diff --git a/.github/CODEOWNERS.md b/.github/CODEOWNERS.md new file mode 100644 index 0000000..cdf81a7 --- /dev/null +++ b/.github/CODEOWNERS.md @@ -0,0 +1 @@ +* @ThomasVitale \ No newline at end of file diff --git a/.github/ISSUE_TEMPLATE/bug-report.md b/.github/ISSUE_TEMPLATE/bug-report.md new file mode 100644 index 0000000..0f20905 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/bug-report.md @@ -0,0 +1,27 @@ +--- +name: Bug report +about: Tell us about a problem you are experiencing +title: '' +labels: bug, triage +assignees: '' + +--- + +**What steps did you take:** +[A clear and concise description steps that can be used to reproduce the problem.] + +**What happened:** +[A small description of the issue] + +**What did you expect:** +[A description of what was expected] + +**Anything else you would like to add:** +[Additional information that will assist in solving the issue.] + +**Environment:** + +* Kubernetes version (execute `kubectl version`): +* kctrl version (execute `kctrl version`): +* kapp-controller version (execute `kubectl get deployment -n kapp-controller kapp-controller -o yaml` and the annotation is `kbld.k14s.io/images`): +* package repo version (execute `kctrl package repo get -r kadras-packages -n `): diff --git a/.github/ISSUE_TEMPLATE/feature-request.md b/.github/ISSUE_TEMPLATE/feature-request.md new file mode 100644 index 0000000..270da4e --- /dev/null +++ b/.github/ISSUE_TEMPLATE/feature-request.md @@ -0,0 +1,17 @@ +--- +name: Feature request +about: Suggest an idea for this project +title: '' +labels: enhancement, triage +assignees: '' + +--- + +**Describe the problem/challenge you have:** +[A description of the current challenge that you are experiencing.] + +**Describe the solution you'd like:** +[A clear and concise description of what you want to happen. If applicable a visual representation of the UX.] + +**Anything else you would like to add:** +[Additional information that will assist in solving the issue.] diff --git a/.github/ISSUE_TEMPLATE/other-request.md b/.github/ISSUE_TEMPLATE/other-request.md new file mode 100644 index 0000000..b5722c0 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/other-request.md @@ -0,0 +1,8 @@ +--- +name: Other issue or question +about: Free form issue or question +title: '' +labels: triage +assignees: '' + +--- diff --git a/.github/dependabot.yml b/.github/dependabot.yml new file mode 100644 index 0000000..4bb1068 --- /dev/null +++ b/.github/dependabot.yml @@ -0,0 +1,13 @@ +version: 2 +updates: + - package-ecosystem: "github-actions" + directory: "/" + schedule: + interval: daily + time: "00:30" + timezone: Europe/Copenhagen + open-pull-requests-limit: 10 + labels: + - "dependencies" + commit-message: + prefix: "deps:" diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 4e9b715..b98fffa 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -3,31 +3,31 @@ on: - workflow_dispatch env: - COSIGN_EXPERIMENTAL: 1 REGISTRY: ghcr.io IMAGE_NAME: ${{ github.repository }} - VERSION: 0.1.2 + VERSION: 0.27.0 jobs: build: name: Build - runs-on: ubuntu-22.04 + runs-on: ubuntu-24.04 permissions: contents: write packages: write outputs: - image-release: ${{ steps.image-info.outputs.release }} + image-name: ${{ steps.image-info.outputs.image_name }} + image-digest: ${{ steps.image-info.outputs.image_digest }} steps: - name: Checkout source code - uses: actions/checkout@v3.0.2 + uses: actions/checkout@v6.0.0 - name: Set up Carvel - uses: vmware-tanzu/carvel-setup-action@v1.1.1 + uses: carvel-dev/setup-action@v2.0.1 with: token: ${{ secrets.GITHUB_TOKEN }} - name: Log into container registry - uses: redhat-actions/podman-login@v1.4 + uses: redhat-actions/podman-login@v1.7 with: username: ${{ github.actor }} password: ${{ secrets.GITHUB_TOKEN }} @@ -35,7 +35,10 @@ jobs: - name: Create k3d cluster run: | - brew install k3d + # Install k3d + curl -s https://raw.githubusercontent.com/k3d-io/k3d/main/install.sh | bash + + # Create a Kubernetes cluster k3d cluster create test-cluster # Wait for the generation of a token for the Service Account @@ -53,7 +56,9 @@ jobs: package_file=repo/package-repository.yml image_release=$(yq '.spec.fetch.imgpkgBundle.image' ${package_file}) echo "IMAGE_RELEASE=${image_release}" >> $GITHUB_ENV - echo "::set-output name=release::${image_release}" + + echo "image_name=$(echo ${image_release} | cut -d'@' -f1)" >> $GITHUB_OUTPUT + echo "image_digest=$(echo ${image_release} | cut -d'@' -f2)" >> $GITHUB_OUTPUT - name: Add additional tags to OCI image run: | @@ -72,21 +77,20 @@ jobs: sign: name: Sign - runs-on: ubuntu-22.04 + runs-on: ubuntu-24.04 needs: [build] permissions: packages: write id-token: write env: - IMAGE_RELEASE: ${{ needs.build.outputs.image-release }} + IMAGE_NAME: ${{ needs.build.outputs.image-name }} + IMAGE_DIGEST: ${{ needs.build.outputs.image-digest }} steps: - name: Install Cosign - uses: sigstore/cosign-installer@v2.7.0 - with: - cosign-release: 'v1.12.1' + uses: sigstore/cosign-installer@v3.10.0 - name: Log into container registry - uses: redhat-actions/podman-login@v1.4 + uses: redhat-actions/podman-login@v1.7 with: username: ${{ github.actor }} password: ${{ secrets.GITHUB_TOKEN }} @@ -94,51 +98,18 @@ jobs: - name: Sign image run: | - cosign sign "${IMAGE_RELEASE}" + cosign sign --yes "${IMAGE_NAME}@${IMAGE_DIGEST}" provenance: - name: Provenance - runs-on: ubuntu-22.04 needs: [build,sign] permissions: - packages: write + actions: read id-token: write - env: - IMAGE_RELEASE: ${{ needs.build.outputs.image-release }} - PROVENANCE_FILE: provenance.att - steps: - - name: Install Cosign - uses: sigstore/cosign-installer@v2.7.0 - with: - cosign-release: 'v1.12.1' - - - name: Log into container registry - uses: redhat-actions/podman-login@v1.4 - with: - username: ${{ github.actor }} - password: ${{ secrets.GITHUB_TOKEN }} - registry: ${{ env.REGISTRY }} - - - name: Extract digest - run: | - digest=$(echo ${IMAGE_RELEASE} | cut -d "@" -f2) - echo "IMAGE_DIGEST=${digest}" >> $GITHUB_ENV - - - name: Generate provenance - uses: philips-labs/slsa-provenance-action@v0.7.2 - with: - command: generate - subcommand: container - arguments: --repository ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} --tags ${{ env.VERSION }} --digest ${{ env.IMAGE_DIGEST }} --output-path ${{ env.PROVENANCE_FILE }} - env: - COSIGN_EXPERIMENTAL: 0 - - - name: Attach provenance - run: | - jq '.predicate' "${PROVENANCE_FILE}" > provenance-predicate.att - cosign attest --predicate provenance-predicate.att --type slsaprovenance "${IMAGE_RELEASE}" - - - uses: actions/upload-artifact@v3.1.0 - with: - name: provenance.att - path: ${{ env.PROVENANCE_FILE }} + packages: write + uses: slsa-framework/slsa-github-generator/.github/workflows/generator_container_slsa3.yml@v2.1.0 + with: + image: ${{ needs.build.outputs.image-name }} + digest: ${{ needs.build.outputs.image-digest }} + registry-username: ${{ github.actor }} + secrets: + registry-password: ${{ secrets.GITHUB_TOKEN }} diff --git a/CODE_OF_CONDUCT.md b/CODE_OF_CONDUCT.md new file mode 100644 index 0000000..d65f99f --- /dev/null +++ b/CODE_OF_CONDUCT.md @@ -0,0 +1,128 @@ +# Contributor Covenant Code of Conduct + +## Our Pledge + +We as members, contributors, and leaders pledge to make participation in our +community a harassment-free experience for everyone, regardless of age, body +size, visible or invisible disability, ethnicity, sex characteristics, gender +identity and expression, level of experience, education, socio-economic status, +nationality, personal appearance, race, religion, or sexual identity +and orientation. + +We pledge to act and interact in ways that contribute to an open, welcoming, +diverse, inclusive, and healthy community. + +## Our Standards + +Examples of behavior that contributes to a positive environment for our +community include: + +* Demonstrating empathy and kindness toward other people +* Being respectful of differing opinions, viewpoints, and experiences +* Giving and gracefully accepting constructive feedback +* Accepting responsibility and apologizing to those affected by our mistakes, + and learning from the experience +* Focusing on what is best not just for us as individuals, but for the + overall community + +Examples of unacceptable behavior include: + +* The use of sexualized language or imagery, and sexual attention or + advances of any kind +* Trolling, insulting or derogatory comments, and personal or political attacks +* Public or private harassment +* Publishing others' private information, such as a physical or email + address, without their explicit permission +* Other conduct which could reasonably be considered inappropriate in a + professional setting + +## Enforcement Responsibilities + +Community leaders are responsible for clarifying and enforcing our standards of +acceptable behavior and will take appropriate and fair corrective action in +response to any behavior that they deem inappropriate, threatening, offensive, +or harmful. + +Community leaders have the right and responsibility to remove, edit, or reject +comments, commits, code, wiki edits, issues, and other contributions that are +not aligned to this Code of Conduct, and will communicate reasons for moderation +decisions when appropriate. + +## Scope + +This Code of Conduct applies within all community spaces, and also applies when +an individual is officially representing the community in public spaces. +Examples of representing our community include using an official e-mail address, +posting via an official social media account, or acting as an appointed +representative at an online or offline event. + +## Enforcement + +Instances of abusive, harassing, or otherwise unacceptable behavior may be +reported to the community leaders responsible for enforcement at +community@kadras.io. +All complaints will be reviewed and investigated promptly and fairly. + +All community leaders are obligated to respect the privacy and security of the +reporter of any incident. + +## Enforcement Guidelines + +Community leaders will follow these Community Impact Guidelines in determining +the consequences for any action they deem in violation of this Code of Conduct: + +### 1. Correction + +**Community Impact**: Use of inappropriate language or other behavior deemed +unprofessional or unwelcome in the community. + +**Consequence**: A private, written warning from community leaders, providing +clarity around the nature of the violation and an explanation of why the +behavior was inappropriate. A public apology may be requested. + +### 2. Warning + +**Community Impact**: A violation through a single incident or series +of actions. + +**Consequence**: A warning with consequences for continued behavior. No +interaction with the people involved, including unsolicited interaction with +those enforcing the Code of Conduct, for a specified period of time. This +includes avoiding interactions in community spaces as well as external channels +like social media. Violating these terms may lead to a temporary or +permanent ban. + +### 3. Temporary Ban + +**Community Impact**: A serious violation of community standards, including +sustained inappropriate behavior. + +**Consequence**: A temporary ban from any sort of interaction or public +communication with the community for a specified period of time. No public or +private interaction with the people involved, including unsolicited interaction +with those enforcing the Code of Conduct, is allowed during this period. +Violating these terms may lead to a permanent ban. + +### 4. Permanent Ban + +**Community Impact**: Demonstrating a pattern of violation of community +standards, including sustained inappropriate behavior, harassment of an +individual, or aggression toward or disparagement of classes of individuals. + +**Consequence**: A permanent ban from any sort of public interaction within +the community. + +## Attribution + +This Code of Conduct is adapted from the [Contributor Covenant][homepage], +version 2.0, available at +https://www.contributor-covenant.org/version/2/0/code_of_conduct.html. + +Community Impact Guidelines were inspired by [Mozilla's code of conduct +enforcement ladder](https://github.com/mozilla/diversity). + +[homepage]: https://www.contributor-covenant.org + +For answers to common questions about this code of conduct, see the FAQ at +https://www.contributor-covenant.org/faq. Translations are available at +https://www.contributor-covenant.org/translations. diff --git a/LICENSE b/LICENSE index 7ce99a3..261eeb9 100644 --- a/LICENSE +++ b/LICENSE @@ -186,7 +186,7 @@ same "printed page" as the copyright notice for easier identification within third-party archives. - Copyright 2022 Arktonix + Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. diff --git a/MAINTAINERS.md b/MAINTAINERS.md new file mode 100644 index 0000000..2249643 --- /dev/null +++ b/MAINTAINERS.md @@ -0,0 +1,3 @@ +# Maintainers + +* Thomas Vitale | [ThomasVitale](https://github.com/ThomasVitale) \ No newline at end of file diff --git a/README.md b/README.md index e4931b0..fedb0d3 100644 --- a/README.md +++ b/README.md @@ -1,94 +1,90 @@ # Kadras Packages -A collection of Kubernetes-native packages based on [Carvel](https://carvel.dev) and part of the Kadras project. +![Release Workflow](https://github.com/kadras-io/kadras-packages/actions/workflows/release.yml/badge.svg) +[![The SLSA Level 3 badge](https://slsa.dev/images/gh-badge-level3.svg)](https://slsa.dev/spec/v1.0/levels) +[![The Apache 2.0 license badge](https://img.shields.io/badge/License-Apache_2.0-blue.svg)](https://opensource.org/licenses/Apache-2.0) +[![Follow us on Bluesky](https://img.shields.io/static/v1?label=Bluesky&message=Follow&color=1DA1F2)](https://bsky.app/profile/kadras.bsky.social) -## Components +The [Kadras](https://kadras.io) collection of Kubernetes-native packages built with [Carvel](https://carvel.dev). -This repository contains the Carvel packages part of the Kadras project. +## 📦  Package Repository -The following packages are maintained by the [Arktonix](https://github.com/arktonix) organization: +This repository contains the following Carvel packages. -* [argo-cd](https://github.com/arktonix/package-for-argo-cd) -* [knative-eventing](https://github.com/arktonix/package-for-knative-eventing) -* [knative-serving](https://github.com/arktonix/package-for-knative-serving) +| Package | Description | +|---------|-------------| +| [cert-manager](https://github.com/kadras-io/package-for-cert-manager) | A cloud-native solution to automatically provision and manage X.509 certificates. | +| [contour](https://github.com/kadras-io/package-for-contour) | An Envoy-based ingress controller that supports dynamic configuration updates and multi-team ingress delegation. | +| [crossplane](https://github.com/kadras-io/package-for-crossplane) | A Kubernetes extension that transforms your Kubernetes cluster into a universal control plane. | +| [dependency-track](https://github.com/kadras-io/package-for-dependency-track) | OWASP Dependency Track is a continuous SBOM Analysis Platform for managing software supply chain security risks. | +| [developer-portal](https://github.com/kadras-io/package-for-developer-portal) | Kadras Developer Portal, based on Backstage. It supports application developers with paved paths to production on Kubernetes. | +| [engineering-platform](https://github.com/kadras-io/engineering-platform) | A curated set of Carvel packages to build an engineering platform supporting application developers with paved paths to production on Kubernetes. | +| [flux](https://github.com/kadras-io/package-for-flux) | A continuous deployment solution for Kubernetes, powered by the GitOps Toolkit. | +| [gitops-configurer](https://github.com/kadras-io/gitops-configurer) | Provides GitOps configuration for the Kadras Engineering Platform. | +| [knative-serving](https://github.com/kadras-io/package-for-knative-serving) | A solution built on Kubernetes to support deploying and serving of applications and functions as serverless containers. | +| [kyverno](https://github.com/kadras-io/package-for-kyverno) | A policy engine designed for Kubernetes. It can validate, mutate, and generate configurations using admission controls and background scans. | +| [metrics-server](https://github.com/kadras-io/package-for-metrics-server) | A scalable and efficient source of container resource metrics for Kubernetes built-in autoscaling pipelines. | +| [postgresql-operator](https://github.com/kadras-io/package-for-postgresql-operator) | CloudNativePG, a Kubernetes operator that covers the full lifecycle of a PostgreSQL database cluster with a primary/standby architecture, using native streaming replication. | +| [rabbitmq-operator](https://github.com/kadras-io/package-for-rabbitmq-operator) | A message broker supporting multiple messaging protocols and streaming. | +| [rbac-configurer](https://github.com/kadras-io/rbac-configurer) | Provides default roles and RBAC configuration for the Kadras Engineering Platform. | +| [secretgen-controller](https://github.com/kadras-io/package-for-secretgen-controller) | Generates various types of Secrets in-cluster as well as export and import Secrets across namespaces. | +| [service-binding](https://github.com/kadras-io/package-for-service-binding) | A standard and automated way for communicating service secrets to workloads. | +| [tempo-operator](https://github.com/kadras-io/package-for-tempo-operator) | A solution to manage Grafana Tempo on Kubernetes and OpenShift clusters. | +| [workspace-provisioner](https://github.com/kadras-io/workspace-provisioner) | Provisions and configures workspaces (namespaces or virtual clusters) to work with the Kadras Engineering Platform. | -It also includes the following open-source packages maintained by the [VMware Tanzu](https://github.com/vmware-tanzu) organization: +## 🚀  Getting Started -* [cartographer](https://github.com/vmware-tanzu/package-for-cartographer) -* [cert-manager](https://github.com/vmware-tanzu/community-edition/tree/main/addons/packages/cert-manager) -* [contour](https://github.com/vmware-tanzu/community-edition/tree/main/addons/packages/contour) -* [kpack](https://github.com/vmware-tanzu/package-for-kpack) -* [metrics-server](https://github.com/vmware-tanzu/community-edition/tree/main/addons/packages/metrics-server) -* [secretgen-controller](https://github.com/vmware-tanzu/carvel-secretgen-controller) +### Prerequisites -## Prerequisites +* Kubernetes 1.32+ +* Carvel [`kctrl`](https://carvel.dev/kapp-controller/docs/latest/install/#installing-kapp-controller-cli-kctrl) CLI. +* Carvel [kapp-controller](https://carvel.dev/kapp-controller) deployed in your Kubernetes cluster. You can install it with Carvel [`kapp`](https://carvel.dev/kapp/docs/latest/install) (recommended choice) or `kubectl`. -* Install the [`kctrl`](https://carvel.dev/kapp-controller/docs/latest/install/#installing-kapp-controller-cli-kctrl) CLI to manage Carvel packages in a convenient way. -* Ensure [kapp-controller](https://carvel.dev/kapp-controller) is deployed in your Kubernetes cluster. You can do that with Carvel -[`kapp`](https://carvel.dev/kapp/docs/latest/install) (recommended choice) or `kubectl`. + ```shell + kapp deploy -a kapp-controller -y \ + -f https://github.com/carvel-dev/kapp-controller/releases/latest/download/release.yml + ``` -```shell -kapp deploy -a kapp-controller -y \ - -f https://github.com/vmware-tanzu/carvel-kapp-controller/releases/latest/download/release.yml -``` +### Installation -## Installation +Install the Kadras package repository in a dedicated namespace using `kctrl`: -You can install the Kadras package repository in a dedicated namespace using `kctrl`: + ```shell + kctrl package repository add -r kadras-packages \ + --url ghcr.io/kadras-io/kadras-packages \ + -n kadras-system --create-namespace + ``` -```shell -kubectl create namespace carvel-packages -kctrl package repository add -r kadras-repo \ - --url ghcr.io/arktonix/kadras-packages:0.1.2 \ - -n carvel-packages -``` +
Installation via CRDs +Instead of installing the Kadras package repository with `kctrl`, you can apply the necessary Carvel CRDs directly using [`kapp`](https://carvel.dev/kapp/docs/latest/install), `kubectl` or a GitOps operator. -Alternatively, you can add the repository by applying the `PackageRepository` manifest: + ```shell + kubectl create namespace kadras-system + kapp deploy -a kadras-repo -n kadras-system -y \ + -f https://github.com/kadras-io/kadras-packages/releases/latest/download/package-repository.yml + ``` +
-```shell -kubectl create namespace carvel-packages -kapp deploy -a kadras-repo -n carvel-packages -y \ - -f https://github.com/arktonix/kadras-packages/releases/latest/download/package-repository.yml -``` +Verify the list of available Carvel package repositories and their status. -After the installation, you can retrieve the list of available Carvel package repositories in your cluster -with the following command. + ```shell + kctrl package repository list -n kadras-system + ``` -```shell -kctrl package repository list -n carvel-packages -``` +List all the Carvel packages available in the Kadras package repository. -The Kadras package repository provides a collection of Carvel packages that you can list as follows. + ```shell + kctrl package available list -n kadras-system + ``` -```shell -kctrl package available list -n carvel-packages -``` +## 📙  Documentation -## Update +For documentation specific to Carvel package management, check out [carvel.dev](https://carvel.dev/kapp-controller/docs/latest/packaging). -You can update the repository by applying the `PackageRepository` manifest from the newest release, similar -to the process described in the "Installation" section. Alternatively, you can use the `kctrl` CLI. +## 🛡️  Security -```shell -kctrl package repository update -r kadras-repo \ - --url ghcr.io/arktonix/kadras-packages: \ - -n carvel-packages -``` +The security process for reporting vulnerabilities is described in [SECURITY.md](SECURITY.md). -## Documentation +## 🖊️  License -You can find more documentation about Carvel package management at [carvel.dev](https://carvel.dev/kapp-controller/docs/latest/packaging). - -## References - -This package repository is based on and inspired by the work done by the Carvel team and the -Tanzu Community Edition project. - -* [Kubernetes native package management with Carvel](https://carvel.dev/kapp-controller/docs/latest/packaging) -* [Tanzu Community Edition, an open-source Kubernetes platform](https://tanzucommunityedition.io) - -## Supply Chain Security - -This project is compliant with level 2 of the [SLSA Framework](https://slsa.dev). - -The SLSA Level 2 badge +This project is licensed under the **Apache License 2.0**. See [LICENSE](LICENSE) for more information. diff --git a/SECURITY.md b/SECURITY.md new file mode 100644 index 0000000..3ef9d1a --- /dev/null +++ b/SECURITY.md @@ -0,0 +1,5 @@ +# Security Policy + +## Reporting a Vulnerability + +If you know of a vulnerability in this project, please reach out to security@kadras.io and we will get back to you as soon as possible. diff --git a/docs/verify-release.md b/docs/verify-release.md new file mode 100644 index 0000000..677aad1 --- /dev/null +++ b/docs/verify-release.md @@ -0,0 +1,37 @@ +# Verifying the Package Repository Release + +This package repository is published as an OCI artifact, signed with Sigstore [Cosign](https://docs.sigstore.dev/cosign/overview), and associated with a [SLSA Provenance](https://slsa.dev/provenance) attestation. + +Using `cosign`, you can display the supply chain security related artifacts for the `ghcr.io/kadras-io/kadras-packages` images. Use the specific digest you'd like to verify. + +```shell +cosign tree ghcr.io/kadras-io/kadras-packages +``` + +The result: + +```shell +📦 Supply Chain Security Related artifacts for an image: ghcr.io/kadras-io/kadras-packages +└── 💾 Attestations for an image tag: ghcr.io/kadras-io/kadras-packages:sha256-3b5321df10e6b30cd30b4dc8b8c8f0f4b3ccd9605eb9d25af03108d6e148012c.att + └── 🍒 sha256:8e6fc2f6005fb56c588700579cbeecabce064cf604b3cabe6294154cfe69b919 +└── 🔐 Signatures for an image tag: ghcr.io/kadras-io/kadras-packages:sha256-3b5321df10e6b30cd30b4dc8b8c8f0f4b3ccd9605eb9d25af03108d6e148012c.sig + └── 🍒 sha256:74c7b24859642cce47b205f0c9be06164b4d182a2c73d1c435dc4ad7af924691 +``` + +You can verify the signature and its claims: + +```shell +cosign verify \ + --certificate-identity-regexp https://github.com/kadras-io \ + --certificate-oidc-issuer https://token.actions.githubusercontent.com \ + ghcr.io/kadras-io/kadras-packages | jq +``` + +You can also verify the SLSA Provenance attestation associated with the image. + +```shell +cosign verify-attestation --type slsaprovenance \ + --certificate-identity-regexp https://github.com/slsa-framework \ + --certificate-oidc-issuer https://token.actions.githubusercontent.com \ + ghcr.io/kadras-io/kadras-packages | jq .payload -r | base64 --decode | jq +``` diff --git a/repo/packages/argo-cd.packages.kadras.io/2.4.12.yml b/repo/packages/argo-cd.packages.kadras.io/2.4.12.yml deleted file mode 100644 index a1085d6..0000000 --- a/repo/packages/argo-cd.packages.kadras.io/2.4.12.yml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: Package -metadata: - creationTimestamp: null - name: argo-cd.packages.kadras.io.2.4.12 -spec: - licenses: - - Apache 2.0 - refName: argo-cd.packages.kadras.io - releaseNotes: https://github.com/argoproj/argo-cd/releases - releasedAt: "2022-09-24T17:52:23Z" - template: - spec: - deploy: - - kapp: {} - fetch: - - imgpkgBundle: - image: ghcr.io/arktonix/package-for-argo-cd@sha256:d9aefd2d161c82ac0b6efc0e6bf3abce78c9be31aeca07d12787c5f6b8ded948 - template: - - ytt: - paths: - - config - - kbld: - paths: - - '-' - - .imgpkg/images.yml - valuesSchema: - openAPIv3: - additionalProperties: false - properties: - namespace: - default: argocd - description: The namespace where to install Argo CD - type: string - service: - additionalProperties: false - description: Service configuration for the Argo CD Server - properties: - type: - default: ClusterIP - description: The Service type for the Argo CD Server - type: string - type: object - type: object - version: 2.4.12 diff --git a/repo/packages/argo-cd.packages.kadras.io/metadata.yml b/repo/packages/argo-cd.packages.kadras.io/metadata.yml deleted file mode 100644 index b82afe1..0000000 --- a/repo/packages/argo-cd.packages.kadras.io/metadata.yml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: PackageMetadata -metadata: - creationTimestamp: null - name: argo-cd.packages.kadras.io -spec: - categories: - - ci/cd - - gitops - displayName: argo-cd - longDescription: Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. - maintainers: - - name: Thomas Vitale - providerName: Arktonix - shortDescription: Argo CD is a declarative, GitOps continuous delivery tool for - Kubernetes. diff --git a/repo/packages/cartographer.packages.kadras.io/0.5.3.yml b/repo/packages/cartographer.packages.kadras.io/0.5.3.yml deleted file mode 100644 index 1fdeac4..0000000 --- a/repo/packages/cartographer.packages.kadras.io/0.5.3.yml +++ /dev/null @@ -1,131 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: Package -metadata: - name: cartographer.packages.kadras.io.0.5.3 -spec: - refName: cartographer.packages.kadras.io - version: 0.5.3 - releaseNotes: https://github.com/vmware-tanzu/package-for-cartographer/releases/tag/0.5.3 - releasedAt: "2022-08-31T18:12:55Z" - valuesSchema: - openAPIv3: - title: cartographer.packages.kadras.io.0.5.3 values schema - properties: - ca_cert_data: - type: string - description: 'Optional: PEM Encoded certificate data for image registries with private CA.' - default: "" - excluded_components: - type: array - items: - type: string - default: [] - description: 'Optional: List of components to exclude from installation (e.g. [conventions])' - aws_iam_role_arn: - type: string - description: 'Optional: Arn role that has access to pull images from ECR container registry' - default: "" - cartographer: - type: object - properties: - resources: - type: object - properties: - limits: - type: object - properties: - cpu: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Optional: maximum amount of cpu resources to allow the controller to use' - default: 1000m - memory: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Optional: maxium amount of memory to allow the controller to use' - default: 128Mi - requests: - type: object - properties: - cpu: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Optional: minimum amount of cpu to reserve' - default: 250m - memory: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Optional: minimum amount of memory to reserve' - default: 128Mi - conventions: - type: object - properties: - resources: - type: object - properties: - limits: - type: object - properties: - cpu: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Optional: maximum amount of cpu resources to allow the controller to use' - default: 1000m - memory: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Optional: maxium amount of memory to allow the controller to use' - default: 128Mi - requests: - type: object - properties: - cpu: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Optional: minimum amount of cpu to reserve' - default: 250m - memory: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Optional: minimum amount of memory to reserve' - default: 128Mi - template: - spec: - fetch: - - imgpkgBundle: - image: index.docker.io/projectcartographer/package-for-cartographer@sha256:16bde5272cfa248ec5068016fc0a1873e84761e5485b0b23e908b7bbeff8cd0a - template: - - ytt: - ignoreUnknownComments: true - paths: - - config - - kbld: - paths: - - .imgpkg/images.yml - - '-' - deploy: - - kapp: {} diff --git a/repo/packages/cartographer.packages.kadras.io/metadata.yml b/repo/packages/cartographer.packages.kadras.io/metadata.yml deleted file mode 100644 index a23e5e6..0000000 --- a/repo/packages/cartographer.packages.kadras.io/metadata.yml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: PackageMetadata -metadata: - name: cartographer.packages.kadras.io - annotations: - kapp.k14s.io/change-group: carto.run/meta -spec: - displayName: Cartographer - providerName: VMware - shortDescription: Kubernetes native Supply Chain Choreographer. - supportDescription: https://github.com/vmware-tanzu/cartographer - longDescription: |- - Cartographer is a Kubernetes native Choreographer. It allows users to - configure K8s resources into re-usable Supply Chains that can be used to - define all of the stages that an Application Workload must go through to - get to an environment. Requires cert-manager to be installed. - maintainers: - - name: VMware diff --git a/repo/packages/cert-manager.packages.kadras.io/1.18.2.yml b/repo/packages/cert-manager.packages.kadras.io/1.18.2.yml new file mode 100644 index 0000000..5cce3c3 --- /dev/null +++ b/repo/packages/cert-manager.packages.kadras.io/1.18.2.yml @@ -0,0 +1,231 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: cert-manager.packages.kadras.io.1.18.2 +spec: + licenses: + - Apache 2.0 + refName: cert-manager.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-cert-manager/releases + releasedAt: "2025-08-14T17:36:11Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-cert-manager@sha256:84afdbe2e4b2d84ef5f9774b4608ffb100029c7e0a97bc0568aec9401c8c652b + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + cainjector: + additionalProperties: false + description: Settings for the cainjector controller. + properties: + loglevel: + default: 2 + description: Number of the log level verbosity. + maximum: 5 + minimum: 1 + type: integer + replicas: + default: 1 + description: The number of replicas. In order to enable high availability, + 2 replicas are recommended. + minimum: 1 + type: integer + type: object + controller: + additionalProperties: false + description: Settings for the cert-manager controller. + properties: + dns01: + additionalProperties: false + description: Configures the behaviour of the ACME DNS01 challenge solver. + properties: + recursive_nameservers: + default: [] + description: Each nameserver can be either the IP address and port + of a standard recursive DNS server, or the endpoint to an RFC + 8484 DNS over HTTPS endpoint. + items: + default: "" + type: string + type: array + recursive_nameservers_only: + default: false + description: When true, cert-manager will only ever query the configured + DNS resolvers to perform the ACME DNS01 self check. This is useful + in DNS constrained environments, where access to authoritative + nameservers is restricted. Enabling this option could cause the + DNS01 self check to take longer due to caching performed by the + recursive nameservers. + type: boolean + type: object + loglevel: + default: 2 + description: Number of the log level verbosity. + maximum: 5 + minimum: 1 + type: integer + replicas: + default: 1 + description: The number of replicas. In order to enable high availability, + 2 replicas are recommended. + minimum: 1 + type: integer + type: object + leader_election: + additionalProperties: false + description: Leader election configuration for the cert-manager and cert-manager-cainjector + Deployments. + properties: + namespace: + default: kube-system + description: 'Namespace used to perform leader election. The default + namespace needs changing in environments like GKE. More information: + https://cert-manager.io/docs/installation/compatibility.' + minLength: 1 + type: string + type: object + letsencrypt: + additionalProperties: false + description: Settings for Let's Encrypt. + properties: + challenge: + additionalProperties: false + properties: + dns_provider: + default: digital_ocean + description: 'The DNS provider to use for the ACME dns01 challenge. + Valid options: `cloudflare`, `digital_ocean`.' + enum: + - cloudflare + - digital_ocean + type: string + secret: + additionalProperties: false + properties: + key: + default: "" + description: The key within the Secret that contains the credentials + needed for the dns01 challenge. + type: string + name: + default: "" + description: Name of the Secret containing the credentials needed + for the dns01 challenge. + type: string + namespace: + default: kadras-system + description: Namespace containing the Secret with the credentials + needed for the dns01 challenge. + type: string + type: object + type: + default: http01 + description: 'The type of challenge used by the ACME CA Server. + Valid options: `http01`, `dns01`.' + enum: + - http01 + - dns01 + type: string + type: object + email: + default: "" + description: The email address that Let's Encrypt will use to send info + on expiring certificates or other issues. + type: string + include: + default: false + description: Whether to include a ClusterIssuer for Let's Encrypt. + type: boolean + production: + default: false + description: Whether to use Let's Encrypt staging (recommended for non-production + environments) or production. + type: boolean + type: object + namespace: + default: cert-manager + description: The namespace in which to deploy cert-manager. + minLength: 1 + type: string + policies: + additionalProperties: false + description: Settings for the Kyverno policies. + properties: + include: + default: false + description: Whether to include the out-of-the-box Kyverno policies + to validate and secure the package installation. + type: boolean + type: object + private_pki: + additionalProperties: false + description: Settings for the built-in, private PKI + properties: + include: + default: true + description: Whether to include a ClusterIssuer for a private PKI. + type: boolean + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use the proxy. + type: string + type: object + webhook: + additionalProperties: false + description: Settings for the cert-manager webhook. + properties: + host_network: + default: false + description: 'Whether to run the webhook in the host network so that + it can be reached by the cert-manager controller in environments like + AWS EKS. More information: https://cert-manager.io/docs/installation/compatibility.' + type: boolean + loglevel: + default: 2 + description: Number of the log level verbosity. + maximum: 5 + minimum: 1 + type: integer + replicas: + default: 1 + description: The number of replicas. In order to enable high availability, + at least 3 replicas are recommended. + minimum: 1 + type: integer + secure_port: + default: 6443 + description: 'The port where the webhook is exposed. The default port + needs changing in environments like AWS EKS and AWS Fargate. More + information: https://cert-manager.io/docs/installation/compatibility.' + type: integer + type: object + type: object + version: 1.18.2 diff --git a/repo/packages/cert-manager.packages.kadras.io/1.9.1.yml b/repo/packages/cert-manager.packages.kadras.io/1.9.1.yml deleted file mode 100644 index 6714daf..0000000 --- a/repo/packages/cert-manager.packages.kadras.io/1.9.1.yml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: Package -metadata: - name: cert-manager.packages.kadras.io.1.9.1 -spec: - refName: cert-manager.packages.kadras.io - version: 1.9.1 - releasedAt: 2022-08-16T15:24:00Z - releaseNotes: "cert-manager 1.9.1 https://github.com/jetstack/cert-manager/releases/tag/v1.9.1" - licenses: - - "Apache 2.0" - template: - spec: - fetch: - - imgpkgBundle: - image: projects.registry.vmware.com/tce/cert-manager@sha256:e321a8936343a3eb05676aa2cf5ba7b5a07a8867e94cab75bff68800fa6b0459 - template: - - ytt: - paths: - - config/ - - kbld: - paths: - - "-" - - .imgpkg/images.yml - deploy: - - kapp: {} - capacityRequirementsDescription: "Varies significantly based on number of Certificate objects" - valuesSchema: - openAPIv3: - title: cert-manager.packages.kadras.io.1.9.1 values schema - examples: - - namespace: cert-manager - properties: - namespace: - type: string - description: The namespace in which to deploy cert-manager. - default: cert-manager diff --git a/repo/packages/cert-manager.packages.kadras.io/metadata.yml b/repo/packages/cert-manager.packages.kadras.io/metadata.yml index d4902bb..ea7c04c 100644 --- a/repo/packages/cert-manager.packages.kadras.io/metadata.yml +++ b/repo/packages/cert-manager.packages.kadras.io/metadata.yml @@ -1,16 +1,23 @@ apiVersion: data.packaging.carvel.dev/v1alpha1 kind: PackageMetadata metadata: + creationTimestamp: null name: cert-manager.packages.kadras.io spec: - displayName: "cert-manager" - longDescription: "Provides certificate management provisioning within the cluster" - shortDescription: "Certificate management" - providerName: VMware - maintainers: - - name: Nicholas Seemiller categories: - - "security" - - "tls" - - "certificate" - supportDescription: "Go to https://cert-manager.io/ for documentation or the #cert-manager channel on Kubernetes slack" + - certificate-management + - security + - tls + displayName: cert-manager + iconSVGBase64: <svg id="svg3881" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 792 792"><defs><style>.cls-1,.cls-2{fill:none;}.cls-2{clip-path:url(#clip-path);}.cls-3{clip-path:url(#clip-path-2);}.cls-4{fill:#fff;}.cls-5{fill:#326ce5;}.cls-6{mask:url(#mask);}.cls-7{fill:#fdfdfe;}</style><clipPath id="clip-path"><polygon class="cls-1" points="-512.547 -72.522 -511.547 -72.522 -512.547 -71.522 -512.547 -72.522"/></clipPath><clipPath id="clip-path-2"><polygon class="cls-2" points="-514.547 -74.522 -515.547 -74.522 -514.547 -75.522 -514.547 -74.522"/></clipPath><mask id="mask" x="95.45997" y="220.56415" width="1145.07974" height="588.06611" maskUnits="userSpaceOnUse"><g id="mask-2" data-name="mask"><g id="g3823"><path id="path3819" d="M946.5066,220.56415c-162.388,0-294.033,131.64507-294.033,294.03307s131.645,294.03305,294.03305,294.03305,294.03311-131.66566,294.03311-294.033S1108.89464,220.56415,946.5066,220.56415Zm-.0722,562.49c-148.31081,0-268.35373-120.10486-268.3847-268.41564S798.41233,245.8825,946.816,246.15063s268.28159,120.39361,268.1372,268.65286S1094.72463,783.09541,946.4344,783.05412Z"/></g></g></mask></defs><g id="Text"><g class="cls-3"><g id="g3878"><g id="Text_and_detail" data-name="Text and detail"><path id="Circle" class="cls-4" d="M382.15266,82.87846c-172.4,0-312.16,139.76-312.16,312.16,0,172.4,139.76,312.16,312.16,312.16s312.16-139.72,312.16-312.16-139.76-312.16-312.16-312.16Zm-.08,597.15994c-157.44,0-284.89-127.51-284.92-284.95,0-157.61,127.78-285.3,285.33-285,157.55005.3,284.80994,127.8,284.67005,285.22C667.01258,552.7284,539.51258,680.08839,382.07264,680.0384Z"/><g id="LETTERS"><path id="path3851" class="cls-4" d="M238.15266,536.47846c-1-3.45-5.75-6.88-9.44-6.42-5.24.67-10.46,1.54-16.76,2.48,2.32-6.15,4.28-11.4,6.28-16.65,1.73-4.56-2-6.77-4.34-9.21s-4.17.64-5.76,1.9c-8.47,6.71-16.68,13.75-25.23,20.35-4.06,3.13-1,4.95.64,7.2s3.31,4.78,6.66,1.83c3.86-3.39,7.94-6.54,12-9.83.15.38.29.56.25.68-.8,2.32-1.67,4.62-2.45,6.95-1.63,4.92,1.52,8.51,6.69,7.7,2.15-.34,4.34-1,6.9.1-4.16,3.41-7.77,6.61-11.63,9.46-3.17,2.34-1.65,4.25.26,6s2.71,6.31,6.8,3q13.79-11.12,27.49-22.31C237.45264,538.93842,238.66267,538.21845,238.15266,536.47846Z"/><path id="path3853" class="cls-4" d="M405.30262,200.08845c6.54,2.7,9.13,1.46,10.48-5.3.3-1.47.57-2.93.93-4.38.29-1.18,0-3.17,1.81-2.92s4.13-.12,4.79,2.58,1.48,5.09,2.22,7.63c2.08,7,3.51,8.09,10.64,8.46,2.68.14,3.28-.77,2.57-3.16-1.12-3.81-2.09-7.67-3.28-11.46-.55-1.73-1-2.75,1.37-3.74,5.78-2.44,7.34-7.68,7.75-13.07,0-6.66-4-11.53-11.48-13.53-6.08-1.62-12.32-2.63-18.48-4-2.3-.5-3.45.43-3.88,2.63-2.36,12-4.76,24.08-7.09,36.14-.31,1.63-.54,3.22,1.65,4.12Zm17.54-31c5.05-.51,9.92,2.41,9.87,5.4s-1.8,4.44-5.19,4.53c-2.09-1.76-6.94,1.1-7.65-3.37-.3-1.89-1-6.11,2.97-6.52Z"/><path id="path3855" class="cls-4" d="M339.45264,591.29847c-2.84-.93-5.74-2.1-6.74,2.62-1.09,5.19-2.75,10.25-4.47,16.5-2.63-7.82-5.07-14.52-7.1-21.34-1.33-4.46-5.15-4.42-8.37-5-3.55-.58-2.91,3-3.47,5-3,10.36-5.58,20.86-8.8,31.16-1.58,5.08,2.17,4.62,4.67,5.49,2.66.91,5.47,2,6.48-2.4,1.21-5.27,2.82-10.45,4.45-16.34.67,1.54,1.13,2.42,1.44,3.34,2,6,4.09,11.93,6,17.94,1.37,4.44,5.37,4.17,8.56,4.61s2.53-3,3.06-4.81c3-10.38,5.53-20.89,8.8-31.17,1.49-4.98-1.96-4.76-4.51-5.6Z"/><path id="path3857" class="cls-4" d="M580.31263,528.04847c-3.28-.47-6.51-1.44-9.80005-1.75-2.71-.25-3.39-1.19-3.48-4-.22-7-6.55005-12.74-13.43994-12.82-4.73-.13-8.35,2.24-11.25,5.56-3.61,4.13-6.71,8.7-10.33,12.82-2.46,2.81-2.15,4.55.78,6.76,8.76,6.62,17.44995,13.35,25.93994,20.3,3,2.4,4.51,2.15,6.72-.86,4-5.45,4.16-5.32-1.23-9.5-1.18005-.92-2.42-1.78-3.5-2.81-.83-.79-2.89-1.11-1.73-2.91.93994-1.45,1.75-3.35,4.16-2.86s5,.56,7.32995,1.41c5.37,2,8.71-.09,11.63-4.54,1.93005-2.89,2.03-4.26-1.8-4.8Zm-30,5.43c-.75.06-6.13-4.56-6.08-5.23.13-1.76,6.28-7.65,8-7.65,2.31006.46,4,1.61,4.18994,4.15C556.5326,526.29847,551.45264,533.37849,550.31263,533.47846Z"/><path id="path3859" class="cls-4" d="M331.71265,201.07847c.35,2,1,3.6,3.49,3.21,9-1.56,18.06-2.91,27-4.77,4.72-1,1.47-4.56,1.52-7,.05-2.61-1.37-3.4-3.93-2.9-4.89.95-9.85,1.6-14.74,2.57-2.54.5-3.21-.66-3.45-2.83-.21-1.93-.49-3.43,2.3-3.74,4.13-.44,8.17-1.61,12.3-2.05,4.47-.48,3.65-3.29,3.17-6.13s-1.08-5.17-5-4.09c-3.67,1-7.56,1.16-11.26,2.09-2.6.66-3.87.5-4.41-2.54-.59-3.28,1.23-3.55,3.55-3.9,4.11-.61,8.2-1.4,12.31-2,2.63-.4,4.65-1.13,3.59-4.44-.85-2.66.36-6.86-5.13-5.72-7.81,1.63-15.68,3-23.58,4-3.78.48-4.3,2.17-3.74,5.31q3.045,17.505,6.01,34.93Z"/><path id="path3861" class="cls-4" d="M465.13264,596.01844a88.49049,88.49049,0,0,1-8.92,3.07c-2.51.8-4.32,1.82-2.82,5,1.19,2.46.87,6.55,5.62,4.65.87-.35,1.8-1.17,2.65-.11.85,1.06.29,2.32-.13,3.32-1.22,2.87-3.78,4.1-6.65,4.6a6.21878,6.21878,0,0,1-6.67-3.37,32.7898,32.7898,0,0,1-4-11.2c-.93-5.83,4.62-10.93,9.91-8.38,4.36,2.1,7.64.42,11.34-.66,2.53-.74,2.54-2.25,1.08-4.09-3.38-4.26-8-5.61-13.24-5.83a22.67985,22.67985,0,0,0-15,5.6c-5,4.48-7,10.16-5,16.65,2.53,8.49,4,18,14.56,20.8,8.1,2.13,15.24-.38,21-6.12,6.23-6.24,4.72-13.51,2-20.92-1.19-3.16-2.35-4.5-5.73-3.01Z"/><path id="path3863" class="cls-4" d="M527.1526,577.12849c-3.66,2.86-7.64,5.31-11.31006,8.17-2,1.56-3,1.07-4.29-.81-1.29-1.88-1.69-3,.46-4.41,3.32995-2.19,6.52-4.59,9.76-6.91,1.06006-.76,2.34-1.38,2.22-3.22a13.53972,13.53972,0,0,0-4.18994-5.8c-1.86-1.31-3.30005.69-4.75,1.69-3,2.08-6.14,4-8.94,6.34-2.33,1.94-3,.17-4.15-1.21-1.38-1.61-1.4-2.61.53-3.87,3.75-2.45,7.22-5.33,10.99994-7.71,3.1-1.94,2.43994-3.82.62-6.06-1.61-2-2.59-5-6.15-2.3-6.52,4.86-13.22,9.49-19.89,14.17-2.1,1.47-2.19,2.93-.72,5,6.9,9.57,13.71,19.2,20.54,28.83,1.24,1.74,2.45,2.43,4.49994.94q10.26-7.5,20.68994-14.75c3.27-2.27,1.29-4.16-.11-6.21-1.4-2.05-2.73-4.31-5.82-1.88Z"/><path id="path3865" class="cls-4" d="M268.85267,560.89845c-1.4-1-2.88-.53-4.14.45q-15.18007,11.8-30.33,23.64c-1.33,1-2.32,2.47-.4,3.54,3.54,2,6.78,7,11.49,1.72a1.59,1.59,0,0,1,2.18-.47c3.76,2.46,7.55,4.87,11.3,7.33,1,.68.67,1.74.55,2.72-.53,4.29,2.44,9.12,6.71,9.35,4.46.23,2.36-4.48,3.76-6.69a3.001,3.001,0,0,0,.34-.94c2.6-10.65,5.2-21.31,8-32.85-1.12-4.32-6.07-5.22-9.46-7.8Zm-6.4,26.72c-7.81-4.59-7.81-4.59-1.47-9.65,1.28-1,2.6-2,4.48-3.44A56.33068,56.33068,0,0,1,262.45264,587.61842Z"/><path id="path3867" class="cls-4" d="M255.94263,223.82847c5,6.94,12.68,9,20.82,6,8.46-3.06,15-11.32,14.66-18.87a20.55043,20.55043,0,0,0-1.24-5.29,2.11,2.11,0,0,0-2.13-1.73c-2.9,0-8.23,5.19-8.27,8.3-.05,4.19-2.73,6.29-6.08,7.63-3.17,1.26-6,0-7.87-2.63a73.14334,73.14334,0,0,1-5.94-9.75c-1.4-2.87-1.14-6,1.47-8.23s5.84-3.74,9.55-1.71c2.6,1.43,9.61-1,11.1-3.53,1-1.62-.28-2.53-1.09-3.43a13.88,13.88,0,0,0-10.8-4.68c-13.38.05-23.81,10.35-22.4,21.61.8,6.34,4.73,11.34,8.22,16.31Z"/><path id="path3869" class="cls-4" d="M398.01264,603.60847c-3.39-8.82-5.72-10-14.79-8a3.8801,3.8801,0,0,0-3.27,2.63q-5.7,18.24-11.36,36.54c-.33,1.07-.81,2.33.47,3.17,2.73,1.8,9.9-.72,11.13-3.89.51-1.32.52-2.93,2.71-2.89,4,.08,8,0,12-.19,1.42-.06,2.3.48,2.55,1.76.77,4,3.17,5.18,6.48,4.32,6.77-.17,6.8-.19,4.58-6q-5.24-13.7601-10.5-27.45Zm-10.56,18.07c-3,0-3.44-.84-2.54-3.39,1.09-3.12,2-6.3,3.27-10.36,1.33,3.4,2.31,5.85,3.24,8.31,2.08,5.57,2.03,5.38-3.97,5.44Z"/><path id="path3871" class="cls-4" d="M485.89265,229.15846c2.34,1.28,4.57,4.69,7.27.18,3.57-6,7.44-11.79,11.16-17.68,4.48-7.08,4.6-7.29,11.80005-2.76,3.82995,2.42,4.84-.19,6.44995-2.52,1.72-2.5,2.4-4.41-1-6.41q-12-7.15-23.55-14.92c-3.27-2.18-4.89-1.6-7,1.64-2.34,3.57-1.86,5.47,1.76,7.39,2.1,1.11,4.45,2.13,5.9,4.21-.74,1.19-1.34,2.19-2,3.17-4.53,7.16-8.93,14.4-13.62,21.45-2.52,3.88.39,4.91,2.83,6.25Z"/></g><g id="New_Anchor" data-name="New Anchor"><path id="path3874" class="cls-4" d="M495.34266,446.89845c-2.57-10.54-5.11-20.92-7.68-31.42a3.2,3.2,0,0,0-5.33-1.56l-24.72,23.66a3.06,3.06,0,0,0,1.26,5.14c.92.26,1.82.51,2.74.7,2,.43,1.8,1.1.87,2.51a65.58921,65.58921,0,0,1-20,19.58l-.2.12a86.78041,86.78041,0,0,1-21.7,7,159.35362,159.35362,0,0,1-23.53,2.72,1.84,1.84,0,0,1-1.89929-1.77875q-.00147-.0456-.00073-.09125v-110.38a1.08,1.08,0,0,1,1.08-1.08h0c1,0,2.22.2,5.15.17,5.76-.06,11.76-.06,17.54-.4,1.88-.11,2.93-.05,4.13.85a12.35,12.35,0,0,0,16.71-1.29,12.52,12.52,0,0,0,.11-16.76,12.3,12.3,0,0,0-16.66-1.58,4.07008,4.07008,0,0,1-2.53,1.08q-12.0801-.06-24.14,0a1.90009,1.90009,0,0,1-1.39-.37v-12.62a1.79987,1.79987,0,0,1,.42-1.18,6.41962,6.41962,0,0,1,2-1.41c13-6.6,19.74-17.44,19.75-31.87,0-22.83-22.27-39.44-44.29-33.46-17.46,4.74-28.8,22.08-25.51,39.77,2.42,13,10.07,22.1,22.51,26.92a6.58893,6.58893,0,0,1,1.33.66,1.8,1.8,0,0,1,.71,1.47v10.32a1.78,1.78,0,0,1-1.77991,1.78012l-.02008-.00012c-8.65-.1-17.31-.06-26,0a5.53,5.53,0,0,1-3.31-1.12,12.24,12.24,0,0,0-16.62,1.7,12.37,12.37,0,0,0,16.73,18.07,5.08,5.08,0,0,1,3.3-1.08c8.39,0,16.79.12,25.18,0a3.19,3.19,0,0,1,2.17.46,1,1,0,0,1,.31.76v109.81a1.85,1.85,0,0,1-1.85388,1.84613q-.07315-.0002-.14612-.00611a192.44321,192.44321,0,0,1-30.22-5,92.78849,92.78849,0,0,1-17.68-6.21,1.5603,1.5603,0,0,1-.28-.16,66.87033,66.87033,0,0,1-19.54-21.38,1.38,1.38,0,0,1,1-2.16l2.65-.54a3.08,3.08,0,0,0,1.6-5.08l-23.26-25.35a3,3,0,0,0-5.13,1.14c-3.44,10.89-6.79,21.53-10.19,32.32a3.35,3.35,0,0,0,3.94,4.28l1.8-.41a5.12,5.12,0,0,1,5.69,2.64c13.38,26,33.5,44.81,60.12,56.7,10.4,4.65,14.52,6,23.5,7.37a1.77963,1.77963,0,0,1,1,.51l13.67,13.55a4.91,4.91,0,0,0,6.85,0l13.28-13a1.88009,1.88009,0,0,1,1.12-.52c13.3-1.25,19.23-4.54,33.54-11.09,22.15-10.13,39.74-27.76,51.06-49.32,1-1.92,1.88-2.15,3.58-1.58.65.22,1.31.43,2,.63a4.12,4.12,0,0,0,5.21-4.98Zm-114.1-131.83a17.72,17.72,0,0,1-17.0863-18.33182q.00284-.07909.00629-.15817c.48-10.46,9.18-18.18,19-17.43,10.34.8,17.46,9.11,16.94,18.69-.56,10.42-9.1,17.96-18.86,17.23Z"/></g></g></g></g></g><g id="Background_wavy_outline" data-name="Background wavy outline"><g id="path3838"><path class="cls-5" d="M777.74751,396.3365c0,39.89055-24.43136,75.42907-36.09539,111.38006-12.10741,37.302-13.65436,80.32774-36.25011,111.38007-22.82261,31.36171-63.41444,46.02679-94.77621,68.84939-31.05234,22.59569-57.42267,56.80386-94.71428,68.92159-35.99228,11.68462-77.27507-.11342-117.1553-.11342s-81.16308,11.798-117.145.11342c-37.302-12.11773-63.67226-46.32584-94.7246-68.92159-31.36171-22.8226-71.9536-37.48761-94.77621-68.84939-22.59569-31.042-24.14263-74.06775-36.25011-111.38007C44.17571,471.72428,19.76493,436.18582,19.76493,396.3365s24.43142-75.42907,36.09539-111.38007c12.10741-37.302,13.65436-80.32773,36.25011-111.38007,22.82261-31.35142,63.41444-46.02678,94.77621-68.83907,31.05234-22.59572,57.42261-56.81414,94.7246-68.92157,35.982-11.6846,77.26475.10313,117.145.10313s81.16308-11.78773,117.145-.10313c37.30206,12.10743,63.67226,46.32585,94.7246,68.92157,31.36177,22.81229,71.9536,37.48765,94.77621,68.83907,22.59575,31.05234,24.1427,74.07808,36.25011,111.38007C753.31615,320.90743,777.74751,356.45626,777.74751,396.3365Z"/></g></g><g id="Waves"><g class="cls-6"><g id="g3847"><g id="path3841"><path class="cls-4" d="M708.0293,377.02659c-22.21484,0-33.49121-5.31543-44.39746-10.45606-11.09472-5.22949-21.57519-10.16943-43.11816-10.16943-21.54492,0-32.02637,4.94043-43.124,10.17041-10.90625,5.14014-22.1836,10.45508-44.39161,10.45508-22.209,0-33.48339-5.31494-44.38671-10.45508-11.09473-5.23047-21.5752-10.17041-43.11915-10.17041-21.543,0-32.0205,4.93994-43.11328,10.16943-10.90332,5.14063-22.17773,10.45606-44.39209,10.45606-22.21484,0-33.48925-5.31543-44.39257-10.45606C302.50147,361.341,292.02442,356.4011,270.481,356.4011c-21.54443,0-32.02636,4.94043-43.124,10.17041-10.90625,5.14014-22.1831,10.45508-44.3916,10.45508s-33.48291-5.31494-44.38672-10.45508C127.48389,361.341,117.0044,356.4011,95.46,356.4011v-3c22.21582,0,33.49267,5.31592,44.398,10.457,11.09326,5.229,21.5708,10.16846,43.10742,10.16846s32.01709-4.93945,43.1123-10.16846c10.90821-5.14111,22.1875-10.457,44.40332-10.457,22.21485,0,33.48926,5.31543,44.39258,10.45606,11.09278,5.22949,21.56983,10.16943,43.11328,10.16943,21.54248,0,32.02-4.93994,43.1128-10.16943,10.90332-5.14063,22.17773-10.45606,44.39257-10.45606,22.21582,0,33.49219,5.31592,44.39844,10.457,11.09278,5.229,21.57031,10.16846,43.10742,10.16846,21.53614,0,32.01661-4.93945,43.11231-10.16846,10.9082-5.14111,22.1875-10.457,44.40332-10.457,22.21484,0,33.49121,5.31543,44.39746,10.45606,11.09473,5.22949,21.5752,10.16943,43.11816,10.16943Z"/></g><g id="path3843"><path class="cls-4" d="M708.0293,419.27854c-22.43847,0-33.81836-5.36426-44.82421-10.55176-10.99024-5.18066-21.37208-10.07421-42.69141-10.07421-21.32031,0-31.7041,4.89355-42.69824,10.07519-11.00489,5.1875-22.38575,10.55078-44.81739,10.55078-22.43261,0-33.81054-5.36328-44.81347-10.55078-10.99121-5.18164-21.37207-10.07519-42.69239-10.07519-21.31933,0-31.69824,4.89355-42.68652,10.07421-11.00293,5.1875-22.38037,10.55176-44.81885,10.55176-22.439,0-33.8164-5.36426-44.81884-10.55176-10.98877-5.18066-21.36768-10.07421-42.687-10.07421-21.3208,0-31.7041,4.89355-42.69775,10.07519-11.00537,5.1875-22.38574,10.55078-44.81787,10.55078s-33.81006-5.36328-44.813-10.55078c-10.99072-5.18164-21.37207-10.07519-42.69238-10.07519v-5c22.43994,0,33.81933,5.36474,44.82471,10.55273,10.98876,5.17969,21.36767,10.07324,42.68066,10.07324s31.69482-4.89355,42.686-10.07324c11.00782-5.188,22.38965-10.55273,44.82959-10.55273,22.439,0,33.81641,5.36425,44.81885,10.55175,10.98877,5.18067,21.36768,10.07422,42.687,10.07422,21.31885,0,31.69776-4.89355,42.686-10.07422,11.00293-5.1875,22.38086-10.55175,44.81933-10.55175,22.43946,0,33.81934,5.36474,44.82422,10.55273,10.98926,5.17969,21.36817,10.07324,42.68164,10.07324,21.3125,0,31.69434-4.89355,42.68555-10.07324,11.00781-5.188,22.39063-10.55273,44.83008-10.55273,22.43848,0,33.81836,5.36425,44.82422,10.55175,10.99023,5.18067,21.37207,10.07422,42.6914,10.07422Z"/></g><g id="path3845"><path class="cls-4" d="M708.0293,469.78049c-22.66211,0-34.1455-5.4121-45.25-10.64648-10.88671-5.13184-21.16992-9.97852-42.26562-9.97852-21.09668,0-31.38184,4.84766-42.27149,9.9795-11.10546,5.2334-22.58886,10.6455-45.24414,10.6455-22.65625,0-34.13671-5.4121-45.24023-10.6455-10.88574-5.13184-21.16895-9.9795-42.26563-9.9795-21.0957,0-31.376,4.84668-42.26074,9.97852-11.10156,5.23438-22.58252,10.64648-45.24463,10.64648-22.66308,0-34.14306-5.4121-45.2456-10.64648-10.88428-5.13184-21.16455-9.97852-42.26026-9.97852-21.09668,0-31.38232,4.84766-42.27148,9.9795-11.105,5.2334-22.58838,10.6455-45.24414,10.6455-22.65625,0-34.13672-5.4121-45.23926-10.6455-10.88672-5.13184-21.16943-9.9795-42.26611-9.9795v-7c22.66406,0,34.14648,5.41309,45.251,10.64747,10.88428,5.13086,21.16553,9.97753,42.2544,9.97753s31.37256-4.84667,42.25976-9.97753c11.10694-5.23438,22.59229-10.64747,45.25586-10.64747,22.6626,0,34.14307,5.41211,45.24561,10.64649,10.88428,5.13184,21.165,9.97851,42.26025,9.97851,21.09473,0,31.37549-4.84667,42.26026-9.97851,11.10156-5.23438,22.582-10.64649,45.24511-10.64649,22.66407,0,34.14649,5.41309,45.251,10.64747,10.88477,5.13086,21.166,9.97753,42.25488,9.97753s31.37207-4.84667,42.25977-9.97753c11.10742-5.23438,22.5918-10.64747,45.25586-10.64747,22.66211,0,34.14551,5.41211,45.25,10.64649,10.88672,5.13184,21.16992,9.97851,42.26562,9.97851Z"/></g></g></g></g><g id="wQjLs5.tif"><path class="cls-7" d="M69.97291,396.08172C70.6446,213.94918,216.27906,70.56717,392.5182,67.52905c187.22819-3.22757,332.834,146.93812,334.99608,324.238,2.25017,184.52244-146.15893,333.33921-328.41178,333.43561C217.223,725.29886,70.2973,578.46061,69.97291,396.08172Zm628.85858.10588c.087-165.02914-132.68641-298.09593-296.30859-300.02194C233.12872,94.17171,98.45934,230.62774,98.67461,396.5698A299.75958,299.75958,0,0,0,398.88386,696.55966C565.4402,696.503,699.11342,561.48738,698.83149,396.1876Z"/><path class="cls-7" d="M412.51678,420.83544q0,27.77351.00011,55.547c.00009,4.51579.04789,4.50986,4.53561,4.31713a165.17329,165.17329,0,0,0,29.487-4.2981c16.03543-3.6372,27.73135-13.19016,36.84-26.41364.899-1.30519.94647-2.17583-.9482-2.72638-6.37557-1.85276-6.77481-3.54612-1.95345-8.21029q11.4316-11.05884,22.96284-22.01472c2.981-2.84862,5.68513-2.20684,6.67288,1.725q4.00776,15.95289,7.797,31.9604c.87882,3.70353-1.83845,6.25218-5.57439,5.41785a12.16786,12.16786,0,0,1-1.8267-.5459c-1.85224-.73389-2.9823.0209-3.87188,1.64981a133.82736,133.82736,0,0,1-12.57828,19.3174c-9.49524,11.939-20.73307,21.86926-34.218,29.00371-10.1126,5.35023-20.3709,10.5033-31.53,13.4623a36.55951,36.55951,0,0,1-8.19914,1.445c-2.50462.078-4.26165,1.35775-5.94075,3.03594-3.77927,3.77713-7.6287,7.48452-11.47795,11.1908q-3.95936,3.81219-7.93154-.05583-6.42373-6.26729-12.77642-12.607a6.788,6.788,0,0,0-3.68046-1.99465c-20.80362-4.064-38.77235-13.92633-54.96386-27.25025A122.72966,122.72966,0,0,1,292.256,453.82869c-1.79252-3.467-3.72457-4.3321-7.62975-3.56234-3.879.76461-5.91529-1.38023-4.74629-5.14457q5.10108-16.42556,10.32191-32.81382c.95065-2.98756,3.80347-3.611,5.93528-1.29452q11.97693,13.01463,23.87712,26.09993c2.15078,2.35765.90718,5.38157-1.94892,5.68573a16.07623,16.07623,0,0,0-1.85514.45367c-1.88247.43418-2.03016,1.41677-1.09155,2.96479a68.14571,68.14571,0,0,0,19.78648,21.43968c4.39344,2.99136,9.66647,4.45113,14.79768,5.88678a203.78489,203.78489,0,0,0,35.2242,6.41915c2.46668.24052,3.24724-.43626,3.26142-3.12583.03152-5.9855.01018-11.97126.01018-17.95693q.00008-46.92759-.00024-93.85519c-.00006-3.59733-.23705-3.85153-3.72235-3.85454-7.89721-.00678-15.795.04724-23.69137-.03172a12.42517,12.42517,0,0,0-6.52984,1.87989c-5.47079,3.15842-10.90349,2.513-15.6066-1.70228-3.95359-3.5436-5.09-9.6431-2.788-14.96355,2.95926-6.83927,12.14641-9.64767,18.41925-5.58938a11.37135,11.37135,0,0,0,6.50616,1.94147c7.97857-.07857,15.9584-.0228,23.93772-.03314,3.03683-.00395,3.46463-.44242,3.47361-3.45626.00783-2.63366-.11638-5.27441.03978-7.8988.12007-2.01719-.74443-3.00685-2.51544-3.76524-7.2923-3.12258-13.76888-7.34228-18.01393-14.3021-14.78963-24.2479-.19341-51.56636,24.04645-56.40073a37.12876,37.12876,0,0,1,40.17752,19.57806c8.14333,16.34855,4.16244,38.98029-15.70441,49.09212-2.784,1.417-4.08927,3.094-3.77158,6.29807a72.48632,72.48632,0,0,1,.04142,8.85219c-.03473,1.4505.55743,2.016,1.96313,2.01271,8.141-.01891,16.2821-.00684,24.42315-.01286a7.33752,7.33752,0,0,0,3.91345-1.62311,12.88346,12.88346,0,0,1,16.069,1.34006,13.52581,13.52581,0,0,1,2.45849,15.85854,13.24886,13.24886,0,0,1-14.9215,6.27536,3.39939,3.39939,0,0,1-1.32441-.51711c-4.0766-3.46512-8.93825-2.76294-13.67086-2.54561a145.182,145.182,0,0,1-16.01207.15113c-2.35869-.15209-2.93316.70685-2.92357,2.962C412.55133,383.32515,412.51681,402.08037,412.51678,420.83544ZM399.01337,312.08036c9.99882.24248,18.41706-8.17787,18.66371-18.66837a18.87076,18.87076,0,0,0-37.72842-.96046C379.6315,303.69258,387.5072,311.80135,399.01337,312.08036Z"/><path class="cls-7" d="M209.05294,537.02758c-4.17115,2.65838-7.71537,6.10479-11.55114,9.18481-.62059.49828-1.23735,1.00568-1.89242,1.45567a2.72568,2.72568,0,0,1-3.36577.05443,16.46006,16.46006,0,0,1-5.19667-6.69386c-.63166-1.65422.81665-2.77233,1.98348-3.7178,5.3205-4.311,10.69275-8.5582,16.00448-12.87986q6.20452-5.04825,12.2971-10.23295c1.61614-1.38066,3.02286-1.57149,4.54943.04584.76332.80872,1.64349,1.50584,2.43847,2.28632,2.45244,2.40787,2.746,5.11525,1.46839,8.283-2.13141,5.28455-4.04769,10.65586-6.16875,16.29435,5.56028-.8,10.82407-1.50256,16.06844-2.32847a10.358,10.358,0,0,1,10.99034,5.40615c1.02021,1.92315.34677,3.28862-1.20421,4.53933q-10.689,8.61926-21.33467,17.29226c-2.40923,1.95752-4.76456,3.98257-7.20322,5.90222-2.82074,2.22031-3.90528,2.03662-6.044-.76845-.77-1.00989-1.58377-1.99084-2.43216-2.936-1.79944-2.00459-1.74822-3.5382.34-5.26187,3.49951-2.88867,7.044-5.72285,10.55594-8.59656.51045-.41766,1.48264-.74365,1.14813-1.5298-.28564-.67134-1.24914-.59206-1.947-.547-1.58713.10242-3.17194.26232-4.75214.44648-5.27235.61439-8.39667-3.10381-6.81184-8.15241.76087-2.42389,1.57437-4.83123,2.36245-7.247-.00076-.1748.00005-.34855.00086-.52237Z"/><path class="cls-7" d="M124.83943,400.61821a49.9315,49.9315,0,0,1,9.28427,3.97456c16.3791,8.31538,33.77766,10.14157,51.79721,8.71766,11.63718-.91951,22.39278-4.5979,32.75543-9.69762a100.347,100.347,0,0,1,43.64423-10.81909c16.29382-.20053,31.73817,2.65256,46.40921,9.89727,7.96874,3.935,16.1333,7.504,24.96248,9.2165a114.8072,114.8072,0,0,0,30.22024,1.46737,83.07775,83.07775,0,0,0,16.43728-2.90548c1.22182-.34116,1.48115-.01838,1.53988,1.16962.19139,3.874.26313,3.996-3.41964,4.76233-22.63978,4.71138-44.76095,3.81762-66.01766-6.24183-5.101-2.41392-10.14122-5.01893-15.41254-6.99385a75.00911,75.00911,0,0,0-18.29309-4.28871c-13.72664-1.47319-27.38561-1.2009-40.77338,2.6734-7.05613,2.042-13.66044,5.24007-20.26763,8.3644a92.68582,92.68582,0,0,1-37.55286,9.04313c-11.61992.31812-23.04916-.509-34.20041-3.9568-6.93357-2.14379-13.40275-5.41861-20.0276-8.31306a1.53835,1.53835,0,0,1-1.10171-1.61859C124.88329,403.64318,124.83943,402.21256,124.83943,400.61821Z"/><path class="cls-7" d="M464.49871,163.96918c-.26722,6.07518-2.07214,11.27242-8.09521,14.01345-1.78726.81337-2.11038,2.00136-1.5267,3.84864,1.29055,4.08452,2.42882,8.219,3.54669,12.35548.6111,2.26118-.09574,3.30506-2.41985,3.13249-6.32272-.46951-8.90036-.32759-11.10084-7.6666-.84316-2.81211-1.80267-5.59654-2.48866-8.44665-.75683-3.14426-2.67515-3.50892-5.63728-3.39682-1.00754.03815-1.16858.80485-1.33738,1.66094-.539,2.7335-1.11427,5.46345-1.79945,8.16333-.55076,2.17018-1.61989,4.11862-4.0467,4.5225a9.5177,9.5177,0,0,1-7.577-2.10089c-1.30493-1.03064-.72347-2.67881-.45677-4.05477q2.86242-14.76743,5.80084-29.52011c.55421-2.807,1.093-5.61767,1.70464-8.41227.3451-1.577,1.26465-2.65375,3.03621-2.31506,8.41807,1.60929,17.04086,2.49662,24.93126,6.12827C461.92977,154.13513,464.47337,158.614,464.49871,163.96918Zm-26.40908-1.01946c-.19034,3.27377,1.99669,5.87631,5.51242,5.414a13.424,13.424,0,0,1,3.05606.21483c2.06351.20651,3.961-.35826,4.89424-2.52671a4.12054,4.12054,0,0,0-1.13421-5.15448,10.72717,10.72717,0,0,0-7.69731-2.60856C439.55573,158.35407,438.07551,159.84025,438.08963,162.94972Z"/><path class="cls-7" d="M342.2831,622.50718c1.43768-5.3819,2.88656-10.76087,4.3093-16.14674,1.0825-4.09775,2.22059-4.75142,6.34736-3.57514.613.17474,1.22679.34657,1.84014.52,4.33612,1.226,4.85469,2.15332,3.61925,6.51-2.75869,9.7284-5.53762,19.451-8.26828,29.1872-.53629,1.91215-.89729,3.87371-1.32978,5.81458a2.28468,2.28468,0,0,1-2.68923,2.0617c-6.48549-.48133-8.094-1.4942-9.78068-7.04728-1.81851-5.9871-3.99838-11.8647-6.04163-17.78282a23.37683,23.37683,0,0,0-1.1367-2.2523c-1.38006,5.0849-2.68277,9.53173-3.78543,14.02762-1.8065,7.36561-2.48343,7.06972-8.85965,5.2735-4.04836-1.1405-4.6659-2.2012-3.48673-6.3449,3.31145-11.63688,6.93669-23.189,9.59838-35.0026a2.54662,2.54662,0,0,1,3.026-2.27568c5.63514.3088,7.7399,1.88912,9.51649,7.23565q3.29431,9.91381,6.60418,19.82249Z"/><path class="cls-7" d="M578.60084,516.9168c8.15959.2214,13.74292,5.30449,14.76189,12.90512.55708,4.15545.70132,4.23865,4.977,4.93512,3.38175.551,6.749,1.2023,10.1052,1.89421,2.36909.4884,2.74042,1.321,1.63632,3.48821-2.52315,4.9526-6.37615,8.55329-13.14462,6.19284a43.08717,43.08717,0,0,0-7.00433-1.47141,4.60683,4.60683,0,0,0-5.13139,3.59093c-.28046,1.141.60935,1.39055,1.15035,1.834,2.45709,2.01406,4.96493,3.96667,7.469,5.92273a2.94242,2.94242,0,0,1,.67881,4.4034,35.24644,35.24644,0,0,1-3.30709,4.35463c-1.7594,1.90409-3.135,1.98746-5.22522.37019-4.52461-3.50054-8.97585-7.09574-13.4852-10.61628Q565.03873,549.222,557.9372,543.799c-3.63035-2.75853-3.8993-4.26987-1.09235-7.826,3.49565-4.42865,6.9371-8.90606,10.5875-13.20486C570.47154,519.18909,574.22216,516.73849,578.60084,516.9168Zm3.6265,16.15188c.08694-2.7894-3.35422-5.1474-5.43817-3.9451a20.14664,20.14664,0,0,0-6.69088,6.31964c-.37764.56382-.63221,1.16675-.13705,1.74642a23.347,23.347,0,0,0,5.33129,4.682.88184.88184,0,0,0,1.10117-.14762A20.748,20.748,0,0,0,582.22734,533.06868Z"/><path class="cls-7" d="M339.10668,153.64432c.11363-2.74291,1.59552-3.61207,3.57964-3.929,5.02684-.80313,10.06357-1.54646,15.08378-2.38861,3.449-.57858,6.86354-1.36819,10.31791-1.90681,3.59907-.56114,4.29083.01322,5.00182,3.60458,1.20659,6.09468.94468,6.433-5.30021,7.37618-4.00721.60517-8.00728,1.26065-12.00273,1.93935-2.24427.3812-3.12081,1.57071-2.80722,3.63433.41666,2.74187,1.159,3.46113,3.73641,3.06113,4.16211-.64592,8.30616-1.42151,12.43963-2.23482,3.55887-.7003,4.634-.10081,5.46994,3.38356.18473.77.23355,1.57192.36036,2.35664.52068,3.22187-.31037,4.465-3.41809,4.98918-4.00162.675-7.9952,1.42541-12.01857,1.93595-3.898.49463-3.90641,1.94866-3.14429,5.5802.40594,1.93429,2.23337,1.78384,3.75928,1.52138,4.69931-.80821,9.38462-1.69751,14.08133-2.52135.85748-.15042,1.74326-.13772,2.61551-.20656a2.42653,2.42653,0,0,1,1.75536.63731c.57777.47573,2.01651,7.61077,1.68105,8.245-.6356,1.20159-1.85356,1.45848-3.01378,1.67022-7.97,1.45463-15.94738,2.86841-23.92264,4.29376-1.0162.18159-2.031.37405-3.05168.52683-3.15995.473-4.05143-.11-4.597-3.22293-1.63376-9.32226-3.22231-18.65244-4.82727-27.97976C340.26542,160.40793,339.649,156.80528,339.10668,153.64432Z"/><path class="cls-7" d="M494.66911,622.29209c.06864,6.20874-3.30787,10.43744-8.00549,13.89373-7.67676,5.64843-18.118,5.75624-25.14853.29063-2.74761-2.136-4.31035-5.11835-5.58222-8.20351a69.40613,69.40613,0,0,1-3.7418-12.53979c-1.08255-5.28537.51914-9.8949,4.1311-13.84474a23.66265,23.66265,0,0,1,24.96263-6.097,14.12324,14.12324,0,0,1,6.80536,5.42375c1.07153,1.5588.6936,2.768-1.03548,3.3676-4.13142,1.43311-8.16994,2.86014-12.70206.95324a7.46406,7.46406,0,0,0-10.24409,7.86705,28.59581,28.59581,0,0,0,5.0581,13.73665c1.82988,2.552,4.45477,3.16537,8.12766,2.03616,3.05658-.93986,5.57427-3.78164,5.65838-6.42892.04087-1.28613-.6083-1.94647-1.90835-1.79458a8.82634,8.82634,0,0,0-1.34156.47057,6.40393,6.40393,0,0,1-1.8447.44169c-3.85177-.09261-2.98119-3.74066-4.19267-5.78787-.84561-1.429-.64258-3.15462,1.118-3.83811,4.35649-1.69128,8.76867-3.24962,13.20791-4.71126a2.67,2.67,0,0,1,3.32092,1.69882A33.77829,33.77829,0,0,1,494.66911,622.29209Z"/><path class="cls-7" d="M511.82,461.30754a113.1003,113.1003,0,0,0,19.57007,2.01166c14.47072.23812,28.322-2.34648,41.41785-8.73113,11.265-5.49207,22.79255-10.23148,35.4471-11.5479,19.17828-1.99509,37.817-.33529,55.50848,7.94042,1.10977.51913,3.04551.76479,3.05048,1.93212a20.62742,20.62742,0,0,1-1.30686,6.27069c-.3231.99592-1.1997.1351-1.76239-.10936-6.69749-2.90934-13.35738-5.87255-20.58272-7.355-10.3928-2.1323-20.85372-2.29208-31.37994-1.56436-12.06035.83372-23.13,4.92071-33.812,10.2465a98.4118,98.4118,0,0,1-48.795,10.22517A112.236,112.236,0,0,1,509.063,468.2257c-1.34685-.303-1.839-.67253-.89554-1.9976a24.54364,24.54364,0,0,0,1.98993-3.5377C510.63584,461.70544,511.23694,461.12932,511.82,461.30754Z"/><path class="cls-7" d="M539.29226,566.60069c.10471,1.08256-.67594,1.82043-1.63638,2.49007-3.85289,2.68633-7.71021,5.36722-11.51977,8.114-.90981.656-2.306,1.15559-2.02367,2.64944a5.734,5.734,0,0,0,2.79831,3.7095c.88221.55125,1.79565-.14575,2.59232-.72232,3.67538-2.65961,7.40512-5.24591,11.03443-7.96649a2.61628,2.61628,0,0,1,3.97361.31377c.27492.28857.59192.54166.83959.851,4.2117,5.259,3.48758,6.08035-.75294,8.8362-2.93284,1.90607-5.7429,4.00373-8.57774,6.05732-2.43639,1.76488-2.56976,2.71912-.84088,5.09337,1.43859,1.97559,2.45639,2.12514,4.82543.452,3.77032-2.66283,7.44914-5.45562,11.23005-8.10289,2.88969-2.02324,3.73905-1.82014,5.85878,1.01077,3.551,4.74225,3.49851,5.278-1.20349,8.64146q-9.716,6.94981-19.48465,13.82585c-2.55216,1.80056-3.51459,1.7145-5.33544-.82579q-10.78529-15.04633-21.4412-30.18511c-1.79073-2.54338-1.47209-3.71779,1.08861-5.54325q10.20891-7.27745,20.41615-14.55723c2.45352-1.75045,3.87205-1.59763,5.57509.887C537.72282,563.10944,539.19474,564.38862,539.29226,566.60069Z"/><path class="cls-7" d="M269.5823,612.05061c.51448-1.77237-.3955-2.87961-2.03724-3.8653-3.259-1.95664-6.42392-4.075-9.57268-6.20786a2.40868,2.40868,0,0,0-3.3804.22842c-3.42369,2.913-4.65639,2.92725-8.41256.39258-.85607-.57768-1.66755-1.22107-2.51763-1.808-2.61857-1.80786-2.72391-2.58133-.15167-4.59936,10.45083-8.19906,20.95985-16.324,31.43015-24.49845a3.91185,3.91185,0,0,1,5.21041-.18158c2.38669,1.68123,5.24458,2.61126,7.412,4.67566a4.63183,4.63183,0,0,1,1.49238,4.89968c-2.62823,10.57583-5.16261,21.17493-7.75587,31.75947-.50779,2.07252-1.31206,4.04454-1.40745,6.24732-.09118,2.10585-1.47873,3.01016-3.61925,2.77765C272.36157,621.446,269.379,617.18661,269.5823,612.05061Zm6.19394-26.48052c-1.9764,1.50981-3.54294,2.68416-5.08572,3.889-5.70612,4.45631-5.62187,5.2683.65194,8.922,1.05337.61352,1.51734.55459,1.8611-.59924A57.927,57.927,0,0,0,275.77624,585.57009Z"/><path class="cls-7" d="M406.00176,606.74647c4.03884-.02157,6.27334,2.15876,7.75213,5.32034,2.35509,5.035,4.13832,10.30029,6.11539,15.48668q3.77017,9.89015,7.47844,19.80379c1.09769,2.94578.59525,3.60174-2.61481,3.76369a31.211,31.211,0,0,0-3.31542.30447c-3.30428.52424-5.34622-.459-6.1992-3.6909-.66951-2.537-2.11318-2.97672-4.35953-2.85254-3.49538.19328-7.00216.30114-10.50146.25262-1.79331-.02479-2.98122.57136-3.38041,2.28013-.84254,3.60671-7.48271,6.07216-10.763,5.31489-2.13043-.49179-2.33431-2.02452-1.73692-3.9123q3.63394-11.48382,7.1857-22.99354c1.39327-4.48069,2.8359-8.94781,4.12364-13.45889.82416-2.887,2.28493-4.72149,5.527-5.02059C402.956,607.19278,404.61024,606.91111,406.00176,606.74647Zm-.6161,14.30415c-.22042.23368-.37653.32541-.41807.45414q-1.17142,3.62918-2.3177,7.26664c-1.99435,6.31941-1.50141,6.87037,5.15772,6.16658,1.86508-.19708,2.37346-.9333,1.71716-2.66849C408.12553,628.56993,406.78306,624.84892,405.38566,621.05062Z"/><path class="cls-7" d="M280.41153,176.005a15.20468,15.20468,0,0,1,12.24148,5.4112c1.35232,1.54223,1.325,3.0487-.412,4.252-3.50491,2.4281-7.17987,4.00986-11.59734,2.17787-3.30867-1.37216-7.004-.12943-9.67351,2.8811-2.14456,2.41848-2.41035,5.19553-.53787,8.62222,1.63866,2.99885,3.4344,5.91873,5.28875,8.79083,1.72151,2.66632,3.92088,4.69637,7.46555,3.9816,4.21616-.85018,7.15482-3.6032,7.67421-7.44391.62242-4.60271,3.41663-7.3732,7.3511-9.23638,1.87806-.88934,3.11844-.22749,3.85724,1.79041,2.735,7.47071.23138,13.64858-4.93514,18.91025-5.11952,5.21381-11.36713,8.04-18.90012,7.34012a15.478,15.478,0,0,1-10.06457-4.94913,45.53606,45.53606,0,0,1-9.67556-14.97055c-3.6161-9.56479.2922-19.16,9.38878-24.14282A26.90939,26.90939,0,0,1,280.41153,176.005Z"/><path class="cls-7" d="M130.40863,452.35641c7.9892,3.50987,15.33983,7.21147,23.45863,8.76472,19.98858,3.82417,39.5819,3.21335,58.4993-5.23486,7.18258-3.20764,14.22538-6.76867,21.73193-9.20659a98.5915,98.5915,0,0,1,32.5303-4.35744c2.21407.0404,5.03889-.84579,6.47529.54961,1.23252,1.19739-.18806,4.01143.59178,6.08819.44707,1.19037-.61669.98189-1.27854.96441-4.37794-.11558-8.75165-.16925-13.13492-.074-12.9032.28048-24.91544,3.8555-36.445,9.42258-10.21024,4.93-20.65521,9.14476-32.06778,10.447-19.64067,2.24111-38.77517.92054-56.92139-7.754-.65435-.3128-1.328-.51857-1.51775-1.34988C131.73172,457.993,131.11264,455.37451,130.40863,452.35641Z"/><path class="cls-7" d="M354.38937,375.5389c-16.1197.8158-31.20515-3.06312-45.54114-10.28237-23.52439-11.84632-47.99405-13.31726-73.1069-6.209-6.57947,1.86232-12.72055,5.00113-18.86986,7.96969-14.41281,6.95768-29.64912,9.33029-45.50207,8.7917a92.27192,92.27192,0,0,1-26.51165-4.38939c-5.80962-1.95373-11.29422-4.68308-16.92528-7.06382-1.79653-.75953-1.31056-2.15031-.91727-3.18888.53169-1.404,1.45079-.11675,2.0635.16665,9.82642,4.545,19.68809,9.001,30.59454,10.29239,17.79081,2.10655,35.25044,1.45741,52.02239-5.88052,8.65453-3.78646,17.059-8.22,26.23605-10.74344,12.06079-3.31636,24.33425-3.70511,36.74035-2.93322,13.37522.83222,25.6077,5.34427,37.43274,11.19708a92.4739,92.4739,0,0,0,45.286,9.34156,109.098,109.098,0,0,0,22.44424-2.98777c.61274-.1527,1.76437-1.2094,1.98929.41927.15614,1.13059.35782,2.33359-1.39523,2.75435a95.95314,95.95314,0,0,1-16.72225,2.713C360.6112,375.68924,357.49583,375.5389,354.38937,375.5389Z"/><path class="cls-7" d="M515.14274,412.4614a129.653,129.653,0,0,0,18.804,1.301,90.35589,90.35589,0,0,0,40.79067-9.45608c9.96558-4.861,20.18637-9.03313,31.34486-10.45077a126.50648,126.50648,0,0,1,33.333.15431c11.518,1.58266,21.91011,6.38507,32.28718,11.23407.87228.4076,1.45888,5.03041.705,5.64614-.73967.60414-1.34527-.1399-1.94439-.41435-6.1396-2.81235-12.22224-5.76144-18.60922-7.99006-11.14358-3.88822-22.68684-4.59252-34.36908-4.33084a88.48505,88.48505,0,0,0-38.50033,10.02683,97.64341,97.64341,0,0,1-46.74008,10.91515c-4.61617-.0872-9.23509-.27981-13.83547-.78961a2.06186,2.06186,0,0,1-2.12155-1.79777C516.01963,415.27246,515.60463,414.06742,515.14274,412.4614Z"/><path class="cls-7" d="M542.52427,201.26269a9.725,9.725,0,0,1-1.50664-.48238c-.85029-.42095-1.65474-.93395-2.48264-1.40089-5.82989-3.2881-6.48853-3.44832-9.87759,1.96666-4.24122,6.77666-8.567,13.50072-12.89333,20.22363-1.92773,2.9956-3.09988,3.18921-6.00495,1.20247-.98009-.67027-1.97076-1.327-2.97949-1.953-3.19478-1.98272-3.45279-3.06237-1.384-6.33181,3.13309-4.9517,6.30909-9.87636,9.4368-14.83144,1.98941-3.15177,3.83616-6.398,5.93385-9.47442.695-1.01922.42249-1.47535-.22352-2.17837-1.548-1.68477-3.68262-2.44562-5.57919-3.565-3.23154-1.90732-3.79108-3.68447-1.92129-6.81463,2.53935-4.25106,4.06845-4.81844,7.49113-2.66075q12.56026,7.91814,25.08295,15.89578c2.99125,1.91028,3.2274,2.95169,1.3879,6.05255C545.93941,198.7061,545.13192,200.85343,542.52427,201.26269Z"/><path class="cls-7" d="M671.1713,367.44238c-6.62985-2.8604-12.94561-6.06574-19.6652-8.32069-10.95736-3.67693-22.26191-4.35429-33.70478-4.15654-14.39074.24868-27.77619,4.21544-40.49231,10.6896-19.78213,10.07173-40.67789,12.0325-62.34133,8.84915-9.56437-1.40546-18.36362-5.01329-27.02684-9.04526a133.028,133.028,0,0,0-18.35369-7.35021c-1.47694-.43593-1.42014-1.01606-1.1877-2.17589.29613-1.47765,1.12362-1.151,2.09813-.8756a108.12077,108.12077,0,0,1,19.00641,7.60931c22.32488,11.19546,45.58675,12.55823,69.49159,6.74018,7.43879-1.81049,14.30514-5.325,21.19534-8.61044a92.65829,92.65829,0,0,1,38.52261-9.05772c13.43316-.27062,26.55247,1.12694,39.07752,6.29042,3.6742,1.51466,7.23539,3.30472,10.91672,4.80009C670.817,363.68556,671.68528,365.0037,671.1713,367.44238Z"/><path class="cls-7" d="M501.83656,408.97006c-.29239.33824-.4002.45113-.4948.57417-2.906,3.77877-6.07339,2.65049-9.6955.9407-8.748-4.12934-17.45843-8.40152-27.05938-10.38222a111.79683,111.79683,0,0,0-29.68436-1.711,73.23082,73.23082,0,0,0-14.14267,2.14116c-1.441.37922-1.95292.0511-1.94845-1.54825.00994-3.53528-.09524-3.62961,3.41242-4.237,18.05111-3.12594,35.932-2.95845,53.45586,3.064,7.82512,2.68928,15.10325,6.67612,22.76435,9.76044C499.54032,408.01337,500.62956,408.47213,501.83656,408.97006Z"/><path class="cls-7" d="M443.55191,449.61857a95.4557,95.4557,0,0,0-22.75034,2.5697c-1.73052.44631-1.97231-.16046-1.98064-1.69325-.03084-5.677-.08735-5.74386,5.17375-6.59032,15.42874-2.4823,30.768-2.33187,45.99432,1.574,2.55371.65508,2.80006,3.22425,4.41244,4.64847.54284.47955-2.95242,3.42779-3.97654,3.12428a77.76842,77.76842,0,0,0-16.13941-3.0198C450.71317,449.95553,447.13014,449.81817,443.55191,449.61857Z"/><path class="cls-7" d="M342.6917,463.0349c4.76184-.03909,9.47559.44122,14.21314.27714a97.55222,97.55222,0,0,0,23.30149-3.32314c1.24386-.35171,1.62711-.33876,1.69005,1.10484.26772,6.13809.23054,5.85568-5.63385,7.58649-7.19391,2.12324-14.01088.492-20.85536-1.27383C351.07667,466.28914,346.701,465.21552,342.6917,463.0349Z"/></g></svg> + longDescription: Adds certificates and certificate issuers as resource types in + Kubernetes clusters, and simplifies the process of obtaining, renewing and using + those certificates. It can issue certificates from a variety of supported sources. + It will ensure certificates are valid and up to date, and attempt to renew certificates + at a configured time before expiry. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: X.509 certificate management for Kubernetes and OpenShift. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-cert-manager + for community support. diff --git a/repo/packages/contour.packages.kadras.io/1.22.0.yml b/repo/packages/contour.packages.kadras.io/1.22.0.yml deleted file mode 100644 index 9b4ed1c..0000000 --- a/repo/packages/contour.packages.kadras.io/1.22.0.yml +++ /dev/null @@ -1,156 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: Package -metadata: - name: contour.packages.kadras.io.1.22.0 -spec: - refName: contour.packages.kadras.io - version: 1.22.0 - releaseNotes: contour 1.22.0 https://github.com/projectcontour/contour/releases/tag/v1.22.0 - releasedAt: "2022-07-27T00:00:00Z" - licenses: - - Apache 2.0 - template: - spec: - fetch: - - imgpkgBundle: - image: projects.registry.vmware.com/tce/contour@sha256:b682046e9da9008b2efd729c65265ee960ee7b34a95cf3d079ad5d2efb0ba10c - template: - - ytt: - paths: - - config/ - - kbld: - paths: - - '-' - - .imgpkg/images.yml - deploy: - - kapp: {} - capacityRequirementsDescription: Varies significantly based on number of Services, Ingresses/HTTPProxies, etc. A starting point is 128MB RAM and 0.5 CPU for each Contour and Envoy pod, but this can and should be tuned based on observed usage. - valuesSchema: - openAPIv3: - type: object - additionalProperties: false - description: OpenAPIv3 Schema for Contour 1.22.0 - properties: - infrastructureProvider: - type: string - description: The underlying infrastructure provider. Options are aws, azure, docker and vsphere. This field is not required, but enables better validation and defaulting if provided. - default: "" - namespace: - type: string - description: The namespace in which to deploy Contour and Envoy. - default: projectcontour - contour: - type: object - additionalProperties: false - description: Settings for the Contour component. - properties: - configFileContents: - nullable: true - description: The YAML contents of the Contour config file. See https://projectcontour.io/docs/v1.22.0/configuration/#configuration-file for more information. - default: null - replicas: - type: integer - description: How many Contour pod replicas to have. - default: 2 - useProxyProtocol: - type: boolean - description: Whether to enable PROXY protocol for all Envoy listeners. - default: false - logLevel: - type: string - description: The Contour log level. Valid options are 'info' and 'debug'. - default: info - envoy: - type: object - additionalProperties: false - description: Settings for the Envoy component. - properties: - service: - type: object - additionalProperties: false - description: Envoy service settings. - properties: - type: - type: string - description: The type of Kubernetes service to provision for Envoy. If not specified, will default to 'NodePort' for docker and vsphere and 'LoadBalancer' for others. - default: "" - loadBalancerIP: - type: string - description: The desired load balancer IP. If type is not 'LoadBalancer', this field is ignored. It is up to the cloud provider whether to honor this request. If not specified, then load balancer IP will be assigned by the cloud provider. - default: "" - externalTrafficPolicy: - type: string - description: The external traffic policy for the Envoy service. If type is 'ClusterIP', this field is ignored. Otherwise, defaults to 'Cluster' for vsphere and 'Local' for others. - default: "" - annotations: - nullable: true - description: Annotations to set on the Envoy service. - default: null - nodePorts: - type: object - additionalProperties: false - description: NodePort settings for the Envoy service. If type is not 'NodePort', these settings are ignored. - properties: - http: - type: integer - description: If type == NodePort, the node port number to expose Envoy's HTTP listener on. If not specified, a node port will be auto-assigned by Kubernetes. - default: 0 - https: - type: integer - description: If type == NodePort, the node port number to expose Envoy's HTTPS listener on. If not specified, a node port will be auto-assigned by Kubernetes. - default: 0 - aws: - type: object - additionalProperties: false - description: AWS-specific settings for the Envoy service. If infrastructure provider is not 'aws', these settings are ignored. - properties: - loadBalancerType: - type: string - description: The type of AWS load balancer to provision. Options are 'classic' and 'nlb'. - default: classic - hostPorts: - type: object - additionalProperties: false - description: Host port settings for the Envoy pods. - properties: - enable: - type: boolean - description: Whether to enable host ports. If false, http & https are ignored. - default: false - http: - type: integer - description: If enable == true, the host port number to expose Envoy's HTTP listener on. - default: 80 - https: - type: integer - description: If enable == true, the host port number to expose Envoy's HTTPS listener on. - default: 443 - hostNetwork: - type: boolean - description: Whether to enable host networking for the Envoy pods. - default: false - terminationGracePeriodSeconds: - type: integer - description: The termination grace period, in seconds, for the Envoy pods. - default: 300 - logLevel: - type: string - description: The Envoy log level. - default: info - certificates: - type: object - additionalProperties: false - description: Settings for the TLS certificates for securing communication between Contour and Envoy. - properties: - useCertManager: - type: boolean - description: Whether to use cert-manager to provision TLS certificates for securing communication between Contour and Envoy. If false, the upstream Contour certgen job will be used to provision certificates. If true, the cert-manager addon must be installed in the cluster. - default: false - duration: - type: string - description: If using cert-manager, how long the certificates should be valid for. If useCertManager is false, this field is ignored. - default: 8760h - renewBefore: - type: string - description: If using cert-manager, how long before expiration the certificates should be renewed. If useCertManager is false, this field is ignored. - default: 360h diff --git a/repo/packages/contour.packages.kadras.io/1.33.0.yml b/repo/packages/contour.packages.kadras.io/1.33.0.yml new file mode 100644 index 0000000..f21dff3 --- /dev/null +++ b/repo/packages/contour.packages.kadras.io/1.33.0.yml @@ -0,0 +1,226 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: contour.packages.kadras.io.1.33.0 +spec: + licenses: + - Apache 2.0 + refName: contour.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-contour/releases + releasedAt: "2025-09-15T14:46:26Z" + template: + spec: + deploy: + - kapp: + rawOptions: + - --wait-timeout=5m + - --kube-api-qps=25 + - --kube-api-burst=50 + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-contour@sha256:2de76924ca9bda2f1f67cbdfc00433572f9ac482cb35e80ee3c7100d217a06fb + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + certificates: + additionalProperties: false + description: TLS configuration to secure the communication between Contour + and Envoy. + properties: + duration: + default: 8760h + description: If using cert-manager, how long the certificates should + be valid for. If `useCertManager` is false, this field is ignored. + type: string + renewBefore: + default: 360h + description: If using cert-manager, how long before expiration the certificates + should be renewed. If `useCertManager` is false, this field is ignored. + type: string + useCertManager: + default: false + description: 'Whether to use cert-manager to provision TLS certificates + for securing the communication between Contour and Envoy. If `false`, + the `contour-certgen` Job will be used to provision certificates. + If `true`, cert-manager must be installed in the cluster. See: https://github.com/kadras-io/package-for-cert-manager.' + type: boolean + type: object + contour: + additionalProperties: false + description: Settings for the Contour component. + properties: + config: + additionalProperties: false + description: Configuration for the Contour Deployment. + properties: + logFormat: + default: text + description: Log output format for Contour. Either `text` (default) + or `json`. + enum: + - json + - text + type: string + logLevel: + default: info + description: The Contour log level. Valid options are `info` and + `debug`. + enum: + - info + - debug + type: string + useProxyProtocol: + default: false + description: Whether to enable PROXY protocol for all Envoy listeners. + type: boolean + type: object + configMapData: + default: {} + description: The YAML contents of the `contour` ConfigMap. See https://projectcontour.io/docs/latest/configuration/#configuration-file + for more information. + nullable: true + replicas: + default: 2 + description: The number of Contour replicas. In order to enable high + availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + envoy: + additionalProperties: false + description: Settings for the Envoy component. + properties: + config: + additionalProperties: false + description: Configuration for the Envoy workload. + properties: + logLevel: + default: info + description: The Envoy log level. + enum: + - trace + - debug + - info + - warning + - warn + - error + - critical + - "off" + type: string + type: object + service: + additionalProperties: false + description: Envoy service settings. + properties: + annotations: + default: null + description: Annotations to set on the Envoy service. + nullable: true + externalTrafficPolicy: + default: Local + description: The external traffic policy for the Envoy service. + enum: + - Cluster + - Local + type: string + loadBalancerIP: + default: "" + description: The desired load balancer IP. If `type` is not `LoadBalancer', + this field is ignored. It is up to the cloud provider whether + to honor this request. If not specified, the load balancer IP + will be assigned by the cloud provider. + type: string + nodePorts: + additionalProperties: false + description: NodePort settings for the Envoy service. If type is + not `NodePort` or `LoadBalancer`, these settings are ignored. + properties: + http: + default: 0 + description: The node port number to expose Envoy's HTTP listener + on. If not specified, a node port will be auto-assigned by + Kubernetes. + type: integer + https: + default: 0 + description: The node port number to expose Envoy's HTTPS listener + on. If not specified, a node port will be auto-assigned by + Kubernetes. + type: integer + type: object + type: + default: LoadBalancer + description: The type of Kubernetes service to provision for Envoy. + enum: + - NodePort + - ClusterIP + - LoadBalancer + type: string + type: object + workload: + additionalProperties: false + description: Envoy workload settings. + properties: + hostNetwork: + default: false + description: Whether to enable host networking for the Envoy pods. + type: boolean + hostPorts: + additionalProperties: false + description: Host port settings for the Envoy pods. + properties: + enabled: + default: true + description: Whether to enable host ports. If false, `http` + & `https` are ignored. + type: boolean + http: + default: 80 + description: If enabled, the host port number to expose Envoy's + HTTP listener on. + type: integer + https: + default: 443 + description: If enabled, the host port number to expose Envoy's + HTTPS listener on. + type: integer + type: object + replicas: + default: 2 + description: The number of Envoy replicas to deploy when `type` + is set to `Deployment`. + type: integer + terminationGracePeriodSeconds: + default: 300 + description: The termination grace period, in seconds, for the Envoy + pods. + minimum: 30 + type: integer + type: + default: DaemonSet + description: The type of Kubernetes workload that Envoy is deployed + as. Options are `Deployment` or `DaemonSet`. If not specified, + it defaults to `DaemonSet`. + enum: + - Deployment + - DaemonSet + type: string + type: object + type: object + namespace: + default: projectcontour + description: The namespace in which to deploy Contour and Envoy. + minLength: 1 + type: string + type: object + version: 1.33.0 diff --git a/repo/packages/contour.packages.kadras.io/metadata.yml b/repo/packages/contour.packages.kadras.io/metadata.yml index 439fc65..34fcf44 100644 --- a/repo/packages/contour.packages.kadras.io/metadata.yml +++ b/repo/packages/contour.packages.kadras.io/metadata.yml @@ -1,19 +1,21 @@ apiVersion: data.packaging.carvel.dev/v1alpha1 kind: PackageMetadata metadata: + creationTimestamp: null name: contour.packages.kadras.io spec: + categories: + - ingress + - envoy + - gateway displayName: contour - shortDescription: "An ingress controller" - longDescription: "An Envoy-based ingress controller that supports dynamic configuration updates and multi-team ingress delegation. See https://projectcontour.io for more information." - providerName: VMware + iconSVGBase64: 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 + longDescription: Kubernetes ingress controller providing the control plane for the + Envoy edge and service proxy. Contour supports dynamic configuration updates and + multi-team ingress delegation out of the box while maintaining a lightweight profile. maintainers: - - name: Steve Kriss - - name: Nick Young - - name: Sunjay Bhatia - - name: Nicholas Seemiller - categories: - - "ingress" - - "envoy" - - "contour" - supportDescription: "Go to https://projectcontour.io for documentation or the #contour channel on Kubernetes slack" + - name: Thomas Vitale + providerName: Kadras + shortDescription: High performance ingress controller using Envoy. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-contour + for community support. diff --git a/repo/packages/crossplane.packages.kadras.io/2.0.2.yml b/repo/packages/crossplane.packages.kadras.io/2.0.2.yml new file mode 100644 index 0000000..2d66683 --- /dev/null +++ b/repo/packages/crossplane.packages.kadras.io/2.0.2.yml @@ -0,0 +1,487 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: crossplane.packages.kadras.io.2.0.2 +spec: + refName: crossplane.packages.kadras.io + releasedAt: "2025-08-14T20:03:47Z" + template: + spec: + deploy: + - kapp: + intoNs: crossplane-system + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-crossplane@sha256:764e5de98ade05c75454843952d324a9a7aa66c5e27be8930d9e29d144c36bf7 + template: + - helmTemplate: + name: crossplane + namespace: crossplane-system + path: config/helm/upstream/crossplane + valuesFrom: + - path: config/helm/values.yml + - ytt: + ignoreUnknownComments: true + paths: + - '-' + - config/carvel + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + properties: + affinity: + default: {} + description: Add `affinities` to the Crossplane pod deployment. + type: object + args: + default: [] + description: Add custom arguments to the Crossplane pod. + items: {} + type: array + configuration: + properties: + packages: + default: [] + description: A list of Configuration packages to install. + items: {} + type: array + type: object + customAnnotations: + default: {} + description: Add custom `annotations` to the Crossplane pod deployment. + type: object + customLabels: + default: {} + description: Add custom `labels` to the Crossplane pod deployment. + type: object + deploymentStrategy: + default: RollingUpdate + description: The deployment strategy for the Crossplane and RBAC Manager + pods. + type: string + dnsPolicy: + default: "" + description: Specify the `dnsPolicy` to be used by the Crossplane pod. + type: string + extraEnvVarsCrossplane: + default: {} + description: Add custom environmental variables to the Crossplane pod deployment + application container. Replaces any `.` in a variable name with `_`. For + example, `SAMPLE.KEY=value1` becomes `SAMPLE_KEY=value1`. + type: object + extraEnvVarsCrossplaneInit: + default: {} + description: Add custom environmental variables to the Crossplane pod deployment + init container. Replaces any `.` in a variable name with `_`. For example, + `SAMPLE.KEY=value1` becomes `SAMPLE_KEY=value1`. + type: object + extraEnvVarsRBACManager: + default: {} + description: Add custom environmental variables to the RBAC Manager pod + deployment. Replaces any `.` in a variable name with `_`. For example, + `SAMPLE.KEY=value1` becomes `SAMPLE_KEY=value1`. + type: object + extraObjects: + default: [] + description: To add arbitrary Kubernetes Objects during a Helm Install + items: {} + type: array + extraVolumeMountsCrossplane: + default: {} + description: Add custom `volumeMounts` to the Crossplane pod. + type: object + extraVolumesCrossplane: + default: {} + description: Add custom `volumes` to the Crossplane pod. + type: object + function: + properties: + packages: + default: [] + description: A list of Function packages to install + items: {} + type: array + type: object + functionCache: + properties: + medium: + default: "" + description: Set to `Memory` to hold the function cache in a RAM backed + file system. Useful for Crossplane development. + type: string + pvc: + default: "" + description: The name of a PersistentVolumeClaim to use as the function + cache. Disables the default function cache `emptyDir` Volume. + type: string + sizeLimit: + default: 512Mi + description: The size limit for the function cache. If medium is `Memory` + the `sizeLimit` can't exceed Node memory. + type: string + type: object + hostNetwork: + default: false + description: 'Enable `hostNetwork` for the Crossplane deployment. Caution: + enabling `hostNetwork` grants the Crossplane Pod access to the host network + namespace. Consider setting `dnsPolicy` to `ClusterFirstWithHostNet`.' + type: boolean + image: + properties: + ignoreTag: + default: false + description: Do not use the {{ .image.tag }} value to compute the image + uri. + type: boolean + pullPolicy: + default: IfNotPresent + description: The image pull policy used for Crossplane and RBAC Manager + pods. + type: string + repository: + default: xpkg.crossplane.io/crossplane/crossplane + description: Repository for the Crossplane pod image. + type: string + tag: + default: "" + description: The Crossplane image tag. Defaults to the value of `appVersion` + in `Chart.yaml`. + type: string + type: object + imagePullSecrets: + default: [] + description: The imagePullSecret names to add to the Crossplane ServiceAccount. + items: {} + type: array + leaderElection: + default: true + description: Enable [leader election](https://docs.crossplane.io/latest/concepts/pods/#leader-election) + for the Crossplane pod. + type: boolean + metrics: + properties: + enabled: + default: false + description: Enable Prometheus path, port and scrape annotations and + expose port 8080 for both the Crossplane and RBAC Manager pods. + type: boolean + port: + default: "" + description: The port the metrics server listens on. + type: string + type: object + nodeSelector: + default: {} + description: Add `nodeSelectors` to the Crossplane pod deployment. + type: object + packageCache: + properties: + configMap: + default: "" + description: The name of a ConfigMap to use as the package cache. Disables + the default package cache `emptyDir` Volume. + type: string + medium: + default: "" + description: Set to `Memory` to hold the package cache in a RAM backed + file system. Useful for Crossplane development. + type: string + pvc: + default: "" + description: The name of a PersistentVolumeClaim to use as the package + cache. Disables the default package cache `emptyDir` Volume. + type: string + sizeLimit: + default: 20Mi + description: The size limit for the package cache. If medium is `Memory` + the `sizeLimit` can't exceed Node memory. + type: string + type: object + podSecurityContextCrossplane: + default: {} + description: Add a custom `securityContext` to the Crossplane pod. + type: object + podSecurityContextRBACManager: + default: {} + description: Add a custom `securityContext` to the RBAC Manager pod. + type: object + priorityClassName: + default: "" + description: The PriorityClass name to apply to the Crossplane and RBAC + Manager pods. + type: string + provider: + properties: + defaultActivations: + default: [] + description: Define entries for the default managed resource activation + policy. If defined, a default MRAP will contain these activations. + items: + default: '*' + type: string + type: array + packages: + default: [] + description: A list of Provider packages to install. + items: {} + type: array + type: object + rbacManager: + properties: + affinity: + default: {} + description: Add `affinities` to the RBAC Manager pod deployment. + type: object + args: + default: [] + description: Add custom arguments to the RBAC Manager pod. + items: {} + type: array + deploy: + default: true + description: Deploy the RBAC Manager pod and its required roles. + type: boolean + leaderElection: + default: true + description: Enable [leader election](https://docs.crossplane.io/latest/concepts/pods/#leader-election) + for the RBAC Manager pod. + type: boolean + nodeSelector: + default: {} + description: Add `nodeSelectors` to the RBAC Manager pod deployment. + type: object + replicas: + default: 1 + description: The number of RBAC Manager pod `replicas` to deploy. + type: integer + revisionHistoryLimit: + description: The number of RBAC Manager ReplicaSets to retain. + oneOf: + - default: null + nullable: true + type: integer + - default: null + nullable: true + type: number + - default: null + nullable: true + type: boolean + - default: null + nullable: true + type: string + - default: null + nullable: true + type: object + - default: null + items: {} + nullable: true + type: array + skipAggregatedClusterRoles: + default: false + description: Don't install aggregated Crossplane ClusterRoles. + type: boolean + tolerations: + default: [] + description: Add `tolerations` to the RBAC Manager pod deployment. + items: {} + type: array + topologySpreadConstraints: + default: [] + description: Add `topologySpreadConstraints` to the RBAC Manager pod + deployment. + items: {} + type: array + type: object + readiness: + properties: + port: + default: "" + description: The port the readyz server listens on. + type: string + type: object + registryCaBundleConfig: + properties: + key: + default: "" + description: The ConfigMap key containing a custom CA bundle to enable + fetching packages from registries with unknown or untrusted certificates. + type: string + name: + default: "" + description: The ConfigMap name containing a custom CA bundle to enable + fetching packages from registries with unknown or untrusted certificates. + type: string + type: object + replicas: + default: 1 + description: helm-docs renders these comments into markdown. Use markdown + formatting where appropiate. -- The number of Crossplane pod `replicas` + to deploy. + type: integer + resourcesCrossplane: + properties: + limits: + properties: + cpu: + default: 500m + description: CPU resource limits for the Crossplane pod. + type: string + memory: + default: 1024Mi + description: Memory resource limits for the Crossplane pod. + type: string + type: object + requests: + properties: + cpu: + default: 100m + description: CPU resource requests for the Crossplane pod. + type: string + memory: + default: 256Mi + description: Memory resource requests for the Crossplane pod. + type: string + type: object + type: object + resourcesRBACManager: + properties: + limits: + properties: + cpu: + default: 100m + description: CPU resource limits for the RBAC Manager pod. + type: string + memory: + default: 512Mi + description: Memory resource limits for the RBAC Manager pod. + type: string + type: object + requests: + properties: + cpu: + default: 100m + description: CPU resource requests for the RBAC Manager pod. + type: string + memory: + default: 256Mi + description: Memory resource requests for the RBAC Manager pod. + type: string + type: object + type: object + revisionHistoryLimit: + description: The number of Crossplane ReplicaSets to retain. + oneOf: + - default: null + nullable: true + type: integer + - default: null + nullable: true + type: number + - default: null + nullable: true + type: boolean + - default: null + nullable: true + type: string + - default: null + nullable: true + type: object + - default: null + items: {} + nullable: true + type: array + runtimeClassName: + default: "" + description: The runtimeClassName name to apply to the Crossplane and RBAC + Manager pods. + type: string + securityContextCrossplane: + properties: + allowPrivilegeEscalation: + default: false + description: Enable `allowPrivilegeEscalation` for the Crossplane pod. + type: boolean + readOnlyRootFilesystem: + default: true + description: Set the Crossplane pod root file system as read-only. + type: boolean + runAsGroup: + default: 65532 + description: The group ID used by the Crossplane pod. + type: integer + runAsUser: + default: 65532 + description: The user ID used by the Crossplane pod. + type: integer + type: object + securityContextRBACManager: + properties: + allowPrivilegeEscalation: + default: false + description: Enable `allowPrivilegeEscalation` for the RBAC Manager + pod. + type: boolean + readOnlyRootFilesystem: + default: true + description: Set the RBAC Manager pod root file system as read-only. + type: boolean + runAsGroup: + default: 65532 + description: The group ID used by the RBAC Manager pod. + type: integer + runAsUser: + default: 65532 + description: The user ID used by the RBAC Manager pod. + type: integer + type: object + service: + properties: + customAnnotations: + default: {} + description: Configure annotations on the service object. Only enabled + when webhooks.enabled = true + type: object + type: object + serviceAccount: + properties: + create: + default: true + description: Specifies whether Crossplane ServiceAccount should be created + type: boolean + customAnnotations: + default: {} + description: Add custom `annotations` to the Crossplane ServiceAccount. + type: object + name: + default: "" + description: Provide the name of an already created Crossplane ServiceAccount. + Required when `serviceAccount.create` is `false` + type: string + type: object + tolerations: + default: [] + description: Add `tolerations` to the Crossplane pod deployment. + items: {} + type: array + topologySpreadConstraints: + default: [] + description: Add `topologySpreadConstraints` to the Crossplane pod deployment. + items: {} + type: array + webhooks: + properties: + enabled: + default: true + description: Enable webhooks for Crossplane and installed Provider packages. + type: boolean + port: + default: "" + description: The port the webhook server listens on. + type: string + type: object + type: object + version: 2.0.2 diff --git a/repo/packages/crossplane.packages.kadras.io/metadata.yml b/repo/packages/crossplane.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..93fe9b9 --- /dev/null +++ b/repo/packages/crossplane.packages.kadras.io/metadata.yml @@ -0,0 +1,19 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: crossplane.packages.kadras.io +spec: + categories: + - control plane + displayName: crossplane + iconSVGBase64: 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 + longDescription: Crossplane is an open source Kubernetes extension that transforms + your Kubernetes cluster into a universal control plane. Crossplane lets you manage + anything, anywhere, all through standard Kubernetes APIs. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Transform your Kubernetes cluster into a universal control plane. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-crossplane + for community support. diff --git a/repo/packages/dependency-track.packages.kadras.io/4.13.4.yml b/repo/packages/dependency-track.packages.kadras.io/4.13.4.yml new file mode 100644 index 0000000..faa8fc4 --- /dev/null +++ b/repo/packages/dependency-track.packages.kadras.io/4.13.4.yml @@ -0,0 +1,211 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: dependency-track.packages.kadras.io.4.13.4 +spec: + licenses: + - Apache 2.0 + refName: dependency-track.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-dependency-track/releases + releasedAt: "2025-09-15T15:45:57Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-dependency-track@sha256:8572050568c80b0b94fb93df767bc7d5eeecd3ac0fd847af8dd1d743538f1eab + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + api_server: + additionalProperties: false + description: Settings for the API Server component. + properties: + logging: + additionalProperties: false + description: Settings for logging. + properties: + format: + default: console + description: 'Log encoding format. Options: `console`, `json`.' + enum: + - console + - json + type: string + level: + default: info + description: 'Log verbosity level. Options: `trace`, `debug`, `info`, + `warn`, `error`.' + enum: + - trace + - debug + - info + - warn + - error + type: string + type: object + metrics: + additionalProperties: false + description: Settings for metrics. + properties: + enabled: + default: true + description: Whether to enable the generation of Prometheus metrics. + type: boolean + type: object + resources: + additionalProperties: false + description: Resource configuration for the API Server component. + properties: + limits: + additionalProperties: false + properties: + cpu: + default: "4" + description: CPU limits configuration for the API Server component. + type: string + memory: + default: 5Gi + description: Memory limits configuration for the API Server + component. + type: string + type: object + requests: + additionalProperties: false + properties: + cpu: + default: "0.5" + description: CPU requests configuration for the API Server component. + type: string + memory: + default: 5Gi + description: Memory requests configuration for the API Server + component. + type: string + type: object + type: object + storage: + additionalProperties: false + description: Storage configuration for the API Server component. + properties: + class_name: + default: "" + description: Class name for the PersistenceVolume to create. + type: string + size: + default: 1Gi + description: Size of the PersistenceVolume to create. + type: string + type: object + type: object + domain_name: + default: "" + description: Domain name for Dependency Track. It must be a valid DNS name. + minLength: 4 + type: string + frontend: + additionalProperties: false + description: Settings for the Frontend component. + properties: + replicas: + default: 1 + description: The number of Frontend replicas. In order to enable high + availability, it should be greater than 1. + minimum: 1 + type: integer + resources: + additionalProperties: false + description: Resource configuration for the Frontend component. + properties: + limits: + additionalProperties: false + properties: + cpu: + default: 500m + description: CPU limits configuration for the Frontend component. + type: string + memory: + default: 128Mi + description: Memory limits configuration for the Frontend component. + type: string + type: object + requests: + additionalProperties: false + properties: + cpu: + default: 150m + description: CPU requests configuration for the Frontend component. + type: string + memory: + default: 64Mi + description: Memory requests configuration for the Frontend + component. + type: string + type: object + type: object + type: object + ingress_issuer: + default: "" + description: A reference to the ClusterIssuer to use for enabling TLS in + Dependency Track. + example: kadras-ca-issuer + minLength: 4 + type: string + x-example-description: Kadras private CA + postgresql: + additionalProperties: false + description: Settings for the PostgreSQL database. + properties: + instances: + default: 1 + description: Number of instances for the PostgreSQL database cluster. + Define at least 3 for production scenarios. + minimum: 1 + type: integer + storage: + additionalProperties: false + description: Storage configuration for each PostgreSQL instance. + properties: + size: + default: 1Gi + description: Size of the PersistenceVolume to create for each PostgreSQL + instance. + type: string + type: object + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use the proxy. + type: string + type: object + system_requirement_check: + default: true + description: Whether Dependency Track will check for memory and CPU requirements + at startup time. + type: boolean + type: object + version: 4.13.4 diff --git a/repo/packages/dependency-track.packages.kadras.io/metadata.yml b/repo/packages/dependency-track.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..972b733 --- /dev/null +++ b/repo/packages/dependency-track.packages.kadras.io/metadata.yml @@ -0,0 +1,25 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: dependency-track.packages.kadras.io +spec: + categories: + - supply-chain + - security + displayName: dependency-track + longDescription: Dependency-Track is an intelligent Component Analysis platform + that allows organizations to identify and reduce risk in the software supply chain. + Dependency-Track takes a unique and highly beneficial approach by leveraging the + capabilities of Software Bill of Materials (SBOM). This approach provides capabilities + that traditional Software Composition Analysis (SCA) solutions cannot achieve. + Dependency-Track monitors component usage across all versions of every application + in its portfolio in order to proactively identify risk across an organization. + The platform has an API-first design and is ideal for use in CI/CD environments. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Dependency Track is a continuous SBOM Analysis Platform for managing + software supply chain security risks. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-dependency-track + for community support. diff --git a/repo/packages/developer-portal.packages.kadras.io/0.8.0.yml b/repo/packages/developer-portal.packages.kadras.io/0.8.0.yml new file mode 100644 index 0000000..11223c1 --- /dev/null +++ b/repo/packages/developer-portal.packages.kadras.io/0.8.0.yml @@ -0,0 +1,681 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: developer-portal.packages.kadras.io.0.8.0 +spec: + refName: developer-portal.packages.kadras.io + releasedAt: "2025-09-24T16:17:36Z" + template: + spec: + deploy: + - kapp: + intoNs: backstage + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-developer-portal@sha256:b455104c820ab67c804113843d00528eac7ac6f1bf2abfc9140db15ff6a01d36 + template: + - helmTemplate: + name: backstage + namespace: backstage + path: config/helm/upstream/backstage + valuesFrom: + - path: config/helm/values.yml + - ytt: + ignoreUnknownComments: true + paths: + - '-' + - config/carvel + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + properties: + backstage: + description: Backstage parameters @default -- See below + properties: + affinity: + default: {} + description: 'Affinity for pod assignment
Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity' + type: object + annotations: + default: {} + description: Additional custom annotations for the `Deployment` resource + type: object + appConfig: + default: {} + description: 'Allows to define the appConfig as a multiline string that + generates a ConfigMap automatically, not requiring to have it pre + provisioned as with the extraAppConfig key. DO NOT USE if you need + to put sensitive data in the appConfig. E.g: appConfig: app: baseUrl: + https://somedomain.tld -- Generates ConfigMap and configures it in + the Backstage pods' + type: object + args: + default: [] + description: Backstage container command arguments + items: {} + type: array + autoscaling: + description: 'Autoscaling configuration.
Ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/' + properties: + enabled: + default: false + type: boolean + maxReplicas: + default: 100 + type: integer + minReplicas: + default: 1 + type: integer + targetCPUUtilizationPercentage: + default: 80 + type: integer + type: object + command: + default: [] + description: Backstage container command + items: + default: node + type: string + type: array + containerPorts: + description: Container ports on the Deployment + properties: + backend: + default: 7007 + type: integer + type: object + containerSecurityContext: + default: {} + description: 'Security settings for a Container.
Ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container' + type: object + extraAppConfig: + default: [] + description: Extra app configuration files to inline into command arguments + items: {} + type: array + extraContainers: + default: [] + description: Deployment sidecars + items: {} + type: array + extraEnvVars: + default: [] + description: Backstage container environment variables + items: {} + type: array + extraEnvVarsCM: + default: [] + description: Backstage container environment variables from existing + ConfigMaps + items: {} + type: array + extraEnvVarsSecrets: + default: [] + description: Backstage container environment variables from existing + Secrets + items: {} + type: array + extraPorts: + default: [] + description: Backstage container additional ports + items: {} + type: array + extraVolumeMounts: + default: [] + description: Backstage container additional volume mounts + items: {} + type: array + extraVolumes: + default: [] + description: Backstage container additional volumes + items: {} + type: array + hostAliases: + default: [] + description: 'Host Aliases for the pod
Ref: https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/' + items: {} + type: array + image: + properties: + digest: + default: "" + description: Backstage image digest (digest takes precedence over + image tag) + type: string + pullPolicy: + default: Always + description: 'Specify a imagePullPolicy. Defaults to ''Always'' + if image tag is ''latest'', else set to ''IfNotPresent''
+ Ref: https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy' + type: string + pullSecrets: + default: [] + description: 'Optionally specify an array of imagePullSecrets. Secrets + must be manually created in the namespace.
Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ +
E.g: `pullSecrets: [myRegistryKeySecretName]`' + items: {} + type: array + registry: + default: ghcr.io + description: Backstage image registry + type: string + repository: + default: backstage/backstage + description: Backstage image repository + type: string + tag: + default: latest + description: Backstage image tag (immutable tags are recommended) + type: string + type: object + initContainers: + default: [] + description: Backstage container init containers + items: {} + type: array + installDir: + default: /app + description: Directory containing the backstage installation + type: string + livenessProbe: + description: 'Liveness Probe Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes + ' + type: object + revisionHistoryLimit: + default: 10 + description: Define the [count of deployment revisions](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy) + to be kept. May be set to 0 in case of GitOps deployment approach. + type: integer + startupProbe: + description: 'Startup Probe Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes + ' + items: {} + type: array + extraTls: + default: [] + description: 'The TLS configuration for additional hostnames to be covered + with this ingress record.
Ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls + ' + items: {} + type: array + host: + default: "" + description: 'Hostname to be used to expose the route to access the + backstage application (e.g: backstage.IP.nip.io)' + type: string + path: + default: / + description: 'Path to be used to expose the full route to access the + backstage application (e.g: IP.nip.io/backstage)' + type: string + tls: + description: Ingress TLS parameters + properties: + enabled: + default: false + description: Enable TLS configuration for the host defined at `ingress.host` + parameter + type: boolean + secretName: + default: "" + description: The name to which the TLS Secret will be called + type: string + type: object + type: object + kubeVersion: + default: "" + description: |- + Common parameters + -- Override Kubernetes version + type: string + metrics: + description: Metrics configuration + properties: + serviceMonitor: + description: ServiceMonitor configuration
Allows configuring + your backstage instance as a scrape target for [Prometheus](https://github.com/prometheus/prometheus) + using a ServiceMonitor custom resource that [Prometheus Operator](https://github.com/prometheus-operator/prometheus-operator) + can understand. + properties: + annotations: + default: {} + description: ServiceMonitor annotations + type: object + enabled: + default: false + description: If enabled, a ServiceMonitor resource for Prometheus + Operator is created
Prometheus Operator must be installed + in your cluster prior to enabling. + type: boolean + interval: + description: ServiceMonitor scrape interval + oneOf: + - default: null + nullable: true + type: integer + - default: null + nullable: true + type: number + - default: null + nullable: true + type: boolean + - default: null + nullable: true + type: string + - default: null + nullable: true + type: object + - default: null + items: {} + nullable: true + type: array + labels: + default: {} + description: Additional ServiceMonitor labels + type: object + path: + default: /metrics + description: ServiceMonitor endpoint path
Note that the /metrics + endpoint is NOT present in a freshly scaffolded Backstage app. + To setup, follow the [Prometheus metrics tutorial](https://github.com/backstage/backstage/blob/master/contrib/docs/tutorials/prometheus-metrics.md). + type: string + port: + default: http-backend + description: ServiceMonitor endpoint port
The port where + the metrics are exposed. If using OpenTelemetry as [documented + here](https://backstage.io/docs/tutorials/setup-opentelemetry/), + then the port needs to be explicitly specified. OpenTelemetry's + default port is 9464. + type: string + type: object + type: object + nameOverride: + default: "" + description: String to partially override common.names.fullname + type: string + networkPolicy: + description: '@section NetworkPolicy parameters' + properties: + egressRules: + description: Egress Rules + properties: + customRules: + default: [] + description: Additional custom egress rules + items: {} + type: array + denyConnectionsToExternal: + default: false + description: Deny external connections. Should not be enabled when + working with an external database. + type: boolean + type: object + enabled: + default: false + description: Specifies whether a NetworkPolicy should be created + type: boolean + ingressRules: + description: Ingress Rules + properties: + customRules: + default: [] + description: Additional custom ingress rules + items: {} + type: array + namespaceSelector: + default: {} + description: Namespace selector label allowed to access the Backstage + instance + type: object + podSelector: + default: {} + description: Pod selector label allowed to access the Backstage + instance + type: object + type: object + type: object + postgresql: + description: PostgreSQL [chart configuration](https://github.com/bitnami/charts/blob/master/bitnami/postgresql/values.yaml) + @default -- See below + properties: + architecture: + default: standalone + description: PostgreSQL architecture (`standalone` or `replication`) + type: string + auth: + description: The authentication details of the Postgres database + properties: + existingSecret: + default: "" + description: Name of existing secret to use for PostgreSQL credentials + type: string + password: + default: "" + description: Password for the custom user to create + type: string + secretKeys: + description: The secret keys Postgres will look for to retrieve + the relevant password + properties: + adminPasswordKey: + default: admin-password + description: The key in which Postgres will look for, for the + admin password, in the existing Secret + type: string + replicationPasswordKey: + default: replication-password + description: The key in which Postgres will look for, for the + replication password, in the existing Secret + type: string + userPasswordKey: + default: user-password + description: The key in which Postgres will look for, for the + user password, in the existing Secret + type: string + type: object + username: + default: bn_backstage + description: Name for a custom user to create + type: string + type: object + enabled: + default: false + description: Switch to enable or disable the PostgreSQL helm chart + type: boolean + type: object + service: + description: |- + @section Traffic Exposure parameters + Service parameters -- Service parameters @default -- See below + properties: + annotations: + default: {} + description: Additional custom annotations for Backstage service + type: object + clusterIP: + default: "" + description: 'Backstage service Cluster IP
E.g `clusterIP: None`' + type: string + externalTrafficPolicy: + default: Cluster + description: 'Backstage service external traffic policy Ref: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip' + type: string + extraPorts: + default: [] + description: Extra ports to expose in the Backstage service (normally + used with the `sidecar` value) + items: {} + type: array + ipFamilies: + default: [] + description: 'IP Families
Ref: https://kubernetes.io/docs/concepts/services-networking/dual-stack' + items: {} + type: array + ipFamilyPolicy: + default: "" + description: 'IP Family Policy
Ref: https://kubernetes.io/docs/concepts/services-networking/dual-stack' + type: string + loadBalancerIP: + default: "" + description: 'Backstage service Load Balancer IP
Ref: https://kubernetes.io/docs/concepts/services-networking/service/#loadbalancer' + type: string + loadBalancerSourceRanges: + default: [] + description: 'Load Balancer sources
Ref: https://kubernetes.io/docs/concepts/services-networking/service/#loadbalancer +
E.g `loadBalancerSourceRanges: [10.10.10.0/24]`' + items: {} + type: array + nodePorts: + description: Node port for the Backstage client connections Choose port + between `30000-32767` + properties: + backend: + default: "" + type: string + type: object + ports: + description: Backstage svc port for client connections + properties: + backend: + default: 7007 + type: integer + name: + default: http-backend + description: Backstage svc port name + type: string + targetPort: + default: backend + description: Backstage svc target port referencing receiving pod + container port + type: string + type: object + sessionAffinity: + default: None + description: 'Control where client requests go, to the same pod or round-robin + (values: `ClientIP` or `None`)
Ref: https://kubernetes.io/docs/concepts/services-networking/service/#session-stickiness' + type: string + type: + default: ClusterIP + description: Kubernetes Service type + type: string + type: object + serviceAccount: + description: Service Account Configuration @default -- See below + properties: + annotations: + default: {} + description: Additional custom annotations for the ServiceAccount. + type: object + automountServiceAccountToken: + default: true + description: Auto-mount the service account token in the pod + type: boolean + create: + default: false + description: Enable the creation of a ServiceAccount for Backstage pods + type: boolean + labels: + default: {} + description: Additional custom labels to the service ServiceAccount. + type: object + name: + default: "" + description: Name of the ServiceAccount to use If not set and `serviceAccount.create` + is true, a name is generated + type: string + type: object + type: object + version: 0.8.0 diff --git a/repo/packages/developer-portal.packages.kadras.io/metadata.yml b/repo/packages/developer-portal.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..667c92b --- /dev/null +++ b/repo/packages/developer-portal.packages.kadras.io/metadata.yml @@ -0,0 +1,17 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: developer-portal.packages.kadras.io +spec: + categories: + - control plane + displayName: developer-portal + longDescription: Kadras Developer Portal is based on Backstage and supports application + developers with paved paths to production on Kubernetes. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Internal developer portal. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-developer-portal + for community support. diff --git a/repo/packages/engineering-platform.packages.kadras.io/0.27.0.yml b/repo/packages/engineering-platform.packages.kadras.io/0.27.0.yml new file mode 100644 index 0000000..494bf13 --- /dev/null +++ b/repo/packages/engineering-platform.packages.kadras.io/0.27.0.yml @@ -0,0 +1,255 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: engineering-platform.packages.kadras.io.0.27.0 +spec: + licenses: + - Apache 2.0 + refName: engineering-platform.packages.kadras.io + releaseNotes: https://github.com/kadras-io/kadras-engineering-platform/releases + releasedAt: "2025-09-24T16:27:22Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/kadras-engineering-platform@sha256:478450ba6ff5c780bac64e697df2f66666c8d27a08e66393836839cd0e3a139f + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + cert_manager: + default: {} + description: Configuration for the Cert Manager package. + nullable: true + contour: + default: {} + description: Configuration for the Contour package. + nullable: true + crossplane: + default: {} + description: Configuration for the Crossplane package. + nullable: true + dependency_track: + default: {} + description: Configuration for the Dependency Track package. + nullable: true + developer_portal: + default: {} + description: Configuration for the Developer Portal package. + nullable: true + flux: + default: {} + description: Configuration for the Flux package. + nullable: true + gitops_configurer: + default: {} + description: Configuration for the GitOps Configurer package. + nullable: true + knative: + additionalProperties: false + description: Configuration for Knative related packages. + properties: + serving: + default: {} + description: Configuration for the Knative Serving package. + nullable: true + type: object + kyverno: + additionalProperties: false + description: Configuration for the Kyverno related packages. + properties: + core: + default: {} + description: Configuration for the Kyverno package. + nullable: true + type: object + metrics_server: + default: {} + description: Configuration for the Metrics Server package. + nullable: true + platform: + additionalProperties: false + description: Configuration for the platform packages. + properties: + additional_packages: + default: [] + description: A list of packages to include in the installation. + items: + default: "" + type: string + type: array + ca_cert_data: + default: "" + description: PEM-encoded certificate data to trust TLS connections with + a custom CA. + type: string + cosign: + additionalProperties: false + description: Settings for Cosign, used for signing and verifying OCI + artifacts. + properties: + secret: + additionalProperties: false + description: Configuration for the Secret holding the Cosign key + pair. + properties: + name: + default: "" + description: The name of the Secret holding the Cosign key pair. + type: string + namespace: + default: kadras-system + description: The namespace of the Secret holding the Cosign + key pair. + type: string + type: object + type: object + excluded_packages: + default: [] + description: A list of packages to exclude from being installed. + items: + default: "" + type: string + type: array + git: + additionalProperties: false + description: Settings for the Git server that the platform will use. + properties: + secret: + additionalProperties: false + description: Configuration for the Secret holding the credentials + to access the Git server. + properties: + name: + default: "" + description: 'The name of the Secret holding the credentials + to access the Git server. The credentials should provide read-only + access to the Git server except when installing the platform + with one of these profiles: `standalone`, `build`.' + type: string + namespace: + default: kadras-system + description: The namespace of the Secret holding the credentials + to access the Git server. + type: string + type: object + server: + default: https://github.com + description: The server hosting the Git repositories used by the + plaform. + example: https://github.com + type: string + x-example-description: GitHub + type: object + ingress: + additionalProperties: false + description: Setting for the Ingress controller that the platform will + use. + properties: + domain: + default: "" + description: The base domain name the platform will use to configure + the Ingress controller. It must be a valid DNS name. + type: string + issuer: + additionalProperties: false + description: A reference to the ClusterIssuer the platform will + use to enable TLS communications. + properties: + email: + default: "" + description: The email address that Let's Encrypt will use to + send info on expiring certificates or other issues. Required + when the type is `letsencrypt_staging` or `letsencrypt`. + type: string + name: + default: "" + description: A reference to a custom ClusterIssuer previously + created on the cluster where the platform will be installed. + Required when the type is `custom`. + type: string + type: + default: private + description: 'The type of ClusterIssuer the platform will use + to enable TLS communications. Options: `private`, `letsencrypt_staging`, + `letsencrypt`, `custom`.' + enum: + - private + - letsencrypt_staging + - letsencrypt + - custom + type: string + type: object + type: object + namespace: + default: kadras-system + description: The namespace where to install the platform. + type: string + oci: + additionalProperties: false + description: Settings for accessing the OCI registry that the platform + will use. + properties: + pull_secret: + additionalProperties: false + description: Configuration for the Secret holding the credentials + to pull images from the OCI registry. + properties: + name: + default: "" + description: The name of the Secret holding the credentials + to pull images from the OCI registry. + type: string + namespace: + default: kadras-system + description: The namespace of the Secret holding the credentials + to pull images from the OCI registry. + type: string + type: object + type: object + profile: + default: run + description: 'The platform profile to install. Options: `standalone`, + `run`.' + enum: + - standalone + - run + type: string + type: object + postgresql_operator: + default: {} + description: Configuration for the PostgreSQL Operator package. + nullable: true + rabbitmq_operator: + default: {} + description: Configuration for the RabbitMQ Operator package. + nullable: true + secretgen_controller: + default: {} + description: Configuration for the Secretgen Controller package. + nullable: true + service_binding: + default: {} + description: Configuration for the Service Binding package. + nullable: true + tempo_operator: + default: {} + description: Configuration for the Tempo Operator package. + nullable: true + workspace_provisioner: + default: {} + description: Configuration for the Workspace Provisioner package. + nullable: true + type: object + version: 0.27.0 diff --git a/repo/packages/engineering-platform.packages.kadras.io/metadata.yml b/repo/packages/engineering-platform.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..5c24704 --- /dev/null +++ b/repo/packages/engineering-platform.packages.kadras.io/metadata.yml @@ -0,0 +1,18 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: engineering-platform.packages.kadras.io +spec: + categories: + - internal developer platform + - application platform + displayName: engineering-platform + longDescription: A cloud native platform aimed at supporting application developers + with paved paths to production on Kubernetes and shipped as a Carvel package. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Cloud native engineering platform on Kubernetes. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/kadras-engineering-platform + for community support. diff --git a/repo/packages/flux.packages.kadras.io/2.6.4.yml b/repo/packages/flux.packages.kadras.io/2.6.4.yml new file mode 100644 index 0000000..105657e --- /dev/null +++ b/repo/packages/flux.packages.kadras.io/2.6.4.yml @@ -0,0 +1,107 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: flux.packages.kadras.io.2.6.4 +spec: + licenses: + - Apache 2.0 + refName: flux.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-flux/releases + releasedAt: "2025-08-14T17:42:46Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-flux@sha256:71304d88eb8251a0db355dc64676d7fd5c1c738d57a3d52b20662e1f0e108d5a + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + logging: + additionalProperties: false + description: Settings for logging. + properties: + encoding: + default: json + description: 'Log encoding format. Options: `console`, `json`.' + enum: + - console + - json + type: string + level: + default: info + description: 'Log verbosity level. Options: `trace`, `debug`, `info`, + `error`.' + enum: + - trace + - debug + - info + - error + type: string + type: object + optional_components: + additionalProperties: false + description: Settings for which Flux optional components to deploy. + properties: + helm_controller: + default: false + description: Whether to deploy the Helm Controller. + type: boolean + image_automation_controller: + default: false + description: Whether to deploy the Image Automation Controller. + type: boolean + image_reflector_controller: + default: false + description: Whether to deploy the Image Reflector Controller. + type: boolean + kustomize_controller: + default: true + description: Whether to deploy the Kustomize Controller. + type: boolean + notification_controller: + default: false + description: Whether to deploy the Notification Controller. + type: boolean + type: object + policies: + additionalProperties: false + description: Settings for the Kyverno policies. + properties: + include: + default: false + description: Whether to include the out-of-the-box Kyverno policies + to validate and secure the package installation. + type: boolean + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use the proxy. + type: string + type: object + type: object + version: 2.6.4 diff --git a/repo/packages/flux.packages.kadras.io/metadata.yml b/repo/packages/flux.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..06bd653 --- /dev/null +++ b/repo/packages/flux.packages.kadras.io/metadata.yml @@ -0,0 +1,22 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: flux.packages.kadras.io +spec: + categories: + - gitops + displayName: flux + iconSVGBase64: PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHJvbGU9ImltZyIgdmlld0JveD0iNDguMDAgLTIuMjUgMjYyLjUwIDM2NC4wMCI+PGRlZnM+PHN0eWxlPi5jbHMtMXtmaWxsOiMzMjZjZTV9LmNscy0ze2ZpbGw6bm9uZX08L3N0eWxlPjwvZGVmcz48cGF0aCBkPSJNNTkuNzIzOTMgOTcuNzc4NDdhMTAuMTgyNTEgMTAuMTgyNTEgMCAwIDEgMC0xNy4wNzM5M2wxMTQuMDcwMy03NC4xNjAyM2ExMC4xODI1OCAxMC4xODI1OCAwIDAgMSAxMS4xMDAyNCAwbDExNC4wNzAyOSA3NC4xNjAyM2ExMC4xODI1IDEwLjE4MjUgMCAwIDEgMCAxNy4wNzM5NGwtMTE0LjA3MDI5IDc0LjE2MDIxYTEwLjE4MjU0IDEwLjE4MjU0IDAgMCAxLTExLjEwMDI0IDB6IiBjbGFzcz0iY2xzLTEiLz48cGF0aCBmaWxsPSIjYzFkMmY3IiBkPSJNMTk3LjM1NTY1IDExMC44NjZoNy45MTI3N2E2LjAwMzI2IDYuMDAzMjYgMCAwIDAgNS4xOTkwOC05LjAwNWwtMjUuOTIzODEtNDQuOTAyYTYuMDAzNTUgNi4wMDM1NSAwIDAgMC0xMC4zOTgzOCAwbC0yNS45MjQgNDQuOTAyYTYuMDAzMjYgNi4wMDMyNiAwIDAgMCA1LjE5OTA1IDkuMDA1aDcuOTEzYTYuMDAzNCA2LjAwMzQgMCAwIDEgNi4wMDM0MSA2LjAwMzR2NTEuMjU2M2w1LjMxMDM3IDMuNDUyNTJhMTIuMjg3NDMgMTIuMjg3NDMgMCAwIDAgMTMuMzk0NDUgMGw1LjMxMDYyLTMuNDUyNTJ2LTUxLjI1NjI4YTYuMDAzNCA2LjAwMzQgMCAwIDEgNi4wMDM0LTYuMDAzNDF6Ii8+PHBhdGggZD0iTTE3My43OTM0OCAzNTMuMjcxMDhhMTAuMTI4MjggMTAuMTI4MjggMCAwIDAgMy40NTY0MyAxLjQwMmMtMi4xNzU0OS0xLjIzMTItNC4zODcyNy0yLjM3NDI5LTYuNjIyNjktMy40NjAzNnptLTYuNDU2NjctMTYxLjE5NTQ2bC0xMS4zMTU3IDcuMzU2NjFhMTEwLjk5MyAxMTAuOTkzIDAgMCAwIDExLjMxNTcxIDYuNTk5N3ptMjQuMDE1MzcgMjMuNzE2MDdjOS43Mzg1OCAzLjExNTA1IDE5LjgxMzE3IDUuNjQ4NTEgMzAuMTA5NzMgOC4xODY1NSAxMC45MjAzMiAyLjY5MTgyIDIxLjk3MzU1IDUuNDI3MTcgMzIuODE3OTIgOS4wMDgzOWwtMzUuNDE2MDYtMjMuMDI0ODJhMjE1Ljg4MTMzIDIxNS44ODEzMyAwIDAgMS0yNy41MTE2MS05LjQxMDA3em0wIDYyLjE5MTU5di41ODU3N2MwIDIuNTY5MjktMi42ODc4NyA0LjY1MTk1LTYuMDAzMzggNC42NTE5NWgtMTIuMDA4NTVjLTMuMzE1NDkgMC02LjAwMzM4LTIuMDgyNjYtNi4wMDMzOC00LjY1MTk1di02LjYwNDczYy0yNC45MDUzOC02LjQwMjA5LTQ5Ljg3Mjk0LTE0LjQ4NTA2LTcwLjg1OTQ1LTMzLjgyMTFMODEuOTQ4MTkgMjQ3LjU4OWMyMi40Njc2MSAyMi4wNTA5IDUwLjI3ODkzIDI4LjkzMjkxIDc5LjcxNDQxIDM2LjE4ODYgMjcuMTc4NTIgNi42OTg1NiA1NS4xODA1MSAxMy42NTE0NCA3OC42ODU1NyAzMy40NDIyMmwxNC42NzkwNy05LjU0MzM0Yy0xOC41MzE0Mi0xNi41MDQzMS00MC40MDk2Mi0yMy42ODc3OC02My42NzUwNi0yOS42OTMyem0tOTguMDM3NTYgMjIuOTY2MzlsMzguOTA4MjkgMjUuMjk1MjVjMjAuMDY0MzggNS4xMTMzNiA0MC4yMDAyOSAxMS4yNDc3MyA1OC4zMTEgMjMuMzYwNDRsMTQuOTAwMjMtOS42ODdjLTE5Ljc1MTgtMTMuNjcyNC00Mi41NTA1LTE5LjMxMzQtNjYuNDE4ODktMjUuMTk3LTE1LjI4NzA0LTMuNzY3NzktMzAuODM0NzktNy42MTY2LTQ1LjcwMDYzLTEzLjc3MTY5em03NC4wMjIxOS04Mi4yNTQxM2ExMjQuMzE5OSAxMjQuMzE5OSAwIDAgMS0yMS41MzM5Mi0xMi42MjAwNmwtMTQuODA1MzEgOS42MjUyMWExMjQuNTQwNTcgMTI0LjU0MDU3IDAgMCAwIDM2LjMzOTIzIDE4LjcwOHptNTEuNDEwMDYgMTYuMjk0MTJjLTkuMTA2Mi0yLjI0NDc0LTE4LjMwMzYyLTQuNTIzODgtMjcuMzk0NjktNy4yOTg1M3YxMy42ODIwOXE1LjA1MSAxLjI4NTMgMTAuMTc2NzIgMi41MzgxN2MyOS45MzQzOCA3LjM3ODE4IDYwLjg4NzkgMTUuMDA4ODUgODUuNzA3NjcgMzkuODI4NjEuNjA5NzkuNjA5NzkgMS4xNjI2MSAxLjIzOTg5IDEuNzUyIDEuODU3MTVsOS45NzQyNy02LjQ4NDQ1YTEwLjEwNDI1IDEwLjEwNDI1IDAgMCAwIDMuNDc1MjktMy43OTkyOGMtMS4wNjY0NC0xLjE3MjUyLTIuMTQ0LTIuMzQxMzItMy4yODg3NS0zLjQ4NjEyLTIyLjU4NTEzLTIyLjU4NTMtNTAuNjY5MzgtMjkuNTA4NTYtODAuNDAyNTEtMzYuODM3NjR6bS0xOS45MzI5NSAxOS45MzI5OHEtMy43MjIxNy0uOTE3NDctNy40NjE2OC0xLjg1NDg0djEzLjIwOTc0YzI1LjgxNjc2IDYuNTYxODEgNTEuODAyNjMgMTQuNjg4NDMgNzMuNDU1MSAzNS4wNDA2OWwxNC41MjExNC05LjQ0MDU1Yy0uMDM4NTQtLjAzODc1LS4wNzI1Ni0uMDc5MTYtLjExMTMxLS4xMTc5Mi0yMi41ODU0Ni0yMi41ODUyNC01MC42Njk3NS0yOS41MDg0OC04MC40MDMyNS0zNi44MzcxMnptLTMxLjQ3NzExLTguNTg2ODFjLTE2LjI4LTUuMjc4MTMtMzIuMTE3NzctMTIuMzk2ODItNDYuMzQ0LTI0LjEzMDgxbC0xNC42ODE3NiA5LjU0NTFjMTcuODcwMjMgMTUuNTU3MjcgMzguNzg0NCAyMi42NzI2NiA2MS4wMjU3MiAyOC41MDA2OHoiIGNsYXNzPSJjbHMtMyIvPjxwYXRoIGQ9Ik03My4yNDA0OSAyNTQuOTU5NzJjLS4zNDgtLjM0OC0uNjU4NS0uNzA5NDktLjk5OTY3LTEuMDU5NzZsLTEyLjUxNDk1IDguMTM2NDhhMTAuMTY1NDggMTAuMTY1NDggMCAwIDAtMS42NDQyOCAxLjM5NjhjMS4wNTMzNiAxLjE1Njc3IDIuMTE1NjEgMi4zMTAyNCAzLjI0NTQ0IDMuNDQgMjIuNTg1MiAyMi41ODUxOSA1MC42Njk2OCAyOS41MDgzOCA4MC40MDMyMiAzNi44MzY4OCAyNS4zNDI1IDYuMjQ2OTEgNTEuNDAxMTMgMTIuNzE2NjEgNzMuODY0NTQgMjkuNjAyNTNsMTQuODA1NzQtOS42MjU2MmMtMjAuODY0MjQtMTYuNDE5OTMtNDUuNTMwMjEtMjIuNTA4OTEtNzEuNDUyODctMjguODk4LTI5LjkzMzg1LTcuMzc4ODgtNjAuODg3MzgtMTUuMDA5NDQtODUuNzA3MTctMzkuODI5MzF6IiBjbGFzcz0iY2xzLTMiLz48cGF0aCBkPSJNMjE4Ljg2Mzc3IDIwOS45NjE4bC0yNy41MTE1OS0xNy44ODZ2OC40NzU5YTIxNS44OCAyMTUuODggMCAwIDAgMjcuNTExNTkgOS40MTAxem0tMjcuNTExNTkgNS44Mjk4OXYxMS44OTkzOGM5LjA5MTA4IDIuNzc0NzEgMTguMjg4NDkgNS4wNTM4OCAyNy4zOTQ2OSA3LjI5ODUzIDI5LjczMzExIDcuMzI5MDkgNTcuODE3MzggMTQuMjUyMzIgODAuNDAyNjEgMzYuODM3NzMgMS4xNDQ3NCAxLjE0NDc0IDIuMjIyMzIgMi4zMTM1NCAzLjI4ODc1IDMuNDg2MTFhMTAuMTkzMjcgMTAuMTkzMjcgMCAwIDAtMy40NzUzLTEzLjI3NzExbC00NC42ODMxLTI5LjA0OTc2Yy0xMC44NDQzNy0zLjU4MTIxLTIxLjg5NzY4LTYuMzE2NTYtMzIuODE3OTQtOS4wMDgzOC0xMC4yOTY1Ni0yLjUzNzk5LTIwLjM3MTEzLTUuMDcxNDUtMzAuMTA5NzEtOC4xODY1em0tMjQuMDE1MzctOS43NTk2OWExMTAuOTkyOTIgMTEwLjk5MjkyIDAgMCAxLTExLjMxNTcxLTYuNTk5NjlsLTEwLjIxODIxIDYuNjQzMmExMjQuMzE5MzIgMTI0LjMxOTMyIDAgMCAwIDIxLjUzMzkyIDEyLjYyMDA3em0zNC4xOTIxMiAzNy44Nzk0MXEtNS4xMjUyOC0xLjI2MzUyLTEwLjE3NjczLTIuNTM4MTZ2MTEuNjk0NnEzLjczNjg2LjkzOCA3LjQ2MTY4IDEuODU0ODVjMjkuNzMzNTIgNy4zMjg2MyA1Ny44MTc4IDE0LjI1MTg3IDgwLjQwMzE4IDM2LjgzNzA5LjAzODc2LjAzODc2LjA3Mjc3LjA3OTE2LjExMTMyLjExNzkybDkuNjYwMjMtNi4yODA1MWMtLjU4OTQ1LS42MTcyNi0xLjE0MjI1LTEuMjQ3MzMtMS43NTItMS44NTcxNS0yNC44MTk3OC0yNC44MTk3OS01NS43NzMzLTMyLjQ1MDQ4LTg1LjcwNzY4LTM5LjgyODY0em0tMzQuMTkyMTItOS41MDI3MmExMjQuNTQwNTcgMTI0LjU0MDU3IDAgMCAxLTM2LjMzOTIzLTE4LjcwOGwtMTAuMDA0NzMgNi41MDQzNmMxNC4yMjYxMiAxMS43MzQgMzAuMDYzOTMgMTguODUyNjggNDYuMzQ0IDI0LjEzMDh6bTAgMjUuODQyMDNjLTIyLjI0MTMyLTUuODI4LTQzLjE1NTUtMTIuOTQzNDEtNjEuMDI1NzItMjguNTAwNmwtOS44MzM4IDYuMzkzMTVjMjAuOTg2NTIgMTkuMzM2IDQ1Ljk1NDA3IDI3LjQxODkzIDcwLjg1OTQ3IDMzLjgyMTF6bTI0LjAxNTM3IDE3LjczMjU2YzIzLjI2NTQ2IDYuMDA1MzkgNDUuMTQzNjcgMTMuMTg4ODYgNjMuNjc1MDYgMjkuNjkzMTJsOS43OC02LjM1ODIzYy0yMS42NTI0OS0yMC4zNTIyNS00Ny42MzgzNS0yOC40Nzg5My03My40NTUwOS0zNS4wNDA2OHpNODEuOTQ4MTMgMjQ3LjU4OWwtOS43MDcyOSA2LjMxMWMuMzQxMTcuMzUwMzIuNjUxNjYuNzExNzguOTk5NjcgMS4wNTk3NiAyNC44MTk3NyAyNC44MTk3OSA1NS43NzMyOSAzMi40NTA0MyA4NS43MDcwNiAzOS44MjkyNSAyNS45MjI2NiA2LjM4OTA5IDUwLjU4ODYzIDEyLjQ3ODA3IDcxLjQ1Mjg4IDI4Ljg5OGw5Ljk0NzcyLTYuNDY3MjRjLTIzLjUwNTA2LTE5Ljc5MDc4LTUxLjUwNy0yNi43NDM2NS03OC42ODU1Ny0zMy40NDIyMi0yOS40MzU0OC03LjI1NTY5LTU3LjI0NjgtMTQuMTM3Ny03OS43MTQ0Ny0zNi4xODg1NXpNNjEuMzI3IDI2Ni44NzMyMWMtMS4xMjk4My0xLjEyOTgzLTIuMTkyMDktMi4yODMyOC0zLjI0NTQ1LTMuNDRhMTAuMTU0NCAxMC4xNTQ0IDAgMCAwIDEuNjQ0MjggMTUuNjc5NTdsMzMuNTg4NyAyMS44MzY5NGMxNC44NjU4MyA2LjE1NTA5IDMwLjQxMzU5IDEwLjAwMzkgNDUuNzAwNTggMTMuNzcxNjYgMjMuODY4NCA1Ljg4MzU3IDQ2LjY2NzA4IDExLjUyNDY0IDY2LjQxODkgMjUuMTk3bDEwLjE2MDYtNi42MDU3Yy0yMi40NjMzMi0xNi44ODU4Ny00OC41MjItMjMuMzU1NjItNzMuODY0NDctMjkuNjAyNTMtMjkuNzMzNDMtNy4zMjg1MS01Ny44MTc5MS0xNC4yNTE3NS04MC40MDMxNC0zNi44MzY5NHptMTA5LjMwMDI0IDg0LjMzOTQ4YzIuMjM1NCAxLjA4NjEgNC40NDcxOCAyLjIyOTE5IDYuNjIyNjkgMy40NjAzNmExMC4xNjAxMiAxMC4xNjAxMiAwIDAgMCA3LjY0NTQzLTEuNDAybDUuNjM4NTgtMy42NjU3N2MtMTguMTEwNjUtMTIuMTEyNjYtMzguMjQ2NTMtMTguMjQ3LTU4LjMxMDk1LTIzLjM2MDQ0eiIgY2xhc3M9ImNscy0xIi8+PC9zdmc+ + longDescription: Flux is a tool for keeping Kubernetes clusters in sync with sources + of configuration (like Git repositories and OCI artifacts), and automating updates + to configuration when there is new code to deploy. It's constructed with the GitOps + Toolkit, a set of composable APIs and specialized tools for building continuous + deployment on top of Kubernetes. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Flux is a continuous deployment solution for Kubernetes powered + by the GitOps Toolkit. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-flux + for community support. diff --git a/repo/packages/gitops-configurer.packages.kadras.io/0.1.0.yml b/repo/packages/gitops-configurer.packages.kadras.io/0.1.0.yml new file mode 100644 index 0000000..4baffa4 --- /dev/null +++ b/repo/packages/gitops-configurer.packages.kadras.io/0.1.0.yml @@ -0,0 +1,79 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: gitops-configurer.packages.kadras.io.0.1.0 +spec: + licenses: + - Apache 2.0 + refName: gitops-configurer.packages.kadras.io + releaseNotes: https://github.com/kadras-io/gitops-configurer/releases + releasedAt: "2024-03-11T17:43:26Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/gitops-configurer@sha256:e60a1a8e9cb7f856acc9078f3cdbc9354ab6b18328de9b64155ccd37cb75c224 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + git: + additionalProperties: false + description: Configuration for synchronizing changes from Git. + properties: + branch: + default: main + description: The Git branch to check out and synchronize. + type: string + path: + default: "" + description: The path within the Git repository containing the manifests + to reconcile with the cluster. + type: string + secret_name: + default: "" + description: The name of the Secret in the same namespace holding the + credentials to access the Git server. The credentials should provide + read-only access to the Git server. + type: string + url: + default: "" + description: The URL of the Git repository to synchronize in the cluster. + type: string + type: object + name: + default: gitops-configurer + description: The name of the GitOps resource. + type: string + namespace: + default: kadras-system + description: The namespace where the GitOps resource should be installed. + type: string + service_account: + default: "" + description: The `ServiceAccount` used by the GitOps controller to reconcile + changes to the cluster. + type: string + sync_period: + default: 1m0s + description: 'The interval at which the GitOps controller should synchronize + changes from Git. The format is a Go duration string. Example: `1m0s`.' + type: string + type: + default: carvel-app + description: 'The type of GitOps controller to use. Options: `carvel-app`, + `flux-kustomization`.' + type: string + type: object + version: 0.1.0 diff --git a/repo/packages/gitops-configurer.packages.kadras.io/metadata.yml b/repo/packages/gitops-configurer.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..4503402 --- /dev/null +++ b/repo/packages/gitops-configurer.packages.kadras.io/metadata.yml @@ -0,0 +1,16 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: gitops-configurer.packages.kadras.io +spec: + categories: + - gitops + displayName: gitops-configurer + longDescription: Simplify onboarding of GitOps workflows based on Carvel or Flux. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Simplify onboarding of GitOps workflows. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/gitops-configurer + for community support. diff --git a/repo/packages/knative-eventing.packages.kadras.io/1.7.2.yml b/repo/packages/knative-eventing.packages.kadras.io/1.7.2.yml deleted file mode 100644 index 7c16a0d..0000000 --- a/repo/packages/knative-eventing.packages.kadras.io/1.7.2.yml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: Package -metadata: - creationTimestamp: null - name: knative-eventing.packages.kadras.io.1.7.2 -spec: - refName: knative-eventing.packages.kadras.io - releasedAt: "2022-09-24T22:30:10Z" - template: - spec: - deploy: - - kapp: {} - fetch: - - imgpkgBundle: - image: ghcr.io/arktonix/package-for-knative-eventing@sha256:f44a70521d587f13bf24292cd869579e2a50609b6c03f87c087f7c43fe2e33f0 - template: - - ytt: - paths: - - config - - kbld: - paths: - - '-' - - .imgpkg/images.yml - valuesSchema: - openAPIv3: - additionalProperties: false - properties: - default_broker: - additionalProperties: false - description: Configuration for the default in-memory broker - properties: - enabled: - default: false - description: Whether to install the default in-memory broker - type: boolean - namespace: - default: default - description: The namespace where to install the default broker - type: string - type: object - type: object - version: 1.7.2 diff --git a/repo/packages/knative-eventing.packages.kadras.io/metadata.yml b/repo/packages/knative-eventing.packages.kadras.io/metadata.yml deleted file mode 100644 index 77a31d5..0000000 --- a/repo/packages/knative-eventing.packages.kadras.io/metadata.yml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: PackageMetadata -metadata: - creationTimestamp: null - name: knative-eventing.packages.kadras.io -spec: - categories: - - eventing - - cloudevents - displayName: knative-eventing - longDescription: Knative Eventing provides tools for routing events from event producers - to sinks, enabling developers to use an event-driven architecture with their applications. - maintainers: - - name: Thomas Vitale - providerName: Arktonix - shortDescription: Toolkit to build event-driven architectures on Kubernetes. diff --git a/repo/packages/knative-serving.packages.kadras.io/1.19.5.yml b/repo/packages/knative-serving.packages.kadras.io/1.19.5.yml new file mode 100644 index 0000000..4ccf79f --- /dev/null +++ b/repo/packages/knative-serving.packages.kadras.io/1.19.5.yml @@ -0,0 +1,310 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: knative-serving.packages.kadras.io.1.19.5 +spec: + capacityRequirementsDescription: For prototyping purposes, one-node cluster that + has at least 3 CPUs and 4 GB of memory. For production purposes, if you have only + one node, at least 6 CPUs, 6 GB of memory, and 30 GB of disk storage. If you have + multiple nodes, for each node at least 2 CPUs, 4 GB of memory, and 20 GB of disk + storage. + licenses: + - Apache 2.0 + refName: knative-serving.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-knative-serving/releases + releasedAt: "2025-09-15T14:59:32Z" + template: + spec: + deploy: + - kapp: + rawOptions: + - --wait-timeout=5m + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-knative-serving@sha256:80e7b2444be3b3d078a29a2d2e581e85ed0ea2e5b15108f049d1880775ed2633 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + ca_cert_data: + default: "" + description: PEM-encoded certificate data to trust TLS connections with + a custom CA. + type: string + config: + additionalProperties: false + description: Settings for the Knative Serving ConfigMaps. + properties: + deployment: + additionalProperties: false + description: Deployment configuration stored in the `config-deployment` + ConfigMap. + properties: + progress-deadline: + default: 600s + description: The duration to wait for the deployment to be ready + before considering it failed. + type: string + queue-sidecar-cpu-limit: + default: 1000m + description: The queue proxy's CPU limit. If omitted, a default + value (currently `1000m`), is used when `queueproxy.resource-defaults` + is set to `Enabled`. + type: string + queue-sidecar-cpu-request: + default: 25m + description: The queue proxy's CPU request. If omitted, a default + value (currently '25m'), is used. + type: string + queue-sidecar-memory-limit: + default: 200Mi + description: The queue proxy's memory limit. If omitted, a default + value (currently `800Mi`), is used when `queueproxy.resource-defaults` + is set to `Enabled`. + type: string + queue-sidecar-memory-request: + default: 50Mi + description: The queue proxy's memory request. If omitted, a default + value (currently `400Mi`), is used when `queueproxy.resource-defaults` + is set to `Enabled`. + type: string + type: object + network: + additionalProperties: false + description: Network configuration stored in the `config-network` ConfigMap. + properties: + default-external-scheme: + default: http + description: Defines the scheme used for external URLs if autoTLS + is not enabled. This can be used for making Knative report all + URLs as `https`, for example, if you're fronting Knative with + an external loadbalancer that deals with TLS termination and Knative + doesn't know about that otherwise. + enum: + - http + - https + type: string + domain-template: + default: '{{.Name}}.{{.Namespace}}.{{.Domain}}' + description: The golang text template string to use when constructing + the Knative Service's DNS name. + type: string + http-protocol: + default: Redirected + description: 'Controls the behavior of the HTTP endpoint for the + Knative ingress. `Enabled`: The Knative ingress will be able to + serve HTTP connection. `Redirected`: The Knative ingress will + send a 301 redirect for all http connections, asking the clients + to use HTTPS.' + enum: + - Enabled + - Redirected + type: string + namespace-wildcard-cert-selector: + default: "" + description: A LabelSelector which determines which namespaces should + have a wildcard certificate provisioned. + type: string + rollout-duration: + default: 0 + description: The minimal duration in seconds over which the Configuration + traffic targets are rolled out to the newest revision. + minimum: 0 + type: integer + type: object + tracing: + additionalProperties: false + description: Network configuration stored in the `config-tracing` ConfigMap. + properties: + backend: + default: none + description: The type of distributed tracing backend. + enum: + - zipkin + - none + type: string + debug: + default: "false" + description: Enable the Zipkin debug mode. This allows all spans + to be sent to the server bypassing sampling. + enum: + - "true" + - "false" + type: string + sample-rate: + default: "0.1" + description: The percentage (0-1) of requests to trace. + maxLength: 3 + minLength: 1 + type: string + zipkin-endpoint: + default: http://tempo.observability-system.svc.cluster.local:9411/api/v2/spans + description: The Zipkin collector endpoint where traces are sent. + type: string + type: object + type: object + domain_name: + default: "" + description: Domain name for Knative Services. It must be a valid DNS name. + Stored in the `config-domain` ConfigMap. + minLength: 4 + type: string + ingress: + additionalProperties: false + description: Settings for the Ingress controller. + properties: + contour: + additionalProperties: false + description: Ingress configuration stored in the `config-contour` ConfigMap. + properties: + default-tls-secret: + default: "" + description: If auto-TLS is disabled, fallback to this certificate. + An operator is required to setup a TLSCertificateDelegation for + this Secret to be used. + type: string + external: + additionalProperties: false + description: Configuration for the external Ingress controller + properties: + namespace: + default: projectcontour + description: The namespace where the external Ingress controller + is installed. + minLength: 1 + type: string + type: object + internal: + additionalProperties: false + description: Configuration for the internal Ingress controller + properties: + namespace: + default: projectcontour + description: The namespace where the internal Ingress controller + is installed. + minLength: 1 + type: string + type: object + type: object + type: object + ingress_issuer: + default: "" + description: A reference to the ClusterIssuer to use if you want to enable + autoTLS. Stored in the `config-certmanager` ConfigMap. + example: kadras-ca-issuer + type: string + x-example-description: Kadras private CA + min_kubernetes_version: + default: "" + description: The minimum Kubernetes version that this package will accept + as valid. If not set, Knative Serving will accept the last 3 minor versions + of Kubernetes. + type: string + policies: + additionalProperties: false + description: Settings for the Kyverno policies. + properties: + include: + default: false + description: Whether to include the out-of-the-box Kyverno policies + to validate and secure the package installation. + type: boolean + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use a proxy. + type: string + type: object + workloads: + additionalProperties: false + description: Settings for the Knative Serving workloads. + properties: + activator: + additionalProperties: false + properties: + minReplicas: + default: 1 + description: The minimum number of replicas as controlled by a HorizontalPodAutoscaler. + In order to enable high availability, it should be greater than + 1. + maximum: 20 + minimum: 1 + type: integer + type: object + autoscaler: + additionalProperties: false + properties: + replicas: + default: 1 + description: The number of replicas for this Deployment. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + controller: + additionalProperties: false + properties: + replicas: + default: 1 + description: The number of replicas for this Deployment. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + domain_mapping: + additionalProperties: false + properties: + replicas: + default: 1 + description: The number of replicas for this Deployment. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + domain_mapping_webhook: + additionalProperties: false + properties: + replicas: + default: 1 + description: The number of replicas for this Deployment. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + webhook: + additionalProperties: false + properties: + minReplicas: + default: 1 + description: The minimum number of replicas as controlled by a HorizontalPodAutoscaler. + In order to enable high availability, it should be greater than + 1. + maximum: 5 + minimum: 1 + type: integer + type: object + type: object + type: object + version: 1.19.5 diff --git a/repo/packages/knative-serving.packages.kadras.io/1.7.1.yml b/repo/packages/knative-serving.packages.kadras.io/1.7.1.yml deleted file mode 100644 index a779aab..0000000 --- a/repo/packages/knative-serving.packages.kadras.io/1.7.1.yml +++ /dev/null @@ -1,122 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: Package -metadata: - creationTimestamp: null - name: knative-serving.packages.kadras.io.1.7.1 -spec: - licenses: - - Apache 2.0 - refName: knative-serving.packages.kadras.io - releaseNotes: https://github.com/knative/serving/releases - releasedAt: "2022-09-25T09:11:21Z" - template: - spec: - deploy: - - kapp: {} - fetch: - - imgpkgBundle: - image: ghcr.io/arktonix/package-for-knative-serving@sha256:dd95399d9bd8add0ca45f4e4a54b8174a300c2c19804a9f56fc08233eff67eef - template: - - ytt: - paths: - - config - - kbld: - paths: - - '-' - - .imgpkg/images.yml - valuesSchema: - openAPIv3: - additionalProperties: false - properties: - domain: - additionalProperties: false - description: DNS configuration - properties: - name: - default: "" - description: Your own domain name if type real or empty if type sslip.io - or nip.io - type: string - type: - default: nip.io - description: Type of DNS configuration - type: string - url_template: - default: '{{.Name}}.{{.Namespace}}.{{.Domain}}' - description: The domain template to use when creating new services - type: string - type: object - ingress: - additionalProperties: false - description: Ingress configuration - properties: - external: - additionalProperties: false - description: Configuration for the external Ingress controller - properties: - namespace: - default: projectcontour - description: The namespace where the external Ingress controller - is installed - type: string - type: object - internal: - additionalProperties: false - description: Configuration for the internale Ingress controller - properties: - namespace: - default: projectcontour - description: The namespace where the internal Ingress controller - is installed - type: string - type: object - type: object - namespace: - default: knative-serving - description: The namespace where to install Knative Serving - type: string - scaling: - additionalProperties: false - description: Configuration for the Knative autoscaler - properties: - allow_zero_initial_scale: - default: "true" - description: Whether either the initial_scale config or the 'autoscaling.knative.dev/initial-scale' - annotation can be set to 0 - type: string - initial_scale: - default: "1" - description: The initial target scale of a revision after creation - type: string - max_scale: - default: "0" - description: The maximum scale of a revision. If set to 0, the revision - has no maximum scale. - type: string - min_scale: - default: "0" - description: The minimum scale of a revision - type: string - scale_down_delay: - default: 0s - description: The amount of time that must pass at reduced concurrency - before a scale down decision is applied. If 0s, no delay. - type: string - type: object - tls: - additionalProperties: false - description: Configuration for automatic TLS certificates - properties: - certmanager: - additionalProperties: false - description: Configuration for integrating with cert-manager for certificate - issuing - properties: - clusterissuer: - default: "" - description: Provide a cluster issuer if you want to enable auto-TLS - type: string - type: object - type: object - type: object - version: 1.7.1 diff --git a/repo/packages/knative-serving.packages.kadras.io/metadata.yml b/repo/packages/knative-serving.packages.kadras.io/metadata.yml index 42139d3..26e208c 100644 --- a/repo/packages/knative-serving.packages.kadras.io/metadata.yml +++ b/repo/packages/knative-serving.packages.kadras.io/metadata.yml @@ -8,9 +8,12 @@ spec: - serverless - deployment displayName: knative-serving - longDescription: Knative Serving builds on Kubernetes to support deploying and serving - of applications and functions as serverless containers + iconSVGBase64: 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 + longDescription: Knative Serving builds on Kubernetes to define and control the + deployment of applications and functions as serverless containers. maintainers: - name: Thomas Vitale - providerName: Arktonix - shortDescription: Serverless platform on Kubernetes + providerName: Kadras + shortDescription: Solution for running serverless deployments on Kubernetes. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-knative-serving + for community support. diff --git a/repo/packages/kpack.packages.kadras.io/0.6.1.yml b/repo/packages/kpack.packages.kadras.io/0.6.1.yml deleted file mode 100644 index a432073..0000000 --- a/repo/packages/kpack.packages.kadras.io/0.6.1.yml +++ /dev/null @@ -1,65 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: Package -metadata: - name: kpack.packages.kadras.io.0.6.1 -spec: - refName: kpack.packages.kadras.io - version: 0.6.1 - capacityRequirementsDescription: Registry with > 1GB available space - releaseNotes: https://github.com/pivotal/kpack/releases/tag/v0.6.1 - valuesSchema: - openAPIv3: - title: kpack.packages.kadras.io values schema - properties: - kp_default_repository: - type: string - description: docker repository - examples: - - registry.io/kpack - kp_default_repository_secret: - type: object - description: Secret reference for kp_default_repository credentials. Mutually exclusive with kp_default_repository_username/password. Requires Carvel secretgen-controller. - properties: - name: - description: Secret name for kp_default_repository credentials of type kubernetes.io/dockerconfigjson. - type: string - namespace: - description: Secret namespace for kp_default_repository credentials. - type: string - kp_default_repository_username: - type: string - description: registry username - examples: - - janedoe@vmware.com - kp_default_repository_password: - type: string - description: registry password - examples: - - password - http_proxy: - type: string - description: the HTTP proxy to use for network traffic - https_proxy: - type: string - description: the HTTPS proxy to use for network traffic. - no_proxy: - type: string - description: A comma-separated list of hostnames, IP addresses, or IP ranges in CIDR format that should not use a proxy - ca_cert_data: - type: string - description: CA Certificate to be injected into the kpack controller trust store for communicating with self signed registries. - template: - spec: - fetch: - - imgpkgBundle: - image: projects.registry.vmware.com/kpack/release@sha256:3965faeb09836e625f8d5a857ad6d31585dd331ea0307423b5ac75180bffb0d7 - template: - - ytt: - paths: - - config/ - - kbld: - paths: - - '-' - - .imgpkg/images.yml - deploy: - - kapp: {} diff --git a/repo/packages/kpack.packages.kadras.io/metadata.yml b/repo/packages/kpack.packages.kadras.io/metadata.yml deleted file mode 100644 index cfcff14..0000000 --- a/repo/packages/kpack.packages.kadras.io/metadata.yml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: PackageMetadata -metadata: - name: kpack.packages.kadras.io -spec: - displayName: "kpack" - longDescription: "kpack extends Kubernetes and utilizes unprivileged Kubernetes primitives to provide builds of OCI images as a platform implementation of Cloud Native Buildpacks (CNB)." - shortDescription: "kpack builds application source code into OCI compliant images using Cloud Native Buildpacks" - supportDescription: "Go to https://github.com/vmware-tanzu/package-for-kpack and https://github.com/pivotal/kpack for documentation or the #kpack channel on Kubernetes slack" - providerName: "VMware" - categories: - - "build" - maintainers: - - name: "Matthew McNew" - - name: "Tom Kennedy" - - name: "Tyler Phelan" - - name: "Nicholas Carlson" - - name: "Viraj Patel" - - name: "Matt Gibson" - - name: "Malini Valliath" diff --git a/repo/packages/kyverno.packages.kadras.io/1.15.1.yml b/repo/packages/kyverno.packages.kadras.io/1.15.1.yml new file mode 100644 index 0000000..762815c --- /dev/null +++ b/repo/packages/kyverno.packages.kadras.io/1.15.1.yml @@ -0,0 +1,182 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: kyverno.packages.kadras.io.1.15.1 +spec: + licenses: + - Apache 2.0 + refName: kyverno.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-kyverno/releases + releasedAt: "2025-09-15T14:32:28Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-kyverno@sha256:069b230b662c880274eafe7566be3a1824806858d044f2f3ce19d999a837674f + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + admission_controller: + additionalProperties: false + description: Settings for the Admission Controller component. + properties: + replicas: + default: 1 + description: The number of replicas for the Admission Controller. In + order to enable high availability, it should be at least 3 (2 is not + permitted). + minimum: 1 + type: integer + type: object + background_controller: + additionalProperties: false + description: Settings for the Background Controller component. + properties: + replicas: + default: 1 + description: The number of replicas for the Background Controller. In + order to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + ca_cert_data: + default: "" + description: PEM-encoded certificate data to trust TLS connections with + a custom CA. + type: string + cleanup_controller: + additionalProperties: false + description: Settings for the Cleanup Controller component. + properties: + replicas: + default: 1 + description: The number of replicas for the Cleanup Controller. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + logging: + additionalProperties: false + description: Settings for logging. + properties: + encoding: + default: text + description: 'Log encoding format. Options: `text`, `json`.' + enum: + - text + - json + type: string + level: + default: 2 + description: Number of the log level verbosity (from `1` to `6`). + maximum: 6 + minimum: 1 + type: integer + type: object + metrics: + additionalProperties: false + description: Settings for metrics via Prometheus or OpenTelemetry. + properties: + collector: + default: "" + description: The endpoint where the OpenTelemetry-based collector receives + telemetry data. + type: string + type: + default: prometheus + description: Whether to use OpenTelemetry (`grpc`) or Prometheus (`prometheus`) + for exporting metrics. + enum: + - grpc + - prometheus + type: string + type: object + optional_components: + additionalProperties: false + description: Settings for which Kyverno optional components to deploy. + properties: + background_controller: + default: true + description: Whether to deploy the Background Controller, responsible + for processing of generate and mutate-existing rules. + type: boolean + cleanup_controller: + default: true + description: Whether to deploy the Cleanup Controller, responsible for + processing `CleanupPolicy` resources. + type: boolean + reports_controller: + default: true + description: Whether to deploy the Reports Controller, responsible for + handling `PolicyReport` resources. + type: boolean + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use the proxy. + type: string + type: object + reports_controller: + additionalProperties: false + description: Settings for the Reports Controller component. + properties: + replicas: + default: 1 + description: The number of replicas for the Reports Controller. In order + to enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + tracing: + additionalProperties: false + description: Settings for tracing via OpenTelemetry. + properties: + ca_cert_secret: + default: "" + description: The Secret containing the certificate which is used by + the Opentelemetry Tracing Client. If empty string is set, an insecure + connection will be used. + type: string + enabled: + default: false + description: Whether to configure Kyverno to export OpenTelemetry traces + to a distributed tracing backend. + type: boolean + endpoint: + default: "" + description: The endpoint where the distributed tracing backend accepts + OpenTelemetry traces. + type: string + port: + default: 4317 + description: The port exposed by the distributed tracing backend to + accept OpenTelemetry traces. + type: integer + type: object + type: object + version: 1.15.1 diff --git a/repo/packages/kyverno.packages.kadras.io/metadata.yml b/repo/packages/kyverno.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..7ef45e8 --- /dev/null +++ b/repo/packages/kyverno.packages.kadras.io/metadata.yml @@ -0,0 +1,19 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: kyverno.packages.kadras.io +spec: + categories: + - policy-management + - policies + displayName: kyverno + iconSVGBase64: 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 + longDescription: Kyverno is a policy engine designed for Kubernetes. It can validate, + mutate, and generate configurations using admission controls and background scans. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: A Kubernetes-native policy engine. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-kyverno + for community support. diff --git a/repo/packages/metrics-server.packages.kadras.io/0.6.1.yml b/repo/packages/metrics-server.packages.kadras.io/0.8.0.yml similarity index 86% rename from repo/packages/metrics-server.packages.kadras.io/0.6.1.yml rename to repo/packages/metrics-server.packages.kadras.io/0.8.0.yml index ccd121e..10b6dd8 100644 --- a/repo/packages/metrics-server.packages.kadras.io/0.6.1.yml +++ b/repo/packages/metrics-server.packages.kadras.io/0.8.0.yml @@ -1,143 +1,148 @@ apiVersion: data.packaging.carvel.dev/v1alpha1 kind: Package metadata: - name: metrics-server.packages.kadras.io.0.6.1 + creationTimestamp: null + name: metrics-server.packages.kadras.io.0.8.0 spec: + licenses: + - Apache 2.0 + refName: metrics-server.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-metrics-server/releases + releasedAt: "2025-08-14T17:45:10Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-metrics-server@sha256:907424062bd661d214af87933d935b36b2a8d4a7d36d640c26a1dda0c0aeb271 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml valuesSchema: openAPIv3: - type: object additionalProperties: false - description: OpenAPIv3 Schema for metrics-server properties: - namespace: - type: string - description: The namespace in which metrics-server is deployed - default: kube-system - nodeSelector: - nullable: true - description: NodeSelector configuration applied to all the deployments - default: null - deployment: - type: object + daemonset: additionalProperties: false properties: updateStrategy: - type: string - nullable: true - description: Update strategy of deployments default: null + description: Update strategy of daemonsets + nullable: true + type: string + type: object + deployment: + additionalProperties: false + properties: rollingUpdate: - type: object additionalProperties: false properties: - maxUnavailable: - type: integer - nullable: true - description: The maxUnavailable of rollingUpdate. Applied only if RollingUpdate is used as updateStrategy - default: null maxSurge: - type: integer + default: null + description: The maxSurge of rollingUpdate. Applied only if RollingUpdate + is used as updateStrategy nullable: true - description: The maxSurge of rollingUpdate. Applied only if RollingUpdate is used as updateStrategy + type: integer + maxUnavailable: default: null - daemonset: - type: object - additionalProperties: false - properties: + description: The maxUnavailable of rollingUpdate. Applied only if + RollingUpdate is used as updateStrategy + nullable: true + type: integer + type: object updateStrategy: - type: string - nullable: true - description: Update strategy of daemonsets default: null - metricsServer: + description: Update strategy of deployments + nullable: true + type: string type: object + metricsServer: additionalProperties: false properties: - namespace: - type: string - nullable: true - description: The namespace value used by older templates, will be overwriten if top level namespace is present, kept for backward compatibility - default: null - createNamespace: - type: boolean - description: Whether to create namespace specified for metrics-server - default: true config: - type: object additionalProperties: false properties: - securePort: - type: integer - description: The HTTPS secure port used by metrics-server - default: 4443 - updateStrategy: - type: string - description: The update strategy of the metrics-server deployment - default: RollingUpdate + apiServiceInsecureTLS: + default: true + description: Whether to enable insecure TLS for metrics-server api + service + type: boolean args: - type: array + default: [] description: Arguments passed into metrics-server container items: - type: string default: "" - default: [] + type: string + type: array probe: - type: object additionalProperties: false properties: failureThreshold: - type: integer - description: Probe failureThreshold of metrics-server deployment default: 3 - periodSeconds: + description: Probe failureThreshold of metrics-server deployment type: integer - description: Probe period of metrics-server deployment + periodSeconds: default: 10 - apiServiceInsecureTLS: - type: boolean - description: Whether to enable insecure TLS for metrics-server api service - default: true + description: Probe period of metrics-server deployment + type: integer + type: object + securePort: + default: 4443 + description: The HTTPS secure port used by metrics-server + type: integer tolerations: - nullable: true - description: Metrics-server deployment tolerations default: [] - image: + description: Metrics-server deployment tolerations + nullable: true + updateStrategy: + default: RollingUpdate + description: The update strategy of the metrics-server deployment + type: string type: object + createNamespace: + default: true + description: Whether to create namespace specified for metrics-server + type: boolean + image: additionalProperties: false properties: - repository: - type: string - description: The repository of metrics-server image - default: "" name: - type: string + default: "" description: The path of image + type: string + pullPolicy: + default: IfNotPresent + description: The pull policy of image + type: string + repository: default: "" - tag: + description: The repository of metrics-server image type: string - description: The image tag + tag: default: "" - pullPolicy: + description: The image tag type: string - description: The pull policy of image - default: IfNotPresent - refName: metrics-server.packages.kadras.io - version: 0.6.1 - releaseNotes: metrics-server 0.6.1 https://github.com/kubernetes-sigs/metrics-server/releases/tag/v0.6.1 - licenses: - - Apache 2.0 - template: - spec: - fetch: - - imgpkgBundle: - image: projects.registry.vmware.com/tce/metrics-server@sha256:55f29f8ba79933204c49642b1c9b745e1d60af3221d16b7772f4ba1b7ad60725 - template: - - ytt: - paths: - - config/ - - kbld: - paths: - - '-' - - .imgpkg/images.yml - deploy: - - kapp: {} + type: object + namespace: + default: null + description: The namespace value used by older templates, will be overwriten + if top level namespace is present, kept for backward compatibility + nullable: true + type: string + type: object + namespace: + default: kube-system + description: The namespace in which metrics-server is deployed + type: string + nodeSelector: + default: null + description: NodeSelector configuration applied to all the deployments + nullable: true + type: object + version: 0.8.0 diff --git a/repo/packages/metrics-server.packages.kadras.io/metadata.yml b/repo/packages/metrics-server.packages.kadras.io/metadata.yml index 93de629..bea30f4 100644 --- a/repo/packages/metrics-server.packages.kadras.io/metadata.yml +++ b/repo/packages/metrics-server.packages.kadras.io/metadata.yml @@ -1,16 +1,21 @@ apiVersion: data.packaging.carvel.dev/v1alpha1 kind: PackageMetadata metadata: + creationTimestamp: null name: metrics-server.packages.kadras.io spec: - displayName: "metrics-server" - longDescription: "Metrics Server is a scalable, efficient source of container resource metrics for Kubernetes built-in autoscaling pipelines." - shortDescription: "Metrics Server is a scalable, efficient source of container resource metrics for Kubernetes built-in autoscaling pipelines." - providerName: VMware - maintainers: - - name: Guanpeng Gao categories: - - "observability" - - "metrics-server" - - "cluster" - - "metrics" + - monitoring + - metrics + - observability + displayName: metrics-server + iconSVGBase64: <svg xmlns="http://www.w3.org/2000/svg" role="img" viewBox="-0.17 0.08 230.10 223.35"><defs><style>.cls-1{fill:#fff}.cls-2{fill:#326ce5}</style></defs><path d="M134.358 126.466a3.59 3.59 0 0 0-.855-.065 3.685 3.685 0 0 0-1.425.37 3.725 3.725 0 0 0-1.803 4.825l-.026.037 8.528 20.603a43.53 43.53 0 0 0 17.595-22.102l-21.976-3.714zm-34.194 2.92a3.72 3.72 0 0 0-3.568-2.894 3.656 3.656 0 0 0-.733.065l-.037-.045-21.785 3.698a43.695 43.695 0 0 0 17.54 21.946l8.442-20.4-.066-.08a3.683 3.683 0 0 0 .207-2.29zm18.245 8a3.718 3.718 0 0 0-6.557.008h-.018l-10.713 19.372a43.637 43.637 0 0 0 23.815 1.225q2.197-.5 4.292-1.2l-10.738-19.406zm33.914-45l-16.483 14.753.009.047a3.725 3.725 0 0 0 1.46 6.395l.02.089 21.35 6.15a44.278 44.278 0 0 0-6.356-27.432zM121.7 94.039a3.725 3.725 0 0 0 5.913 2.84l.065.027 18.036-12.788a43.85 43.85 0 0 0-25.287-12.19l1.253 22.105zm-19.1 2.921a3.72 3.72 0 0 0 5.904-2.85l.092-.043 1.253-22.14a44.682 44.682 0 0 0-4.501.776 43.467 43.467 0 0 0-20.937 11.409l18.154 12.869zm-9.678 16.729a3.72 3.72 0 0 0 1.462-6.396l.018-.088-16.574-14.824a43.454 43.454 0 0 0-6.168 27.51l21.245-6.13zm16.098 6.512l6.114 2.94 6.096-2.934 1.514-6.581-4.219-5.276h-6.79l-4.231 5.268z" class="cls-2"/><path d="M216.208 133.167l-17.422-75.675a13.602 13.602 0 0 0-7.293-9.073l-70.521-33.67a13.589 13.589 0 0 0-11.705 0L38.76 48.437a13.598 13.598 0 0 0-7.295 9.072l-17.394 75.673a13.315 13.315 0 0 0-.004 5.81 13.506 13.506 0 0 0 .491 1.718 13.1 13.1 0 0 0 1.343 2.726c.239.365.491.72.765 1.064l48.804 60.678c.213.264.448.505.681.75a13.423 13.423 0 0 0 2.574 2.133 13.924 13.924 0 0 0 3.857 1.677 13.298 13.298 0 0 0 3.43.473h.759l77.504-.018a12.993 12.993 0 0 0 1.41-.083 13.47 13.47 0 0 0 1.989-.378 13.872 13.872 0 0 0 1.381-.442c.353-.135.705-.27 1.045-.433a13.941 13.941 0 0 0 1.479-.822 13.303 13.303 0 0 0 3.237-2.865l1.488-1.85 47.299-58.84a13.185 13.185 0 0 0 2.108-3.785 13.67 13.67 0 0 0 .5-1.724 13.282 13.282 0 0 0-.004-5.81zm-73.147 29.432a14.516 14.516 0 0 0 .703 1.703 3.314 3.314 0 0 0-.327 2.49 39.372 39.372 0 0 0 3.742 6.7 35.06 35.06 0 0 1 2.263 3.364c.17.315.392.803.553 1.136a4.24 4.24 0 1 1-7.63 3.607c-.161-.33-.385-.77-.522-1.082a35.275 35.275 0 0 1-1.225-3.868 39.305 39.305 0 0 0-2.896-7.097 3.335 3.335 0 0 0-2.154-1.307c-.135-.233-.635-1.15-.903-1.623a54.617 54.617 0 0 1-38.948-.1l-.955 1.73a3.429 3.429 0 0 0-1.819.887 29.517 29.517 0 0 0-3.268 7.582 34.9 34.9 0 0 1-1.218 3.868c-.135.31-.361.744-.522 1.073v.009l-.007.008a4.238 4.238 0 1 1-7.619-3.616c.159-.335.372-.82.54-1.135a35.177 35.177 0 0 1 2.262-3.373 41.228 41.228 0 0 0 3.82-6.866 4.188 4.188 0 0 0-.376-2.387l.768-1.84a54.922 54.922 0 0 1-24.338-30.387l-1.839.313a4.68 4.68 0 0 0-2.428-.855 39.524 39.524 0 0 0-7.356 2.165 35.589 35.589 0 0 1-3.787 1.45c-.305.084-.745.168-1.093.244-.028.01-.052.022-.08.029a.605.605 0 0 1-.065.006 4.236 4.236 0 1 1-1.874-8.224l.061-.015.037-.01c.353-.083.805-.2 1.127-.262a35.27 35.27 0 0 1 4.05-.326 39.388 39.388 0 0 0 7.564-1.242 5.835 5.835 0 0 0 1.814-1.83l1.767-.516a54.613 54.613 0 0 1 8.613-38.073l-1.353-1.206a4.688 4.688 0 0 0-.848-2.436 39.366 39.366 0 0 0-6.277-4.41 35.25 35.25 0 0 1-3.499-2.046c-.256-.191-.596-.478-.874-.704l-.063-.044a4.473 4.473 0 0 1-1.038-6.222 4.066 4.066 0 0 1 3.363-1.488 5.03 5.03 0 0 1 2.942 1.11c.287.225.68.526.935.745a35.253 35.253 0 0 1 2.78 2.95 39.383 39.383 0 0 0 5.69 5.142 3.333 3.333 0 0 0 2.507.243q.754.55 1.522 1.082A54.289 54.289 0 0 1 102.86 61.89a55.052 55.052 0 0 1 7.63-1.173l.1-1.784a4.6 4.6 0 0 0 1.37-2.184 39.476 39.476 0 0 0-.47-7.654 35.466 35.466 0 0 1-.576-4.014c-.011-.307.006-.731.01-1.081 0-.04-.01-.08-.01-.118a4.242 4.242 0 1 1 8.441-.004c0 .37.022.86.009 1.2a35.109 35.109 0 0 1-.579 4.013 39.533 39.533 0 0 0-.478 7.656 3.344 3.344 0 0 0 1.379 2.11c.015.305.065 1.323.102 1.884a55.309 55.309 0 0 1 35.032 16.927l1.606-1.147a4.69 4.69 0 0 0 2.56-.278 39.532 39.532 0 0 0 5.69-5.148 35.004 35.004 0 0 1 2.787-2.95c.259-.222.65-.52.936-.746a4.242 4.242 0 1 1 5.258 6.598c-.283.229-.657.548-.929.75a35.095 35.095 0 0 1-3.507 2.046 39.495 39.495 0 0 0-6.277 4.41 3.337 3.337 0 0 0-.792 2.39c-.235.216-1.06.947-1.497 1.343a54.837 54.837 0 0 1 8.792 37.983l1.704.496a4.745 4.745 0 0 0 1.82 1.83 39.464 39.464 0 0 0 7.568 1.246 35.64 35.64 0 0 1 4.046.324c.355.065.868.207 1.23.29a4.236 4.236 0 1 1-1.878 8.223l-.061-.008c-.028-.007-.054-.022-.083-.03-.348-.075-.785-.151-1.09-.231a35.14 35.14 0 0 1-3.785-1.462 39.477 39.477 0 0 0-7.363-2.165 3.337 3.337 0 0 0-2.362.877q-.9-.171-1.804-.316a54.92 54.92 0 0 1-24.328 30.605z" class="cls-2"/><path d="M225.407 135.107L206.4 52.547a14.838 14.838 0 0 0-7.958-9.9l-76.935-36.73a14.825 14.825 0 0 0-12.771 0L31.808 42.669a14.838 14.838 0 0 0-7.961 9.895L4.873 135.129a14.668 14.668 0 0 0 1.995 11.185c.261.4.538.788.838 1.162l53.246 66.205a14.98 14.98 0 0 0 11.499 5.487l85.387-.02a14.986 14.986 0 0 0 11.5-5.48l53.227-66.211a14.72 14.72 0 0 0 2.842-12.347zm-9.197 3.866a13.677 13.677 0 0 1-.498 1.723 13.184 13.184 0 0 1-2.11 3.786l-47.299 58.838-1.486 1.852a13.305 13.305 0 0 1-3.24 2.865 13.945 13.945 0 0 1-1.474.822q-.513.237-1.045.43a13.873 13.873 0 0 1-1.383.445 13.473 13.473 0 0 1-1.989.379 12.988 12.988 0 0 1-1.41.082l-77.504.018h-.76a13.298 13.298 0 0 1-3.429-.472 13.925 13.925 0 0 1-3.855-1.679 13.424 13.424 0 0 1-2.576-2.132c-.233-.246-.468-.487-.68-.75l-48.805-60.679q-.408-.514-.765-1.066a13.102 13.102 0 0 1-1.343-2.726 13.505 13.505 0 0 1-.491-1.719 13.315 13.315 0 0 1 .004-5.809l17.394-75.675a13.598 13.598 0 0 1 7.295-9.07l70.508-33.685a13.589 13.589 0 0 1 11.705 0l70.519 33.67a13.602 13.602 0 0 1 7.293 9.073l17.422 75.674a13.282 13.282 0 0 1 .002 5.807z" class="cls-1"/><path d="M185.814 127.106c-.36-.083-.874-.225-1.227-.29a35.642 35.642 0 0 0-4.046-.326 39.464 39.464 0 0 1-7.57-1.242 4.745 4.745 0 0 1-1.82-1.832l-1.704-.496a54.837 54.837 0 0 0-8.79-37.983c.436-.396 1.262-1.127 1.495-1.342a3.338 3.338 0 0 1 .792-2.39 39.495 39.495 0 0 1 6.277-4.41 35.095 35.095 0 0 0 3.507-2.046c.272-.202.644-.522.929-.75a4.242 4.242 0 1 0-5.256-6.6c-.288.227-.68.525-.936.747a35.004 35.004 0 0 0-2.789 2.95 39.533 39.533 0 0 1-5.69 5.148 4.69 4.69 0 0 1-2.56.278l-1.606 1.147a55.309 55.309 0 0 0-35.032-16.927c-.039-.561-.087-1.577-.102-1.884a3.344 3.344 0 0 1-1.377-2.11 39.533 39.533 0 0 1 .478-7.656 35.112 35.112 0 0 0 .575-4.012c.013-.34-.007-.834-.007-1.201a4.242 4.242 0 1 0-8.441.004c0 .04.009.078.01.118-.004.35-.021.774-.01 1.08a35.476 35.476 0 0 0 .576 4.015 39.475 39.475 0 0 1 .47 7.654 4.601 4.601 0 0 1-1.37 2.182l-.1 1.786a55.052 55.052 0 0 0-7.63 1.173 54.289 54.289 0 0 0-27.574 15.754q-.77-.531-1.526-1.082a3.333 3.333 0 0 1-2.506-.243 39.383 39.383 0 0 1-5.69-5.141 35.255 35.255 0 0 0-2.777-2.95c-.257-.22-.65-.52-.938-.75a5.03 5.03 0 0 0-2.942-1.11 4.066 4.066 0 0 0-3.363 1.49 4.473 4.473 0 0 0 1.038 6.222l.065.046c.276.226.616.515.872.702a35.256 35.256 0 0 0 3.499 2.048 39.367 39.367 0 0 1 6.276 4.412 4.69 4.69 0 0 1 .849 2.434l1.351 1.208a54.613 54.613 0 0 0-8.611 38.073l-1.767.514a5.835 5.835 0 0 1-1.814 1.827 39.39 39.39 0 0 1-7.565 1.247 35.266 35.266 0 0 0-4.049.326c-.324.06-.774.174-1.127.262l-.037.008-.06.018a4.236 4.236 0 1 0 1.875 8.224l.063-.01c.028-.006.052-.02.08-.025.348-.08.786-.163 1.092-.246a35.59 35.59 0 0 0 3.786-1.451 39.527 39.527 0 0 1 7.358-2.165 4.68 4.68 0 0 1 2.426.857l1.84-.315a54.922 54.922 0 0 0 24.34 30.387l-.769 1.84a4.188 4.188 0 0 1 .377 2.387 41.228 41.228 0 0 1-3.82 6.864 35.183 35.183 0 0 0-2.263 3.372c-.168.318-.381.805-.542 1.138a4.238 4.238 0 1 0 7.621 3.616l.007-.008v-.01c.16-.33.387-.763.522-1.072a34.903 34.903 0 0 0 1.218-3.868 29.517 29.517 0 0 1 3.268-7.582 3.43 3.43 0 0 1 1.819-.888l.957-1.73a54.617 54.617 0 0 0 38.946.099c.268.478.768 1.392.9 1.623a3.335 3.335 0 0 1 2.155 1.31 39.306 39.306 0 0 1 2.898 7.096 35.275 35.275 0 0 0 1.225 3.868c.137.312.36.75.522 1.082a4.24 4.24 0 1 0 7.63-3.607c-.161-.333-.383-.82-.55-1.136a35.06 35.06 0 0 0-2.263-3.364 39.372 39.372 0 0 1-3.742-6.7 3.314 3.314 0 0 1 .324-2.49 14.519 14.519 0 0 1-.703-1.703 54.92 54.92 0 0 0 24.328-30.605c.546.087 1.497.253 1.806.316a3.337 3.337 0 0 1 2.36-.877 39.476 39.476 0 0 1 7.36 2.165 35.135 35.135 0 0 0 3.788 1.462c.305.08.74.156 1.09.233.029.008.055.02.083.028l.06.009a4.236 4.236 0 1 0 1.878-8.224zm-40.1-42.987l-18.037 12.787-.063-.03a3.723 3.723 0 0 1-5.913-2.838l-.02-.01-1.253-22.103a43.85 43.85 0 0 1 25.285 12.194zm-33.978 24.228h6.788l4.22 5.276-1.513 6.58-6.096 2.934-6.114-2.94-1.516-6.583zm-6.386-35.648a44.672 44.672 0 0 1 4.503-.774l-1.255 22.137-.092.044a3.72 3.72 0 0 1-5.904 2.852l-.035.02-18.154-12.872a43.467 43.467 0 0 1 20.937-11.407zm-27.52 19.68l16.574 14.824-.018.09a3.72 3.72 0 0 1-1.462 6.395l-.017.072-21.245 6.13a43.454 43.454 0 0 1 6.168-27.51zm22.191 39.38l-8.441 20.397a43.696 43.696 0 0 1-17.536-21.948l21.783-3.7.037.049a3.655 3.655 0 0 1 .73-.065 3.72 3.72 0 0 1 3.364 5.185zm24.916 26.23a43.637 43.637 0 0 1-23.815-1.223l10.713-19.372h.018a3.725 3.725 0 0 1 6.557-.006h.08l10.74 19.404q-2.091.698-4.293 1.199zm13.841-5.751l-8.528-20.605.026-.037a3.725 3.725 0 0 1 1.803-4.823 3.685 3.685 0 0 1 1.425-.37 3.59 3.59 0 0 1 .855.063l.037-.046 21.977 3.714a43.53 43.53 0 0 1-17.595 22.105zm19.903-32.42l-21.352-6.15-.02-.09a3.725 3.725 0 0 1-1.46-6.395l-.008-.043 16.482-14.751a44.279 44.279 0 0 1 6.357 27.43z" class="cls-1"/></svg> + longDescription: Metrics Server is a scalable and efficient source of container + resource metrics for Kubernetes built-in autoscaling pipelines. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Scalable and efficient source of container resource metrics for + Kubernetes built-in autoscaling pipelines. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-metrics-server + for community support. diff --git a/repo/packages/postgresql-operator.packages.kadras.io/1.27.0.yml b/repo/packages/postgresql-operator.packages.kadras.io/1.27.0.yml new file mode 100644 index 0000000..054ae8e --- /dev/null +++ b/repo/packages/postgresql-operator.packages.kadras.io/1.27.0.yml @@ -0,0 +1,31 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: postgresql-operator.packages.kadras.io.1.27.0 +spec: + licenses: + - Apache 2.0 + refName: postgresql-operator.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-postgresql-operator/releases + releasedAt: "2025-08-14T17:53:47Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-postgresql-operator@sha256:7ba0b9f3ab4414eecd25540f29d5176abd8290c2850c3c85115c78ea2d9b25b8 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + default: null + nullable: true + version: 1.27.0 diff --git a/repo/packages/postgresql-operator.packages.kadras.io/metadata.yml b/repo/packages/postgresql-operator.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..afa8ece --- /dev/null +++ b/repo/packages/postgresql-operator.packages.kadras.io/metadata.yml @@ -0,0 +1,19 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: postgresql-operator.packages.kadras.io +spec: + categories: + - database + displayName: postgresql-operator + longDescription: CloudNativePG is a Kubernetes operator that covers the full lifecycle + of a PostgreSQL database cluster with a primary/standby architecture, using native + streaming replication. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: CloudNativePG is a Kubernetes operator that covers the full lifecycle + of a PostgreSQL database cluster. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-postgresql-operator + for community support. diff --git a/repo/packages/rabbitmq-operator.packages.kadras.io/2.16.1.yml b/repo/packages/rabbitmq-operator.packages.kadras.io/2.16.1.yml new file mode 100644 index 0000000..1b18205 --- /dev/null +++ b/repo/packages/rabbitmq-operator.packages.kadras.io/2.16.1.yml @@ -0,0 +1,44 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: rabbitmq-operator.packages.kadras.io.2.16.1 +spec: + licenses: + - Apache 2.0 + refName: rabbitmq-operator.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-rabbitmq-operator/releases + releasedAt: "2025-09-15T15:15:32Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-rabbitmq-operator@sha256:d8066a1d87ead89aa1b8801f54fbf8a111313c56ab9bf0fec2611b5b0fe06534 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + logging: + additionalProperties: false + description: Logging configuration. + properties: + level: + default: info + description: The Operator log level. Valid options are `info` and `debug`. + enum: + - info + - debug + type: string + type: object + type: object + version: 2.16.1 diff --git a/repo/packages/rabbitmq-operator.packages.kadras.io/metadata.yml b/repo/packages/rabbitmq-operator.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..651112e --- /dev/null +++ b/repo/packages/rabbitmq-operator.packages.kadras.io/metadata.yml @@ -0,0 +1,20 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: rabbitmq-operator.packages.kadras.io +spec: + categories: + - eventing + - messaging + - streaming + displayName: rabbitmq-operator + longDescription: Operator for RabbitMQ, an open-source message broker supporting + multiple messaging protocols and streaming. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Operator for RabbitMQ, a message broker supporting multiple messaging + protocols and streaming. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-rabbitmq-operator + for community support. diff --git a/repo/packages/rbac-configurer.packages.kadras.io/0.2.1.yml b/repo/packages/rbac-configurer.packages.kadras.io/0.2.1.yml new file mode 100644 index 0000000..859b647 --- /dev/null +++ b/repo/packages/rbac-configurer.packages.kadras.io/0.2.1.yml @@ -0,0 +1,31 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: rbac-configurer.packages.kadras.io.0.2.1 +spec: + licenses: + - Apache 2.0 + refName: rbac-configurer.packages.kadras.io + releaseNotes: https://github.com/kadras-io/rbac-configurer/releases + releasedAt: "2023-09-08T16:07:10Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/rbac-configurer@sha256:3421d6fb80f732536d46401ef5e43e1e476b332f94660fb04d59ef4021df3f7d + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + default: null + nullable: true + version: 0.2.1 diff --git a/repo/packages/rbac-configurer.packages.kadras.io/metadata.yml b/repo/packages/rbac-configurer.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..76cf3f5 --- /dev/null +++ b/repo/packages/rbac-configurer.packages.kadras.io/metadata.yml @@ -0,0 +1,18 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: rbac-configurer.packages.kadras.io +spec: + categories: + - rbac + displayName: rbac-configurer + longDescription: Default roles and RBAC configuration for the Kadras Engineering + Platform, supporting users and service accounts. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Default roles and RBAC configuration for the Kadras Engineering + Platform. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/rbac-configurer + for community support. diff --git a/repo/packages/secretgen-controller.packages.kadras.io/0.11.0.yml b/repo/packages/secretgen-controller.packages.kadras.io/0.11.0.yml deleted file mode 100644 index a2a5c08..0000000 --- a/repo/packages/secretgen-controller.packages.kadras.io/0.11.0.yml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: data.packaging.carvel.dev/v1alpha1 -kind: Package -metadata: - name: secretgen-controller.packages.kadras.io.0.11.0 -spec: - refName: secretgen-controller.packages.kadras.io - version: 0.11.0 - releaseNotes: https://github.com/vmware-tanzu/carvel-secretgen-controller/releases/tag/v0.11.0 - valuesSchema: - openAPIv3: - type: object - additionalProperties: false - properties: - namespace: - type: string - description: The namespace in which to deploy secretgen-controller - default: secretgen-controller - create_namespace: - type: boolean - description: Whether to create namespace specified for secretgen-controller - default: true - deployment: - type: object - additionalProperties: false - description: Configuration for secretgen-controller deployment - properties: - updateStrategy: - type: string - description: Update strategy of deployments, empty uses default strategy - default: "" - rollingUpdate: - type: object - additionalProperties: false - properties: - maxUnavailable: - type: integer - description: The maxUnavailable of rollingUpdate. Applied only if RollingUpdate is used as updateStrategy - default: 1 - maxSurge: - type: integer - description: The maxSurge of rollingUpdate. Applied only if RollingUpdate is used as updateStrategy - default: 0 - nodeSelector: - nullable: true - description: NodeSelector configuration applied to all the deployments - default: null - licenses: - - Apache 2.0 - template: - spec: - fetch: - - imgpkgBundle: - image: ghcr.io/vmware-tanzu/carvel-secretgen-controller-package-bundle@sha256:0e3eb05734e6876275d4f8120a20fdb505dbc21266032f9fdb46b34aaa570e9e - template: - - ytt: - paths: - - config - - kbld: - paths: - - .imgpkg/images.yml - - '-' - deploy: - - kapp: {} diff --git a/repo/packages/secretgen-controller.packages.kadras.io/0.19.2.yml b/repo/packages/secretgen-controller.packages.kadras.io/0.19.2.yml new file mode 100644 index 0000000..b3dd67c --- /dev/null +++ b/repo/packages/secretgen-controller.packages.kadras.io/0.19.2.yml @@ -0,0 +1,35 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: secretgen-controller.packages.kadras.io.0.19.2 +spec: + licenses: + - Apache 2.0 + refName: secretgen-controller.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-secretgen-controller/releases + releasedAt: "2025-05-30T18:30:26Z" + template: + spec: + deploy: + - kapp: + rawOptions: + - --wait-timeout=5m + - --kube-api-qps=50 + - --kube-api-burst=100 + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-secretgen-controller@sha256:a75097ef7dc675acb9144cd6b7c76fccfb3d7aa57969cf3b0ec36a0f48fe35df + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + default: null + nullable: true + version: 0.19.2 diff --git a/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml b/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml index baa19af..f805679 100644 --- a/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml +++ b/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml @@ -1,13 +1,18 @@ apiVersion: data.packaging.carvel.dev/v1alpha1 kind: PackageMetadata metadata: + creationTimestamp: null name: secretgen-controller.packages.kadras.io spec: - displayName: "secretgen-controller" - longDescription: "Provide CRDs to specify what secrets need to be on cluster (generated or not)." - shortDescription: "Secret generation and sharing" - providerName: carvel.dev - maintainers: - - name: Carvel team (see www.carvel.dev for team members) categories: - - "package management" + - secrets management + displayName: secretgen-controller + iconSVGBase64: <?xml version="1.0" encoding="UTF-8"?><svg id="artwork" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 400 400"><defs><style>.cls-1{fill:none;}.cls-2{fill:#fff;}.cls-3{fill:#1e4488;}.cls-4{fill:#208fce;}.cls-5{fill:#17bed2;}.cls-6{fill:#727074;}.cls-7{fill:#794499;}</style></defs><circle class="cls-2" cx="226.38587" cy="198.95652" r="145.17574"/><path class="cls-1" d="M145.2919,319.37558c56.46741,38.03507,131.78503,31.69919,181.10465-15.23489-72.39742,18.75796-145.23924,17.48838-181.10465,15.23489Z"/><path class="cls-1" d="M336.96576,202.2257c10.66442-.31739,22.21754-.19043,34.56414-.8887v-2.38045c-.21411-80.19558-65.39904-145.03338-145.59462-144.81927-53.4453,.14269-102.49204,29.63276-127.68109,76.77012,29.64453,15.86967,77.66616,36.53197,153.99928,59.35256,15.1714,4.57047,68.74737,12.44181,84.7123,11.96574Z"/><path class="cls-1" d="M48.74082,72.12614s0,2.6661,.22217,7.49049c-.06349-2.47566-.15871-4.95133-.22217-7.49049Z"/><path class="cls-6" d="M226.38587,32.32501c-61.4245-.00398-117.86619,33.79761-146.8579,87.94971,5.20525,3.17393,11.33094,6.79222,18.59925,10.63267,37.59973-70.8353,125.50364-97.77807,196.33894-60.17836,47.44831,25.18579,77.11565,74.50911,77.12718,128.2275v2.38045c-.08839,6.11807-.56542,12.22431-1.42826,18.28186-.01569,.11585-.01569,.23329,0,.34913-1.15434,7.80906-2.92675,15.51419-5.30046,23.04277-.52901,1.7139-1.10029,3.39608-1.7139,5.04654-2.29618,6.37637-5.04325,12.5812-8.22048,18.56751-.38086,.73002-.76176,1.49175-1.17434,2.22174-3.60564,6.56655-7.72339,12.83863-12.31488,18.75796l-.57128,.69827c-46.8979,60.07252-132.26924,73.64266-195.48257,31.07281-11.14049-.69827-18.72621-1.49175-21.58276-1.84089v.15871l-1.0474-.25392h-.38088l-16.79011-4.15785-.79348-.44435c62.84646,67.20314,168.27249,70.73488,235.4756,7.88844,9.10782-8.51738,17.23056-18.03039,24.21563-28.3603,2.09481-3.17393,4.03091-6.34787,5.93524-9.5218,.09357-.19697,.19958-.38781,.31741-.57131,2.96481-5.14425,5.65585-10.44152,8.06177-15.86967,.38086-.85695,.79348-1.71393,1.17434-2.60262,2.53262-6.02321,4.7053-12.1915,6.50657-18.47229,.44435-1.55522,.92042-3.17393,1.33305-4.72915,2.06744-8.04579,3.52103-16.23692,4.34827-24.50277,.01559-.12648,.01559-.2544,0-.38088,.57443-5.51453,.86051-11.0553,.85698-16.59968h0c.08766-92.02801-74.44472-166.70249-166.47277-166.79015-.05289-.00005-.10582-.00007-.15875-.00007Z"/><path class="cls-6" d="M66.70527,219.71405c-.4126-1.80914-.85695-3.55481-1.26958-5.45917,.41263,1.84089,.85698,3.65003,1.26958,5.45917Z"/><path class="cls-6" d="M67.68921,223.99886c.34913,1.42826,.69827,2.79305,1.0474,4.15785-.73002-2.79305-1.36479-5.61785-2.03132-8.44268,.31739,1.42831,.6665,2.92004,.98391,4.28483Z"/><path class="cls-6" d="M65.43572,214.25488c-.76174-3.45958-1.5235-6.95092-2.22174-10.4105,.72999,3.58656,1.45998,7.04614,2.22174,10.4105Z"/><path class="cls-5" d="M282.78668,239.10679s-139.20873-21.10666-200.97348-52.90947c-6.35789-3.13345-12.35956-6.943-17.90098-11.36269l.76174,3.55481c2.28524,10.53746,5.07829,21.51927,8.44268,32.75499,1.58697,.60306,4.60219,1.71393,8.91875,3.17393,37.83328,13.48922,173.26503,58.59081,272.9583,52.24295,3.17723-5.98631,5.9243-12.19114,8.22048-18.56751,.5925-1.65046,1.16378-3.33262,1.7139-5.04654-27.44032,1.31656-54.94364,.03066-82.14137-3.84048Z"/><path class="cls-5" d="M49.50256,176.48509v-.69827l-22.21754,31.73934h0l10.60093,20.09101h0l18.12316-16.15531c-2.38043-10.53748-4.57045-22.15409-6.50655-34.97676Z"/><path class="cls-7" d="M200.3279,200.60698c-54.87734-15.86967-90.96495-31.32673-113.18249-42.78464-8.15701-4.18959-14.44141-7.83962-19.0436-10.75963-5.58613-3.49132-8.82353-5.90352-10.09311-6.88743v.47609c1.17436,8.69658,2.66609,17.9962,4.57047,27.80367,.4126,2.09481,.85695,4.25306,1.30132,6.34787,5.54143,4.41968,11.54309,8.22927,17.90098,11.36269,61.76475,31.73934,200.97348,52.90947,200.97348,52.90947,27.18427,3.90092,54.67689,5.21871,82.10965,3.93567,2.37372-7.52858,4.14613-15.2337,5.30046-23.04277-.01569-.11585-.01569-.23329,0-.34913-46.14897,5.84005-105.02546-.34913-169.83718-19.01186Z"/><path class="cls-7" d="M99.14288,268.8783l-4.57047-1.46001v.19043c8.23491,17.44835,17.96215,34.15248,29.07324,49.92596,2.85655,.34913,10.44222,1.14262,21.58276,1.84089,35.86546,2.25349,108.70723,3.52307,181.10465-15.23489,5.17852-4.92702,9.98436-10.23148,14.37792-15.86967l.57128-.69827c-81.08859,12.15191-163.87704,5.76019-242.13938-18.69444Z"/><path class="cls-7" d="M44.96383,139.31832l-30.59672,40.75331h0l12.69573,27.32757,22.21754-31.73934c-1.62927-10.79136-3.05756-22.42913-4.28481-34.91327,.06347-.3174,.03175-.88871-.03175-1.42827Z"/><path class="cls-7" d="M71.08531,264.18087l-7.39527,5.49092s13.74314,17.74228,15.04444,19.0436c2.47566,2.53916,4.7609,4.60219,6.79222,6.34787-5.63754-9.7819-10.42655-20.02887-14.31445-30.62847-.05269-.07904-.09534-.16432-.12694-.25392Z"/><path class="cls-3" d="M252.12647,190.25995c-76.33312-22.66188-124.3547-43.54637-153.87229-59.35256-7.26831-3.84046-13.394-7.42701-18.59925-10.63267-9.13455-5.26925-17.56945-11.66741-25.10583-19.0436,.50784,10.44224,1.5235,23.67754,3.55481,38.88069,1.26958,.98392,4.50698,3.39611,10.09311,6.88744,4.63394,2.92001,10.91834,6.57004,19.0436,10.75963,22.21754,11.4579,58.30515,26.97844,113.18249,42.78464,64.81172,18.66272,123.78341,24.85191,169.77373,19.0436,.86284-6.05755,1.33988-12.1638,1.42826-18.28186-12.18789,.69827-23.89972,.57131-34.56414,.8887-16.06015,.50782-69.63611-7.36353-84.9345-11.934Z"/><path class="cls-3" d="M82.03538,214.38184c-4.31655-1.5235-7.33178-2.63437-8.91875-3.17393v.53956c5.69004,19.08632,12.80921,37.71708,21.29709,55.73427l4.57047,1.46001c78.2799,24.47495,161.09121,30.87759,242.2029,18.72621,4.59149-5.91933,8.70924-12.19141,12.31488-18.75794,.41263-.73002,.79348-1.49175,1.17434-2.22174-99.37591,6.28438-234.80765-38.78547-272.64094-52.30644Z"/><path class="cls-3" d="M63.34091,203.84438c-1.0474-5.01482-2.06306-10.25182-3.17393-15.67924-6.40739-35.85691-10.15229-72.13884-11.20398-108.54854,0-4.82438-.22217-7.49049-.22217-7.49049l-7.61745,4.88787c.2539,8.95049,.60306,17.60475,1.0474,25.96278,0,1.23783,.15871,2.41218,.22217,3.65003L6.87662,162.55152l7.42702,17.74228,30.66021-40.88027c0,.53956,0,1.11087,.15871,1.65045,1.22725,12.44181,2.65553,24.07956,4.28481,34.91327v.69827c1.9361,12.69573,4.12612,24.43928,6.34787,34.91327l-17.80579,16.12359h0c.31739,.60306,7.68091,14.15574,12.69573,21.93189,5.01482,7.77615,12.28313,18.47229,13.33051,19.99579l7.39527-5.52264c-.01194,.09485-.01194,.19079,0,.28564,3.88789,10.5996,8.67691,20.84657,14.31445,30.62847,2.12728,3.71994,4.5471,7.26475,7.23657,10.60093,.24724,.28513,.53615,.53123,.85695,.73002l11.14051,6.34787,.79348,.44435s-20.66232-20.821-36.81763-85.02969c-2.22174-7.99833-4.03089-16.09187-5.55438-24.28062Z"/><path class="cls-4" d="M123.64565,317.53469c-11.10012-15.77465-20.81676-32.47875-29.0415-49.92599v-.19043c-8.48789-18.01719-15.60705-36.64795-21.29709-55.73427v-.53956c-3.36436-11.23573-6.15744-22.21754-8.44268-32.75499l-.76174-3.55481c-.44435-2.12653-.8887-4.28481-1.30132-6.34787-1.90436-9.80744-3.39611-19.0436-4.57047-27.80367v-.47609c-2.03132-15.20315-3.17393-28.5654-3.55481-38.88069-.76174-15.86967-.34913-25.1693-.34913-25.1693l-5.33221-3.99915c0,2.53914,0,5.01482,.22217,7.49049,0,1.39653,0,3.01524,.19043,4.72917,.8785,34.82328,4.47603,69.52472,10.75968,103.78765,.98391,5.42742,1.99957,10.66442,3.17393,15.67924,1.46001,7.1096,2.98351,13.8701,4.47526,20.15447,.34913,1.42826,.69827,2.79305,1.0474,4.15785,16.15531,64.20867,36.81763,85.02969,36.81763,85.02969l16.79011,4.15785h.4126l1.0474,.25392-.28567-.06349Z"/></svg> + longDescription: A cloud-native solution to generate and share Secrets, passwords, + keys, and certificates. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Secrets generation and sharing. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-secretgen-controller + for community support. diff --git a/repo/packages/service-binding.packages.kadras.io/1.0.0.yml b/repo/packages/service-binding.packages.kadras.io/1.0.0.yml new file mode 100644 index 0000000..7687f06 --- /dev/null +++ b/repo/packages/service-binding.packages.kadras.io/1.0.0.yml @@ -0,0 +1,31 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: service-binding.packages.kadras.io.1.0.0 +spec: + licenses: + - Apache 2.0 + refName: service-binding.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-service-binding/releases + releasedAt: "2024-07-29T20:35:04Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-service-binding@sha256:09ffb5fb4f9851305af3155be23d2831a25a9c3f41455333d6d14cb7f7badc0d + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + default: null + nullable: true + version: 1.0.0 diff --git a/repo/packages/service-binding.packages.kadras.io/metadata.yml b/repo/packages/service-binding.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..eeb4854 --- /dev/null +++ b/repo/packages/service-binding.packages.kadras.io/metadata.yml @@ -0,0 +1,23 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: service-binding.packages.kadras.io +spec: + categories: + - service-binding + displayName: service-binding + iconSVGBase64: <svg xmlns="http://www.w3.org/2000/svg" role="img" viewBox="-0.17 0.08 230.10 223.35"><defs><style>.cls-1{fill:#fff}.cls-2{fill:#326ce5}</style></defs><path d="M134.358 126.466a3.59 3.59 0 0 0-.855-.065 3.685 3.685 0 0 0-1.425.37 3.725 3.725 0 0 0-1.803 4.825l-.026.037 8.528 20.603a43.53 43.53 0 0 0 17.595-22.102l-21.976-3.714zm-34.194 2.92a3.72 3.72 0 0 0-3.568-2.894 3.656 3.656 0 0 0-.733.065l-.037-.045-21.785 3.698a43.695 43.695 0 0 0 17.54 21.946l8.442-20.4-.066-.08a3.683 3.683 0 0 0 .207-2.29zm18.245 8a3.718 3.718 0 0 0-6.557.008h-.018l-10.713 19.372a43.637 43.637 0 0 0 23.815 1.225q2.197-.5 4.292-1.2l-10.738-19.406zm33.914-45l-16.483 14.753.009.047a3.725 3.725 0 0 0 1.46 6.395l.02.089 21.35 6.15a44.278 44.278 0 0 0-6.356-27.432zM121.7 94.039a3.725 3.725 0 0 0 5.913 2.84l.065.027 18.036-12.788a43.85 43.85 0 0 0-25.287-12.19l1.253 22.105zm-19.1 2.921a3.72 3.72 0 0 0 5.904-2.85l.092-.043 1.253-22.14a44.682 44.682 0 0 0-4.501.776 43.467 43.467 0 0 0-20.937 11.409l18.154 12.869zm-9.678 16.729a3.72 3.72 0 0 0 1.462-6.396l.018-.088-16.574-14.824a43.454 43.454 0 0 0-6.168 27.51l21.245-6.13zm16.098 6.512l6.114 2.94 6.096-2.934 1.514-6.581-4.219-5.276h-6.79l-4.231 5.268z" class="cls-2"/><path d="M216.208 133.167l-17.422-75.675a13.602 13.602 0 0 0-7.293-9.073l-70.521-33.67a13.589 13.589 0 0 0-11.705 0L38.76 48.437a13.598 13.598 0 0 0-7.295 9.072l-17.394 75.673a13.315 13.315 0 0 0-.004 5.81 13.506 13.506 0 0 0 .491 1.718 13.1 13.1 0 0 0 1.343 2.726c.239.365.491.72.765 1.064l48.804 60.678c.213.264.448.505.681.75a13.423 13.423 0 0 0 2.574 2.133 13.924 13.924 0 0 0 3.857 1.677 13.298 13.298 0 0 0 3.43.473h.759l77.504-.018a12.993 12.993 0 0 0 1.41-.083 13.47 13.47 0 0 0 1.989-.378 13.872 13.872 0 0 0 1.381-.442c.353-.135.705-.27 1.045-.433a13.941 13.941 0 0 0 1.479-.822 13.303 13.303 0 0 0 3.237-2.865l1.488-1.85 47.299-58.84a13.185 13.185 0 0 0 2.108-3.785 13.67 13.67 0 0 0 .5-1.724 13.282 13.282 0 0 0-.004-5.81zm-73.147 29.432a14.516 14.516 0 0 0 .703 1.703 3.314 3.314 0 0 0-.327 2.49 39.372 39.372 0 0 0 3.742 6.7 35.06 35.06 0 0 1 2.263 3.364c.17.315.392.803.553 1.136a4.24 4.24 0 1 1-7.63 3.607c-.161-.33-.385-.77-.522-1.082a35.275 35.275 0 0 1-1.225-3.868 39.305 39.305 0 0 0-2.896-7.097 3.335 3.335 0 0 0-2.154-1.307c-.135-.233-.635-1.15-.903-1.623a54.617 54.617 0 0 1-38.948-.1l-.955 1.73a3.429 3.429 0 0 0-1.819.887 29.517 29.517 0 0 0-3.268 7.582 34.9 34.9 0 0 1-1.218 3.868c-.135.31-.361.744-.522 1.073v.009l-.007.008a4.238 4.238 0 1 1-7.619-3.616c.159-.335.372-.82.54-1.135a35.177 35.177 0 0 1 2.262-3.373 41.228 41.228 0 0 0 3.82-6.866 4.188 4.188 0 0 0-.376-2.387l.768-1.84a54.922 54.922 0 0 1-24.338-30.387l-1.839.313a4.68 4.68 0 0 0-2.428-.855 39.524 39.524 0 0 0-7.356 2.165 35.589 35.589 0 0 1-3.787 1.45c-.305.084-.745.168-1.093.244-.028.01-.052.022-.08.029a.605.605 0 0 1-.065.006 4.236 4.236 0 1 1-1.874-8.224l.061-.015.037-.01c.353-.083.805-.2 1.127-.262a35.27 35.27 0 0 1 4.05-.326 39.388 39.388 0 0 0 7.564-1.242 5.835 5.835 0 0 0 1.814-1.83l1.767-.516a54.613 54.613 0 0 1 8.613-38.073l-1.353-1.206a4.688 4.688 0 0 0-.848-2.436 39.366 39.366 0 0 0-6.277-4.41 35.25 35.25 0 0 1-3.499-2.046c-.256-.191-.596-.478-.874-.704l-.063-.044a4.473 4.473 0 0 1-1.038-6.222 4.066 4.066 0 0 1 3.363-1.488 5.03 5.03 0 0 1 2.942 1.11c.287.225.68.526.935.745a35.253 35.253 0 0 1 2.78 2.95 39.383 39.383 0 0 0 5.69 5.142 3.333 3.333 0 0 0 2.507.243q.754.55 1.522 1.082A54.289 54.289 0 0 1 102.86 61.89a55.052 55.052 0 0 1 7.63-1.173l.1-1.784a4.6 4.6 0 0 0 1.37-2.184 39.476 39.476 0 0 0-.47-7.654 35.466 35.466 0 0 1-.576-4.014c-.011-.307.006-.731.01-1.081 0-.04-.01-.08-.01-.118a4.242 4.242 0 1 1 8.441-.004c0 .37.022.86.009 1.2a35.109 35.109 0 0 1-.579 4.013 39.533 39.533 0 0 0-.478 7.656 3.344 3.344 0 0 0 1.379 2.11c.015.305.065 1.323.102 1.884a55.309 55.309 0 0 1 35.032 16.927l1.606-1.147a4.69 4.69 0 0 0 2.56-.278 39.532 39.532 0 0 0 5.69-5.148 35.004 35.004 0 0 1 2.787-2.95c.259-.222.65-.52.936-.746a4.242 4.242 0 1 1 5.258 6.598c-.283.229-.657.548-.929.75a35.095 35.095 0 0 1-3.507 2.046 39.495 39.495 0 0 0-6.277 4.41 3.337 3.337 0 0 0-.792 2.39c-.235.216-1.06.947-1.497 1.343a54.837 54.837 0 0 1 8.792 37.983l1.704.496a4.745 4.745 0 0 0 1.82 1.83 39.464 39.464 0 0 0 7.568 1.246 35.64 35.64 0 0 1 4.046.324c.355.065.868.207 1.23.29a4.236 4.236 0 1 1-1.878 8.223l-.061-.008c-.028-.007-.054-.022-.083-.03-.348-.075-.785-.151-1.09-.231a35.14 35.14 0 0 1-3.785-1.462 39.477 39.477 0 0 0-7.363-2.165 3.337 3.337 0 0 0-2.362.877q-.9-.171-1.804-.316a54.92 54.92 0 0 1-24.328 30.605z" class="cls-2"/><path d="M225.407 135.107L206.4 52.547a14.838 14.838 0 0 0-7.958-9.9l-76.935-36.73a14.825 14.825 0 0 0-12.771 0L31.808 42.669a14.838 14.838 0 0 0-7.961 9.895L4.873 135.129a14.668 14.668 0 0 0 1.995 11.185c.261.4.538.788.838 1.162l53.246 66.205a14.98 14.98 0 0 0 11.499 5.487l85.387-.02a14.986 14.986 0 0 0 11.5-5.48l53.227-66.211a14.72 14.72 0 0 0 2.842-12.347zm-9.197 3.866a13.677 13.677 0 0 1-.498 1.723 13.184 13.184 0 0 1-2.11 3.786l-47.299 58.838-1.486 1.852a13.305 13.305 0 0 1-3.24 2.865 13.945 13.945 0 0 1-1.474.822q-.513.237-1.045.43a13.873 13.873 0 0 1-1.383.445 13.473 13.473 0 0 1-1.989.379 12.988 12.988 0 0 1-1.41.082l-77.504.018h-.76a13.298 13.298 0 0 1-3.429-.472 13.925 13.925 0 0 1-3.855-1.679 13.424 13.424 0 0 1-2.576-2.132c-.233-.246-.468-.487-.68-.75l-48.805-60.679q-.408-.514-.765-1.066a13.102 13.102 0 0 1-1.343-2.726 13.505 13.505 0 0 1-.491-1.719 13.315 13.315 0 0 1 .004-5.809l17.394-75.675a13.598 13.598 0 0 1 7.295-9.07l70.508-33.685a13.589 13.589 0 0 1 11.705 0l70.519 33.67a13.602 13.602 0 0 1 7.293 9.073l17.422 75.674a13.282 13.282 0 0 1 .002 5.807z" class="cls-1"/><path d="M185.814 127.106c-.36-.083-.874-.225-1.227-.29a35.642 35.642 0 0 0-4.046-.326 39.464 39.464 0 0 1-7.57-1.242 4.745 4.745 0 0 1-1.82-1.832l-1.704-.496a54.837 54.837 0 0 0-8.79-37.983c.436-.396 1.262-1.127 1.495-1.342a3.338 3.338 0 0 1 .792-2.39 39.495 39.495 0 0 1 6.277-4.41 35.095 35.095 0 0 0 3.507-2.046c.272-.202.644-.522.929-.75a4.242 4.242 0 1 0-5.256-6.6c-.288.227-.68.525-.936.747a35.004 35.004 0 0 0-2.789 2.95 39.533 39.533 0 0 1-5.69 5.148 4.69 4.69 0 0 1-2.56.278l-1.606 1.147a55.309 55.309 0 0 0-35.032-16.927c-.039-.561-.087-1.577-.102-1.884a3.344 3.344 0 0 1-1.377-2.11 39.533 39.533 0 0 1 .478-7.656 35.112 35.112 0 0 0 .575-4.012c.013-.34-.007-.834-.007-1.201a4.242 4.242 0 1 0-8.441.004c0 .04.009.078.01.118-.004.35-.021.774-.01 1.08a35.476 35.476 0 0 0 .576 4.015 39.475 39.475 0 0 1 .47 7.654 4.601 4.601 0 0 1-1.37 2.182l-.1 1.786a55.052 55.052 0 0 0-7.63 1.173 54.289 54.289 0 0 0-27.574 15.754q-.77-.531-1.526-1.082a3.333 3.333 0 0 1-2.506-.243 39.383 39.383 0 0 1-5.69-5.141 35.255 35.255 0 0 0-2.777-2.95c-.257-.22-.65-.52-.938-.75a5.03 5.03 0 0 0-2.942-1.11 4.066 4.066 0 0 0-3.363 1.49 4.473 4.473 0 0 0 1.038 6.222l.065.046c.276.226.616.515.872.702a35.256 35.256 0 0 0 3.499 2.048 39.367 39.367 0 0 1 6.276 4.412 4.69 4.69 0 0 1 .849 2.434l1.351 1.208a54.613 54.613 0 0 0-8.611 38.073l-1.767.514a5.835 5.835 0 0 1-1.814 1.827 39.39 39.39 0 0 1-7.565 1.247 35.266 35.266 0 0 0-4.049.326c-.324.06-.774.174-1.127.262l-.037.008-.06.018a4.236 4.236 0 1 0 1.875 8.224l.063-.01c.028-.006.052-.02.08-.025.348-.08.786-.163 1.092-.246a35.59 35.59 0 0 0 3.786-1.451 39.527 39.527 0 0 1 7.358-2.165 4.68 4.68 0 0 1 2.426.857l1.84-.315a54.922 54.922 0 0 0 24.34 30.387l-.769 1.84a4.188 4.188 0 0 1 .377 2.387 41.228 41.228 0 0 1-3.82 6.864 35.183 35.183 0 0 0-2.263 3.372c-.168.318-.381.805-.542 1.138a4.238 4.238 0 1 0 7.621 3.616l.007-.008v-.01c.16-.33.387-.763.522-1.072a34.903 34.903 0 0 0 1.218-3.868 29.517 29.517 0 0 1 3.268-7.582 3.43 3.43 0 0 1 1.819-.888l.957-1.73a54.617 54.617 0 0 0 38.946.099c.268.478.768 1.392.9 1.623a3.335 3.335 0 0 1 2.155 1.31 39.306 39.306 0 0 1 2.898 7.096 35.275 35.275 0 0 0 1.225 3.868c.137.312.36.75.522 1.082a4.24 4.24 0 1 0 7.63-3.607c-.161-.333-.383-.82-.55-1.136a35.06 35.06 0 0 0-2.263-3.364 39.372 39.372 0 0 1-3.742-6.7 3.314 3.314 0 0 1 .324-2.49 14.519 14.519 0 0 1-.703-1.703 54.92 54.92 0 0 0 24.328-30.605c.546.087 1.497.253 1.806.316a3.337 3.337 0 0 1 2.36-.877 39.476 39.476 0 0 1 7.36 2.165 35.135 35.135 0 0 0 3.788 1.462c.305.08.74.156 1.09.233.029.008.055.02.083.028l.06.009a4.236 4.236 0 1 0 1.878-8.224zm-40.1-42.987l-18.037 12.787-.063-.03a3.723 3.723 0 0 1-5.913-2.838l-.02-.01-1.253-22.103a43.85 43.85 0 0 1 25.285 12.194zm-33.978 24.228h6.788l4.22 5.276-1.513 6.58-6.096 2.934-6.114-2.94-1.516-6.583zm-6.386-35.648a44.672 44.672 0 0 1 4.503-.774l-1.255 22.137-.092.044a3.72 3.72 0 0 1-5.904 2.852l-.035.02-18.154-12.872a43.467 43.467 0 0 1 20.937-11.407zm-27.52 19.68l16.574 14.824-.018.09a3.72 3.72 0 0 1-1.462 6.395l-.017.072-21.245 6.13a43.454 43.454 0 0 1 6.168-27.51zm22.191 39.38l-8.441 20.397a43.696 43.696 0 0 1-17.536-21.948l21.783-3.7.037.049a3.655 3.655 0 0 1 .73-.065 3.72 3.72 0 0 1 3.364 5.185zm24.916 26.23a43.637 43.637 0 0 1-23.815-1.223l10.713-19.372h.018a3.725 3.725 0 0 1 6.557-.006h.08l10.74 19.404q-2.091.698-4.293 1.199zm13.841-5.751l-8.528-20.605.026-.037a3.725 3.725 0 0 1 1.803-4.823 3.685 3.685 0 0 1 1.425-.37 3.59 3.59 0 0 1 .855.063l.037-.046 21.977 3.714a43.53 43.53 0 0 1-17.595 22.105zm19.903-32.42l-21.352-6.15-.02-.09a3.725 3.725 0 0 1-1.46-6.395l-.008-.043 16.482-14.751a44.279 44.279 0 0 1 6.357 27.43z" class="cls-1"/></svg> + longDescription: This project specifies a Kubernetes-wide specification for communicating + service secrets to workloads in an automated way. It aims to create a widely applicable + mechanism but without excluding other strategies for systems that it does not + fit easily. The benefit of Kubernetes-wide specification is that all of the actors + in an ecosystem can work towards a clearly defined abstraction at the edge of + their expertise and depend on other parties to complete the chain. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: A Kubernetes-wide specification for communicating service secrets + to workloads in an automated way. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-service-binding + for community support. diff --git a/repo/packages/tempo-operator.packages.kadras.io/0.17.1.yml b/repo/packages/tempo-operator.packages.kadras.io/0.17.1.yml new file mode 100644 index 0000000..3d610f9 --- /dev/null +++ b/repo/packages/tempo-operator.packages.kadras.io/0.17.1.yml @@ -0,0 +1,293 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: tempo-operator.packages.kadras.io.0.17.1 +spec: + licenses: + - Apache 2.0 + refName: tempo-operator.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-tempo-operator/releases + releasedAt: "2025-08-14T18:19:45Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-tempo-operator@sha256:3af49f0336f722e4e8cb9adbb0b48e0c821178e1fbf04cde0ce87621ccf62f57 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + configMapData: + default: {} + description: The YAML contents of the `tempo-operator-manager-config` ConfigMap. + See https://github.com/grafana/tempo-operator/blob/main/docs/operator/config.yaml + for more information. + nullable: true + controller: + additionalProperties: false + description: Settings for the Tempo Operator controller. + properties: + replicas: + default: 1 + description: The number of replicas for this Deployment. In order to + enable high availability, it should be greater than 1. + minimum: 1 + type: integer + type: object + tempo: + additionalProperties: false + description: Settings for Tempo. + properties: + extraConfig: + default: {} + description: Additional configuration for Tempo that will be merged + with the one generated by the Operator. It has higher precedence than + the Operator. + nullable: true + jaegerui: + additionalProperties: false + description: Settings for Jaeger UI. + properties: + enabled: + default: false + description: Whether to enable the Jaeger UI to visualize traces. + type: boolean + type: object + namespace: + default: default + description: Namespace where to provision a Tempo installation, stack + or monolithic. + type: string + observability: + additionalProperties: false + description: Settings for observability. + properties: + grafana: + additionalProperties: false + properties: + createDatasource: + default: false + description: Whether a Datasource managed by Grafana Operator + should be created for Tempo. + type: boolean + type: object + metrics: + additionalProperties: false + properties: + createPrometheusRules: + default: false + description: Whether PrometheusRules for alerts managed by Prometheus + Operator should be created for Tempo. + type: boolean + createServiceMonitors: + default: false + description: Whether ServiceMonitors managed by Prometheus Operator + should be created for Tempo. + type: boolean + type: object + tracing: + additionalProperties: false + properties: + otlpHttpEndpoint: + default: "" + description: The OTLP HTTP endpoint where to send traces. Only + for TempoStack. + type: string + samplingFraction: + default: "" + description: Sampling frequence for Tempo traces. Only for TempoStack. + type: string + type: object + type: object + resources: + additionalProperties: false + description: Settings for total resources. + properties: + limits: + additionalProperties: false + properties: + cpu: + default: 750m + type: string + memory: + default: 2Gi + type: string + type: object + requests: + additionalProperties: false + properties: + cpu: + default: 500m + type: string + memory: + default: 1Gi + type: string + type: object + type: object + storage: + additionalProperties: false + description: Settings for storage. + properties: + backend: + additionalProperties: false + description: Tracing backend object storage configuration. + properties: + secret: + additionalProperties: false + properties: + name: + default: "" + description: Name of the Secret containing the credentials + to access the configured object storage. + type: string + namespace: + default: kadras-system + description: Namespace containing the Secret with the credentials + to access the configured object storage. + type: string + type: object + type: + default: memory + description: 'Type of object storage that should be used. Valid + options: `azure`, `gcs`, `s3`, `memory` (only for TempoMonolithic).' + enum: + - azure + - gcs + - s3 + - memory + type: string + type: object + size: + default: 10Gi + description: The size of the storage used by Tempo. + type: string + type: object + tempoMonolithic: + additionalProperties: false + description: Settings for the built-in TempoMonolithic instance. + properties: + enabled: + default: false + description: Whether to deploy the built-in TempoMonolithic instance. + type: boolean + type: object + tempoStack: + additionalProperties: false + description: Settings for the built-in TempoStack instance. + properties: + compactor: + additionalProperties: false + description: Settings for the Tempo Compactor. + properties: + replicas: + default: 1 + description: Number of replicas to deploy for the Compactor + component. In order to enable high availability, it should + be greater than 1. + type: integer + type: object + distributor: + additionalProperties: false + description: Settings for the Tempo Distributor. + properties: + replicas: + default: 1 + description: Number of replicas to deploy for the Distributor + component. In order to enable high availability, it should + be greater than 1. + type: integer + type: object + enabled: + default: false + description: Whether to deploy the built-in TempoStack instance. + type: boolean + gateway: + additionalProperties: false + description: Settings for the Tempo Gateway. + properties: + enabled: + default: false + description: Whether to enable the Tempo Gateway. + type: boolean + ingress: + additionalProperties: false + description: Ingress for the Tempo Gateway. + properties: + annotations: + additionalProperties: false + description: The annotations for the Ingress object. + properties: {} + type: object + host: + default: "" + description: The hostname of the Ingress object. + type: string + ingressClassName: + default: contour + description: The class of the Ingress Controller to use + for the Tempo Gateway. + type: string + type: + default: null + description: 'Type of Ingress for the Tempo Gateway. Valid + options: `ingress`, `route`.' + enum: + - ingress + - route + nullable: true + type: string + type: object + type: object + ingester: + additionalProperties: false + description: Settings for the Tempo Ingester. + properties: + podSecurityContext: + additionalProperties: false + description: PodSecurityContext for the Ingester component. + properties: {} + type: object + replicas: + default: 1 + description: Number of replicas to deploy for the Ingester component. + In order to enable high availability, it should be greater + than 1. + type: integer + type: object + querier: + additionalProperties: false + description: Settings for the Tempo Querier. + properties: + replicas: + default: 1 + description: Number of replicas to deploy for the Querier component. + In order to enable high availability, it should be greater + than 1. + type: integer + type: object + queryFrontend: + additionalProperties: false + description: Settings for the Tempo Query Frontend. + properties: + replicas: + default: 1 + description: Number of replicas to deploy for the Query Frontend + component. In order to enable high availability, it should + be greater than 1. + type: integer + type: object + type: object + type: object + type: object + version: 0.17.1 diff --git a/repo/packages/tempo-operator.packages.kadras.io/metadata.yml b/repo/packages/tempo-operator.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..7f3f5d7 --- /dev/null +++ b/repo/packages/tempo-operator.packages.kadras.io/metadata.yml @@ -0,0 +1,21 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: tempo-operator.packages.kadras.io +spec: + categories: + - gitops + displayName: tempo-operator + longDescription: Tempo is an open source, easy-to-use, and high-scale distributed + tracing backend. It can ingest common open source tracing protocols including + Jaeger, Zipkin, and OpenTelemetry and requires only object storage to operate. + The Community Tempo Operator supports Tempo deployments in Microservices mode + (TempoStack CR) and Monolithic mode (TempoMonolithic CR). + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Open source, easy-to-use, and high-scale distributed tracing backend + with support for OpenTelemetry. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/package-for-tempo-operator + for community support. diff --git a/repo/packages/workspace-provisioner.packages.kadras.io/0.4.0.yml b/repo/packages/workspace-provisioner.packages.kadras.io/0.4.0.yml new file mode 100644 index 0000000..4cf6ff9 --- /dev/null +++ b/repo/packages/workspace-provisioner.packages.kadras.io/0.4.0.yml @@ -0,0 +1,115 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: workspace-provisioner.packages.kadras.io.0.4.0 +spec: + licenses: + - Apache 2.0 + refName: workspace-provisioner.packages.kadras.io + releaseNotes: https://github.com/kadras-io/workspace-provisioner/releases + releasedAt: "2025-08-14T17:24:09Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/workspace-provisioner@sha256:9efab8fd3c86a7e8cfd5f1cff17ab5a881a0d37b13af5e971f2e1b23ac6c2dde + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + cosign: + additionalProperties: false + description: Settings for Cosign, used for signing and verifying OCI artifacts. + properties: + secret: + additionalProperties: false + description: Configuration for the Secret holding the Cosign key pair. + properties: + name: + default: "" + description: The name of the Secret holding the Cosign key pair. + type: string + namespace: + default: "" + description: The namespace of the Secret holding the Cosign key + pair. + type: string + type: object + type: object + git: + additionalProperties: false + description: Configuration to access the Git repositories used in the GitOps + workflows. + properties: + secret: + additionalProperties: false + description: Configuration for the Secret holding the Git credentials. + properties: + name: + default: "" + description: The name of the Secret holding the Git credentials. + type: string + namespace: + default: "" + description: The namespace of the Secret holding the Git credentials. + type: string + type: object + server: + default: https://github.com + description: The Git server hosting the Git repositories used in the + GitOps workflows. + type: string + type: object + namespaces: + default: [] + description: Configuration for the namespaces the platform will provision + and manage. + items: + additionalProperties: false + description: Details about the namespace to configure. + properties: + name: + default: "" + type: string + type: object + type: array + oci: + additionalProperties: false + description: Settings for accessing the OCI registry that the workspace + will use. + properties: + pull_secret: + additionalProperties: false + description: Configuration for the Secret holding the credentials to + pull images from the OCI registry. + properties: + name: + default: "" + description: The name of the Secret holding the credentials to pull + images from the OCI registry. + type: string + namespace: + default: "" + description: The namespace of the Secret holding the credentials + to pull images from the OCI registry. + type: string + type: object + type: object + service_account: + default: supply-chain + description: The `ServiceAccount` to be configured with credentials and + roles in each workspace. + type: string + type: object + version: 0.4.0 diff --git a/repo/packages/workspace-provisioner.packages.kadras.io/metadata.yml b/repo/packages/workspace-provisioner.packages.kadras.io/metadata.yml new file mode 100644 index 0000000..91aeb81 --- /dev/null +++ b/repo/packages/workspace-provisioner.packages.kadras.io/metadata.yml @@ -0,0 +1,17 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: PackageMetadata +metadata: + creationTimestamp: null + name: workspace-provisioner.packages.kadras.io +spec: + categories: + - environment provisioning + displayName: workspace-provisioner + longDescription: Provisions and configures workspaces for the platform users, such + as application developers. A workspace can be a namespace or a virtual cluster. + maintainers: + - name: Thomas Vitale + providerName: Kadras + shortDescription: Provisions and configures workspaces for the platform users. + supportDescription: Go to https://kadras.io for documentation and https://github.com/kadras-io/workspace-provisioner + for community support. diff --git a/repo/pkgrepo-build.yml b/repo/pkgrepo-build.yml index c20d866..140bf1c 100644 --- a/repo/pkgrepo-build.yml +++ b/repo/pkgrepo-build.yml @@ -1,9 +1,9 @@ apiVersion: kctrl.carvel.dev/v1alpha1 kind: PackageRepositoryBuild metadata: - creationTimestamp: "2022-09-24T20:15:30Z" + creationTimestamp: "2023-01-12T21:36:30Z" name: repository.packages.kadras.io spec: export: imgpkgBundle: - image: ghcr.io/arktonix/kadras-packages + image: ghcr.io/kadras-io/kadras-packages