1.253-22.103a43.85 43.85 0 0 1 25.285 12.194zm-33.978 24.228h6.788l4.22 5.276-1.513 6.58-6.096 2.934-6.114-2.94-1.516-6.583zm-6.386-35.648a44.672 44.672 0 0 1 4.503-.774l-1.255 22.137-.092.044a3.72 3.72 0 0 1-5.904 2.852l-.035.02-18.154-12.872a43.467 43.467 0 0 1 20.937-11.407zm-27.52 19.68l16.574 14.824-.018.09a3.72 3.72 0 0 1-1.462 6.395l-.017.072-21.245 6.13a43.454 43.454 0 0 1 6.168-27.51zm22.191 39.38l-8.441 20.397a43.696 43.696 0 0 1-17.536-21.948l21.783-3.7.037.049a3.655 3.655 0 0 1 .73-.065 3.72 3.72 0 0 1 3.364 5.185zm24.916 26.23a43.637 43.637 0 0 1-23.815-1.223l10.713-19.372h.018a3.725 3.725 0 0 1 6.557-.006h.08l10.74 19.404q-2.091.698-4.293 1.199zm13.841-5.751l-8.528-20.605.026-.037a3.725 3.725 0 0 1 1.803-4.823 3.685 3.685 0 0 1 1.425-.37 3.59 3.59 0 0 1 .855.063l.037-.046 21.977 3.714a43.53 43.53 0 0 1-17.595 22.105zm19.903-32.42l-21.352-6.15-.02-.09a3.725 3.725 0 0 1-1.46-6.395l-.008-.043 16.482-14.751a44.279 44.279 0 0 1 6.357 27.43z" class="cls-1"/></svg> + longDescription: This project specifies a Kubernetes-wide specification for communicating + service secrets to workloads in an automated way. It aims to create a widely applicable + mechanism but without excluding other strategies for systems that it does not + fit easily. The benefit of Kubernetes-wide specification is that all of the actors + in an ecosystem can work towards a clearly defined abstraction at the edge of + their expertise and depend on other parties to complete the chain. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: A Kubernetes-wide specification for communicating service secrets + to workloads in an automated way. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-service-binding + for community support. diff --git a/repo/packages/tempo-operator.packages.kadras.io/0.17.1.yml b/repo/packages/tempo-operator.packages.kadras.io/0.17.1.yml new file mode 100644 index 0000000..3d610f9 --- /dev/null +++ b/repo/packages/tempo-operator.packages.kadras.io/0.17.1.yml @@ -0,0 +1,293 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: tempo-operator.packages.kadras.io.0.17.1 +spec: + licenses: + - Apache 2.0 + refName: tempo-operator.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-tempo-operator/releases + releasedAt: "2025-08-14T18:19:45Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-tempo-operator@sha256:3af49f0336f722e4e8cb9adbb0b48e0c821178e1fbf04cde0ce87621ccf62f57 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + configMapData: + default: {} + description: The YAML contents of the `tempo-operator-manager-config` ConfigMap. + See https://github.com/grafana/tempo-operator/blob/main/docs/operator/config.yaml + for more information. + nullable: true + controller: + additionalProperties: false + description: Settings for the Tempo Operator controller. + properties: + replicas: + default: 1 + description: The number of replicas for this Deployment. In order to + enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + tempo: + additionalProperties: false + description: Settings for Tempo. + properties: + extraConfig: + default: {} + description: Additional configuration for Tempo that will be merged + with the one generated by the Operator. It has higher precedence than + the Operator. + nullable: true + jaegerui: + additionalProperties: false + description: Settings for Jaeger UI. + properties: + enabled: + default: false + description: Whether to enable the Jaeger UI to visualize traces. + type: boolean + type: object + namespace: + default: default + description: Namespace where to provision a Tempo installation, stack + or monolithic. + type: string + observability: + additionalProperties: false + description: Settings for observability. + properties: + grafana: + additionalProperties: false + properties: + createDatasource: + default: false + description: Whether a Datasource managed by Grafana Operator + should be created for Tempo. + type: boolean + type: object + metrics: + additionalProperties: false + properties: + createPrometheusRules: + default: false + description: Whether PrometheusRules for alerts managed by Prometheus + Operator should be created for Tempo. + type: boolean + createServiceMonitors: + default: false + description: Whether ServiceMonitors managed by Prometheus Operator + should be created for Tempo. + type: boolean + type: object + tracing: + additionalProperties: false + properties: + otlpHttpEndpoint: + default: "" + description: The OTLP HTTP endpoint where to send traces. Only + for TempoStack. + type: string + samplingFraction: + default: "" + description: Sampling frequence for Tempo traces. Only for TempoStack. + type: string + type: object + type: object + resources: + additionalProperties: false + description: Settings for total resources. + properties: + limits: + additionalProperties: false + properties: + cpu: + default: 750m + type: string + memory: + default: 2Gi + type: string + type: object + requests: + additionalProperties: false + properties: + cpu: + default: 500m + type: string + memory: + default: 1Gi + type: string + type: object + type: object + storage: + additionalProperties: false + description: Settings for storage. + properties: + backend: + additionalProperties: false + description: Tracing backend object storage configuration. + properties: + secret: + additionalProperties: false + properties: + name: + default: "" + description: Name of the Secret containing the credentials + to access the configured object storage. + type: string + namespace: + default: kadras-system + description: Namespace containing the Secret with the credentials + to access the configured object storage. + type: string + type: object + type: + default: memory + description: 'Type of object storage that should be used. Valid + options: `azure`, `gcs`, `s3`, `memory` (only for TempoMonolithic).' + enum: + - azure + - gcs + - s3 + - memory + type: string + type: object + size: + default: 10Gi + description: The size of the storage used by Tempo. + type: string + type: object + tempoMonolithic: + additionalProperties: false + description: Settings for the built-in TempoMonolithic instance. + properties: + enabled: + default: false + description: Whether to deploy the built-in TempoMonolithic instance. + type: boolean + type: object + tempoStack: + additionalProperties: false + description: Settings for the built-in TempoStack instance. + properties: + compactor: + additionalProperties: false + description: Settings for the Tempo Compactor. + properties: + replicas: + default: 1 + description: Number of replicas to deploy for the Compactor + component. In order to enable high availability, it should + be greater than 1. + type: integer + type: object + distributor: + additionalProperties: false + description: Settings for the Tempo Distributor. + properties: + replicas: + default: 1 + description: Number of replicas to deploy for the Distributor + component. In order to enable high availability, it should + be greater than 1. + type: integer + type: object + enabled: + default: false + description: Whether to deploy the built-in TempoStack instance. + type: boolean + gateway: + additionalProperties: false + description: Settings for the Tempo Gateway. + properties: + enabled: + default: false + description: Whether to enable the Tempo Gateway. + type: boolean + ingress: + additionalProperties: false + description: Ingress for the Tempo Gateway. + properties: + annotations: + additionalProperties: false + description: The annotations for the Ingress object. + properties: {} + type: object + host: + default: "" + description: The hostname of the Ingress object. + type: string + ingressClassName: + default: contour + description: The class of the Ingress Controller to use + for the Tempo Gateway. + type: string + type: + default: null + description: 'Type of Ingress for the Tempo Gateway. Valid + options: `ingress`, `route`.' + enum: + - ingress + - route + nullable: true + type: string + type: object + type: object + ingester: + additionalProperties: false + description: Settings for the Tempo Ingester. + properties: + podSecurityContext: + additionalProperties: false + description: PodSecurityContext for the Ingester component. + properties: {} + type: object + replicas: + default: 1 + description: Number of replicas to deploy for the Ingester component. + In order to enable high availability, it should be greater + than 1. + type: integer + type: object + querier: + additionalProperties: false + description: Settings for the Tempo Querier. + properties: + replicas: + default: 1 + description: Number of replicas to deploy for the Querier component. + In order to enable high availability, it should be greater + than 1. + type: integer + type: object + queryFrontend: + additionalProperties: false + description: Settings for the Tempo Query Frontend. + properties: + replicas: + default: 1 + description: Number of replicas to deploy for the Query Frontend + component. In order to enable high availability, it should + be greater than 1. + type: integer + type: object + type: object + type: object + type: object + version: 0.17.1 diff --git a/repo/packages/tempo-operator.packages.kadras.io/metadata.yml b/repo/packages/tempo-operator.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..7f3f5d7 --- /dev/null +++ b/repo/packages/tempo-operator.packages.kadras.io/metadata.yml @@ -0,0 +1,21 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: tempo-operator.packages.kadras.io +spec: + categories: + - gitops + displayName: tempo-operator + longDescription: Tempo is an open source, easy-to-use, and high-scale distributed + tracing backend. It can ingest common open source tracing protocols including + Jaeger, Zipkin, and OpenTelemetry and requires only object storage to operate. + The Community Tempo Operator supports Tempo deployments in Microservices mode + (TempoStack CR) and Monolithic mode (TempoMonolithic CR). + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Open source, easy-to-use, and high-scale distributed tracing backend + with support for OpenTelemetry. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-tempo-operator + for community support. diff --git a/repo/packages/workspace-provisioner.packages.kadras.io/0.4.0.yml b/repo/packages/workspace-provisioner.packages.kadras.io/0.4.0.yml new file mode 100644 index 0000000..4cf6ff9 --- /dev/null +++ b/repo/packages/workspace-provisioner.packages.kadras.io/0.4.0.yml @@ -0,0 +1,115 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: workspace-provisioner.packages.kadras.io.0.4.0 +spec: + licenses: + - Apache 2.0 + refName: workspace-provisioner.packages.kadras.io + releaseNotes: https://github.com/kadras-io/workspace-provisioner/releases + releasedAt: "2025-08-14T17:24:09Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/workspace-provisioner@sha256:9efab8fd3c86a7e8cfd5f1cff17ab5a881a0d37b13af5e971f2e1b23ac6c2dde + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + cosign: + additionalProperties: false + description: Settings for Cosign, used for signing and verifying OCI artifacts. + properties: + secret: + additionalProperties: false + description: Configuration for the Secret holding the Cosign key pair. + properties: + name: + default: "" + description: The name of the Secret holding the Cosign key pair. + type: string + namespace: + default: "" + description: The namespace of the Secret holding the Cosign key + pair. + type: string + type: object + type: object + git: + additionalProperties: false + description: Configuration to access the Git repositories used in the GitOps + workflows. + properties: + secret: + additionalProperties: false + description: Configuration for the Secret holding the Git credentials. + properties: + name: + default: "" + description: The name of the Secret holding the Git credentials. + type: string + namespace: + default: "" + description: The namespace of the Secret holding the Git credentials. + type: string + type: object + server: + default: https://github.com + description: The Git server hosting the Git repositories used in the + GitOps workflows. + type: string + type: object + namespaces: + default: [] + description: Configuration for the namespaces the platform will provision + and manage. + items: + additionalProperties: false + description: Details about the namespace to configure. + properties: + name: + default: "" + type: string + type: object + type: array + oci: + additionalProperties: false + description: Settings for accessing the OCI registry that the workspace + will use. + properties: + pull_secret: + additionalProperties: false + description: Configuration for the Secret holding the credentials to + pull images from the OCI registry. + properties: + name: + default: "" + description: The name of the Secret holding the credentials to pull + images from the OCI registry. + type: string + namespace: + default: "" + description: The namespace of the Secret holding the credentials + to pull images from the OCI registry. + type: string + type: object + type: object + service_account: + default: supply-chain + description: The `ServiceAccount` to be configured with credentials and + roles in each workspace. + type: string + type: object + version: 0.4.0 diff --git a/repo/packages/workspace-provisioner.packages.kadras.io/metadata.yml b/repo/packages/workspace-provisioner.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..91aeb81 --- /dev/null +++ b/repo/packages/workspace-provisioner.packages.kadras.io/metadata.yml @@ -0,0 +1,17 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: workspace-provisioner.packages.kadras.io +spec: + categories: + - environment provisioning + displayName: workspace-provisioner + longDescription: Provisions and configures workspaces for the platform users, such + as application developers. A workspace can be a namespace or a virtual cluster. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Provisions and configures workspaces for the platform users. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/workspace-provisioner + for community support. diff --git a/repo/pkgrepo-build.yml b/repo/pkgrepo-build.yml index c20d866..140bf1c 100644 --- a/repo/pkgrepo-build.yml +++ b/repo/pkgrepo-build.yml @@ -1,9 +1,9 @@ apiVersion: kctrl.carvel.dev/v1alpha1 kind: PackageRepositoryBuild metadata: - creationTimestamp: "2022-09-24T20:15:30Z" + creationTimestamp: "2023-01-12T21:36:30Z" name: repository.packages.kadras.io spec: export: imgpkgBundle: - image: ghcr.io/arktonix/kadras-packages + image: ghcr.io/kadras-io/kadras-packages