diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md new file mode 100644 index 0000000..dd84ea7 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/bug_report.md @@ -0,0 +1,38 @@ +--- +name: Bug report +about: Create a report to help us improve +title: '' +labels: '' +assignees: '' + +--- + +**Describe the bug** +A clear and concise description of what the bug is. + +**To Reproduce** +Steps to reproduce the behavior: +1. Go to '...' +2. Click on '....' +3. Scroll down to '....' +4. See error + +**Expected behavior** +A clear and concise description of what you expected to happen. + +**Screenshots** +If applicable, add screenshots to help explain your problem. + +**Desktop (please complete the following information):** + - OS: [e.g. iOS] + - Browser [e.g. chrome, safari] + - Version [e.g. 22] + +**Smartphone (please complete the following information):** + - Device: [e.g. iPhone6] + - OS: [e.g. iOS8.1] + - Browser [e.g. stock browser, safari] + - Version [e.g. 22] + +**Additional context** +Add any other context about the problem here. diff --git a/.github/ISSUE_TEMPLATE/feature_request.md b/.github/ISSUE_TEMPLATE/feature_request.md new file mode 100644 index 0000000..bbcbbe7 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/feature_request.md @@ -0,0 +1,20 @@ +--- +name: Feature request +about: Suggest an idea for this project +title: '' +labels: '' +assignees: '' + +--- + +**Is your feature request related to a problem? Please describe.** +A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] + +**Describe the solution you'd like** +A clear and concise description of what you want to happen. + +**Describe alternatives you've considered** +A clear and concise description of any alternative solutions or features you've considered. + +**Additional context** +Add any other context or screenshots about the feature request here. diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 4a6131b..de713d9 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -6,7 +6,7 @@ env: COSIGN_EXPERIMENTAL: 1 REGISTRY: ghcr.io IMAGE_NAME: ${{ github.repository }} - VERSION: 0.4.0 + VERSION: 0.5.0 jobs: build: diff --git a/CODE_OF_CONDUCT.md b/CODE_OF_CONDUCT.md new file mode 100644 index 0000000..39afb14 --- /dev/null +++ b/CODE_OF_CONDUCT.md @@ -0,0 +1,128 @@ +# Contributor Covenant Code of Conduct + +## Our Pledge + +We as members, contributors, and leaders pledge to make participation in our +community a harassment-free experience for everyone, regardless of age, body +size, visible or invisible disability, ethnicity, sex characteristics, gender +identity and expression, level of experience, education, socio-economic status, +nationality, personal appearance, race, religion, or sexual identity +and orientation. + +We pledge to act and interact in ways that contribute to an open, welcoming, +diverse, inclusive, and healthy community. + +## Our Standards + +Examples of behavior that contributes to a positive environment for our +community include: + +* Demonstrating empathy and kindness toward other people +* Being respectful of differing opinions, viewpoints, and experiences +* Giving and gracefully accepting constructive feedback +* Accepting responsibility and apologizing to those affected by our mistakes, + and learning from the experience +* Focusing on what is best not just for us as individuals, but for the + overall community + +Examples of unacceptable behavior include: + +* The use of sexualized language or imagery, and sexual attention or + advances of any kind +* Trolling, insulting or derogatory comments, and personal or political attacks +* Public or private harassment +* Publishing others' private information, such as a physical or email + address, without their explicit permission +* Other conduct which could reasonably be considered inappropriate in a + professional setting + +## Enforcement Responsibilities + +Community leaders are responsible for clarifying and enforcing our standards of +acceptable behavior and will take appropriate and fair corrective action in +response to any behavior that they deem inappropriate, threatening, offensive, +or harmful. + +Community leaders have the right and responsibility to remove, edit, or reject +comments, commits, code, wiki edits, issues, and other contributions that are +not aligned to this Code of Conduct, and will communicate reasons for moderation +decisions when appropriate. + +## Scope + +This Code of Conduct applies within all community spaces, and also applies when +an individual is officially representing the community in public spaces. +Examples of representing our community include using an official e-mail address, +posting via an official social media account, or acting as an appointed +representative at an online or offline event. + +## Enforcement + +Instances of abusive, harassing, or otherwise unacceptable behavior may be +reported to the community leaders responsible for enforcement at +community@arktonix.com. +All complaints will be reviewed and investigated promptly and fairly. + +All community leaders are obligated to respect the privacy and security of the +reporter of any incident. + +## Enforcement Guidelines + +Community leaders will follow these Community Impact Guidelines in determining +the consequences for any action they deem in violation of this Code of Conduct: + +### 1. Correction + +**Community Impact**: Use of inappropriate language or other behavior deemed +unprofessional or unwelcome in the community. + +**Consequence**: A private, written warning from community leaders, providing +clarity around the nature of the violation and an explanation of why the +behavior was inappropriate. A public apology may be requested. + +### 2. Warning + +**Community Impact**: A violation through a single incident or series +of actions. + +**Consequence**: A warning with consequences for continued behavior. No +interaction with the people involved, including unsolicited interaction with +those enforcing the Code of Conduct, for a specified period of time. This +includes avoiding interactions in community spaces as well as external channels +like social media. Violating these terms may lead to a temporary or +permanent ban. + +### 3. Temporary Ban + +**Community Impact**: A serious violation of community standards, including +sustained inappropriate behavior. + +**Consequence**: A temporary ban from any sort of interaction or public +communication with the community for a specified period of time. No public or +private interaction with the people involved, including unsolicited interaction +with those enforcing the Code of Conduct, is allowed during this period. +Violating these terms may lead to a permanent ban. + +### 4. Permanent Ban + +**Community Impact**: Demonstrating a pattern of violation of community +standards, including sustained inappropriate behavior, harassment of an +individual, or aggression toward or disparagement of classes of individuals. + +**Consequence**: A permanent ban from any sort of public interaction within +the community. + +## Attribution + +This Code of Conduct is adapted from the [Contributor Covenant][homepage], +version 2.0, available at +https://www.contributor-covenant.org/version/2/0/code_of_conduct.html. + +Community Impact Guidelines were inspired by [Mozilla's code of conduct +enforcement ladder](https://github.com/mozilla/diversity). + +[homepage]: https://www.contributor-covenant.org + +For answers to common questions about this code of conduct, see the FAQ at +https://www.contributor-covenant.org/faq. Translations are available at +https://www.contributor-covenant.org/translations. diff --git a/README.md b/README.md index 77289d2..58d4baa 100644 --- a/README.md +++ b/README.md @@ -29,68 +29,69 @@ This repository contains the following Carvel packages part of the [Kadras](http ## Prerequisites -* Install the [`kctrl`](https://carvel.dev/kapp-controller/docs/latest/install/#installing-kapp-controller-cli-kctrl) CLI to manage Carvel packages in a convenient way. -* Ensure [kapp-controller](https://carvel.dev/kapp-controller) is deployed in your Kubernetes cluster. You can do that with Carvel -[`kapp`](https://carvel.dev/kapp/docs/latest/install) (recommended choice) or `kubectl`. +* Kubernetes 1.24+ +* Carvel [`kctrl`](https://carvel.dev/kapp-controller/docs/latest/install/#installing-kapp-controller-cli-kctrl) CLI. +* Carvel [kapp-controller](https://carvel.dev/kapp-controller) deployed in your Kubernetes cluster. You can install it with Carvel [`kapp`](https://carvel.dev/kapp/docs/latest/install) (recommended choice) or `kubectl`. -```shell -kapp deploy -a kapp-controller -y \ - -f https://github.com/vmware-tanzu/carvel-kapp-controller/releases/latest/download/release.yml -``` + ```shell + kapp deploy -a kapp-controller -y \ + -f https://github.com/vmware-tanzu/carvel-kapp-controller/releases/latest/download/release.yml + ``` ## Installation You can install the Kadras package repository in a dedicated namespace using `kctrl`: -```shell -kubectl create namespace carvel-packages -kctrl package repository add -r kadras-repo \ - --url ghcr.io/arktonix/kadras-packages:0.4.0 \ - -n carvel-packages -``` + ```shell + kubectl create namespace kadras-packages + kctrl package repository add -r kadras-repo \ + --url ghcr.io/arktonix/kadras-packages:0.5.0 \ + -n kadras-packages + ``` -Alternatively, you can add the repository by applying the `PackageRepository` manifest: +### Verification -```shell -kubectl create namespace carvel-packages -kapp deploy -a kadras-repo -n carvel-packages -y \ - -f https://github.com/arktonix/kadras-packages/releases/latest/download/package-repository.yml -``` +You can verify the list of available Carvel package repositories and their status. -After the installation, you can retrieve the list of available Carvel package repositories in your cluster -with the following command. + ```shell + kctrl package repository list -n kadras-packages + ``` -```shell -kctrl package repository list -n carvel-packages -``` +### Packages -The Kadras package repository provides a collection of Carvel packages that you can list as follows. +The Kadras package repository provides a collection of Carvel packages that you can list. -```shell -kctrl package available list -n carvel-packages -``` + ```shell + kctrl package available list -p kpack.packages.kadras.io -n kadras-packages + ``` -## Update +## Upgrading -You can update the repository by applying the `PackageRepository` manifest from the newest release, similar -to the process described in the "Installation" section. Alternatively, you can use the `kctrl` CLI. +You can upgrade an existing repository to a newer version using `kctrl`. -```shell -kctrl package repository update -r kadras-repo \ + ```shell + kctrl package repository update -r kadras-repo \ --url ghcr.io/arktonix/kadras-packages: \ - -n carvel-packages -``` + -n kadras-packages + ``` -## Documentation +## Other -You can find more documentation about Carvel package management at [carvel.dev](https://carvel.dev/kapp-controller/docs/latest/packaging). +Instead of installing the Kadras package repository with `kctrl`, you can apply the necessary Carvel `PackageMetadata` and `Package` resources directly using [`kapp`](https://carvel.dev/kapp/docs/latest/install) or `kubectl`. -## References + ```shell + kubectl create namespace kadras-packages + kapp deploy -a kadras-repo -n kadras-packages -y \ + -f https://github.com/arktonix/kadras-packages/releases/latest/download/package-repository.yml + ``` -This package repository is inspired by the work done by the Carvel team and the -[Tanzu Community Edition](https://github.com/vmware-tanzu/community-edition) project (now retired). +## Support and Documentation + +For support and documentation about Carvel package management, check out [carvel.dev](https://carvel.dev/kapp-controller/docs/latest/packaging). + +## References -Learn more about [Kubernetes-native package management with Carvel](https://carvel.dev/kapp-controller/docs/latest/packaging). +This package repository is inspired by the work done by the Carvel team and the [Tanzu Community Edition](https://github.com/vmware-tanzu/community-edition) project (now retired). Learn more about [Kubernetes-native package management with Carvel](https://carvel.dev/kapp-controller/docs/latest/packaging). ## Supply Chain Security diff --git a/repo/packages/cartographer.packages.kadras.io/0.6.0.yml b/repo/packages/cartographer.packages.kadras.io/0.6.0.yml new file mode 100644 index 0000000..071c528 --- /dev/null +++ b/repo/packages/cartographer.packages.kadras.io/0.6.0.yml @@ -0,0 +1,131 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + name: cartographer.packages.kadras.io.0.6.0 +spec: + refName: cartographer.packages.kadras.io + version: 0.6.0 + releaseNotes: https://github.com/vmware-tanzu/package-for-cartographer/releases/tag/0.6.0 + releasedAt: "2022-11-17T17:54:12Z" + valuesSchema: + openAPIv3: + title: cartographer.packages.kadras.io.0.6.0 values schema + properties: + ca_cert_data: + type: string + description: 'Optional: PEM Encoded certificate data for image registries with private CA.' + default: "" + excluded_components: + type: array + items: + type: string + default: [] + description: 'Optional: List of components to exclude from installation (e.g. [conventions])' + aws_iam_role_arn: + type: string + description: 'Optional: Arn role that has access to pull images from ECR container registry' + default: "" + cartographer: + type: object + properties: + resources: + type: object + properties: + limits: + type: object + properties: + cpu: + anyOf: + - type: integer + - type: string + pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ + x-kubernetes-int-or-string: true + description: 'Optional: maximum amount of cpu resources to allow the controller to use' + default: 1000m + memory: + anyOf: + - type: integer + - type: string + pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ + x-kubernetes-int-or-string: true + description: 'Optional: maxium amount of memory to allow the controller to use' + default: 128Mi + requests: + type: object + properties: + cpu: + anyOf: + - type: integer + - type: string + pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ + x-kubernetes-int-or-string: true + description: 'Optional: minimum amount of cpu to reserve' + default: 250m + memory: + anyOf: + - type: integer + - type: string + pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ + x-kubernetes-int-or-string: true + description: 'Optional: minimum amount of memory to reserve' + default: 128Mi + conventions: + type: object + properties: + resources: + type: object + properties: + limits: + type: object + properties: + cpu: + anyOf: + - type: integer + - type: string + pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ + x-kubernetes-int-or-string: true + description: 'Optional: maximum amount of cpu resources to allow the controller to use' + default: 1000m + memory: + anyOf: + - type: integer + - type: string + pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ + x-kubernetes-int-or-string: true + description: 'Optional: maxium amount of memory to allow the controller to use' + default: 128Mi + requests: + type: object + properties: + cpu: + anyOf: + - type: integer + - type: string + pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ + x-kubernetes-int-or-string: true + description: 'Optional: minimum amount of cpu to reserve' + default: 250m + memory: + anyOf: + - type: integer + - type: string + pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ + x-kubernetes-int-or-string: true + description: 'Optional: minimum amount of memory to reserve' + default: 128Mi + template: + spec: + fetch: + - imgpkgBundle: + image: index.docker.io/projectcartographer/package-for-cartographer@sha256:0515493aa89a9f793c93a14012dfa5b6e5a7a6602b2dfae5a6d0fe61c13d2e19 + template: + - ytt: + ignoreUnknownComments: true + paths: + - config + - kbld: + paths: + - .imgpkg/images.yml + - '-' + deploy: + - kapp: {} diff --git a/repo/packages/cartographer.packages.kadras.io/metadata.yml b/repo/packages/cartographer.packages.kadras.io/metadata.yml index a23e5e6..262a7be 100644 --- a/repo/packages/cartographer.packages.kadras.io/metadata.yml +++ b/repo/packages/cartographer.packages.kadras.io/metadata.yml @@ -16,3 +16,4 @@ spec: get to an environment. Requires cert-manager to be installed. maintainers: - name: VMware + iconSVGBase64: PHN2ZyB3aWR0aD0iMTAwIiBoZWlnaHQ9IjEwMCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIj48cGF0aCBkPSJNIDEwIDEwIEggOTAgViA5MCBIIDEwIEwgMTAgMTAiLz48L3N2Zz4K diff --git a/repo/packages/cert-manager.packages.kadras.io/1.10.1+kadras.1.yml b/repo/packages/cert-manager.packages.kadras.io/1.10.1+kadras.1.yml new file mode 100644 index 0000000..68a0c09 --- /dev/null +++ b/repo/packages/cert-manager.packages.kadras.io/1.10.1+kadras.1.yml @@ -0,0 +1,40 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: cert-manager.packages.kadras.io.1.10.1+kadras.1 +spec: + licenses: + - Apache 2.0 + refName: cert-manager.packages.kadras.io + releaseNotes: https://github.com/jetstack/cert-manager/releases + releasedAt: "2022-11-27T15:22:22Z" + template: + spec: + deploy: + - kapp: + rawOptions: + - --wait-timeout=5m + - --kube-api-qps=50 + - --kube-api-burst=100 + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-cert-manager@sha256:fc0fe8d308308145f39c5aaa033c0e2f9bc5339a36422f284cf152866f08de52 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + namespace: + default: cert-manager + description: The namespace in which to deploy Cert Manager + type: string + type: object + version: 1.10.1+kadras.1 diff --git a/repo/packages/cert-manager.packages.kadras.io/1.10.1.yml b/repo/packages/cert-manager.packages.kadras.io/1.10.1.yml new file mode 100644 index 0000000..4058c03 --- /dev/null +++ b/repo/packages/cert-manager.packages.kadras.io/1.10.1.yml @@ -0,0 +1,40 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: cert-manager.packages.kadras.io.1.10.1 +spec: + licenses: + - Apache 2.0 + refName: cert-manager.packages.kadras.io + releaseNotes: https://github.com/jetstack/cert-manager/releases + releasedAt: "2022-11-23T19:46:49Z" + template: + spec: + deploy: + - kapp: + rawOptions: + - --wait-timeout=5m + - --kube-api-qps=50 + - --kube-api-burst=100 + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-cert-manager@sha256:14dd64e02208c5baabd29c3c1e02472e3f91890dc8b3d81384d0bee57db49b53 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + namespace: + default: cert-manager + description: The namespace in which to deploy Cert Manager + type: string + type: object + version: 1.10.1 diff --git a/repo/packages/contour.packages.kadras.io/1.23.0+kadras.3.yml b/repo/packages/contour.packages.kadras.io/1.23.0+kadras.3.yml new file mode 100644 index 0000000..b731b17 --- /dev/null +++ b/repo/packages/contour.packages.kadras.io/1.23.0+kadras.3.yml @@ -0,0 +1,206 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: contour.packages.kadras.io.1.23.0+kadras.3 +spec: + capacityRequirementsDescription: Varies significantly based on number of Services, + Ingresses/HTTPProxies, etc. A starting point is 128MB RAM and 0.5 CPU for each + Contour and Envoy pod, but this can and should be tuned based on observed usage. + licenses: + - Apache 2.0 + refName: contour.packages.kadras.io + releaseNotes: https://github.com/projectcontour/contour/releases + releasedAt: "2022-11-13T21:09:17Z" + template: + spec: + deploy: + - kapp: + rawOptions: + - --wait-timeout=5m + - --kube-api-qps=50 + - --kube-api-burst=100 + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-contour@sha256:11386b167df2e945b07effe506169e073b0678251586f2902420a58ff8ea6eee + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + description: OpenAPIv3 Schema + properties: + certificates: + additionalProperties: false + description: Settings for the TLS certificates for securing communication + between Contour and Envoy. + properties: + duration: + default: 8760h + description: If using cert-manager, how long the certificates should + be valid for. If useCertManager is false, this field is ignored. + type: string + renewBefore: + default: 360h + description: If using cert-manager, how long before expiration the certificates + should be renewed. If useCertManager is false, this field is ignored. + type: string + useCertManager: + default: false + description: Whether to use cert-manager to provision TLS certificates + for securing communication between Contour and Envoy. If false, the + upstream Contour certgen job will be used to provision certificates. + If true, the cert-manager addon must be installed in the cluster. + type: boolean + type: object + contour: + additionalProperties: false + description: Settings for the Contour component. + properties: + configFileContents: + default: null + description: The YAML contents of the Contour config file. See https://projectcontour.io/docs/latest/configuration/#configuration-file + for more information. + nullable: true + logLevel: + default: info + description: The Contour log level. Valid options are 'info' and 'debug'. + type: string + replicas: + default: 2 + description: How many Contour pod replicas to have. + type: integer + useProxyProtocol: + default: false + description: Whether to enable PROXY protocol for all Envoy listeners. + type: boolean + type: object + envoy: + additionalProperties: false + description: Settings for the Envoy component. + properties: + hostNetwork: + default: false + description: Whether to enable host networking for the Envoy pods. + type: boolean + hostPorts: + additionalProperties: false + description: Host port settings for the Envoy pods. + properties: + enable: + default: false + description: Whether to enable host ports. If false, http & https + are ignored. + type: boolean + http: + default: 80 + description: If enable == true, the host port number to expose Envoy's + HTTP listener on. + type: integer + https: + default: 443 + description: If enable == true, the host port number to expose Envoy's + HTTPS listener on. + type: integer + type: object + logLevel: + default: info + description: The Envoy log level. + type: string + service: + additionalProperties: false + description: Envoy service settings. + properties: + annotations: + default: null + description: Annotations to set on the Envoy service. + nullable: true + aws: + additionalProperties: false + description: AWS-specific settings for the Envoy service. If infrastructure + provider is not 'aws', these settings are ignored. + properties: + loadBalancerType: + default: classic + description: The type of AWS load balancer to provision. Options + are 'classic' and 'nlb'. + type: string + type: object + externalTrafficPolicy: + default: "" + description: The external traffic policy for the Envoy service. + If type is 'ClusterIP', this field is ignored. Otherwise, defaults + to 'Cluster' for vsphere and 'Local' for others. + type: string + loadBalancerIP: + default: "" + description: The desired load balancer IP. If type is not 'LoadBalancer', + this field is ignored. It is up to the cloud provider whether + to honor this request. If not specified, then load balancer IP + will be assigned by the cloud provider. + type: string + nodePorts: + additionalProperties: false + description: NodePort settings for the Envoy service. If type is + not 'NodePort' or 'LoadBalancer', these settings are ignored. + properties: + http: + default: 0 + description: The node port number to expose Envoy's HTTP listener + on. If not specified, a node port will be auto-assigned by + Kubernetes. + type: integer + https: + default: 0 + description: The node port number to expose Envoy's HTTPS listener + on. If not specified, a node port will be auto-assigned by + Kubernetes. + type: integer + type: object + type: + default: "" + description: The type of Kubernetes service to provision for Envoy. + If not specified, will default to 'NodePort' for docker and vsphere + and 'LoadBalancer' for others. + type: string + type: object + terminationGracePeriodSeconds: + default: 300 + description: The termination grace period, in seconds, for the Envoy + pods. + type: integer + workload: + additionalProperties: false + description: Envoy workload settings. + properties: + replicas: + default: 2 + description: The number of Envoy replicas to deploy when 'type' + is set to 'Deployment'. If not specified, it will default to '2'. + type: integer + type: + default: DaemonSet + description: The type of Kubernetes workload Envoy is deployed as. + Options are 'Deployment' or 'DaemonSet'. If not specified, will + default to 'DaemonSet'. + type: string + type: object + type: object + infrastructureProvider: + default: "" + description: The underlying infrastructure provider. Options are aws, azure, + docker and vsphere. This field is not required, but enables better validation + and defaulting if provided. + type: string + namespace: + default: projectcontour + description: The namespace in which to deploy Contour and Envoy. + type: string + type: object + version: 1.23.0+kadras.3 diff --git a/repo/packages/contour.packages.kadras.io/1.23.0+kadras.4.yml b/repo/packages/contour.packages.kadras.io/1.23.0+kadras.4.yml new file mode 100644 index 0000000..cf2413b --- /dev/null +++ b/repo/packages/contour.packages.kadras.io/1.23.0+kadras.4.yml @@ -0,0 +1,206 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: contour.packages.kadras.io.1.23.0+kadras.4 +spec: + capacityRequirementsDescription: Varies significantly based on number of Services, + Ingresses/HTTPProxies, etc. A starting point is 128MB RAM and 0.5 CPU for each + Contour and Envoy pod, but this can and should be tuned based on observed usage. + licenses: + - Apache 2.0 + refName: contour.packages.kadras.io + releaseNotes: https://github.com/projectcontour/contour/releases + releasedAt: "2022-11-27T21:01:18Z" + template: + spec: + deploy: + - kapp: + rawOptions: + - --wait-timeout=5m + - --kube-api-qps=50 + - --kube-api-burst=100 + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-contour@sha256:05c8a8b953faf9f9a46e707cfe2b59eb3a19ea3d7c808074e851c8e1ddd1742a + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + certificates: + additionalProperties: false + description: Settings for the TLS certificates for securing communication + between Contour and Envoy. + properties: + duration: + default: 8760h + description: If using cert-manager, how long the certificates should + be valid for. If useCertManager is false, this field is ignored. + type: string + renewBefore: + default: 360h + description: If using cert-manager, how long before expiration the certificates + should be renewed. If useCertManager is false, this field is ignored. + type: string + useCertManager: + default: false + description: Whether to use cert-manager to provision TLS certificates + for securing communication between Contour and Envoy. If false, the + upstream Contour certgen job will be used to provision certificates. + If true, the cert-manager addon must be installed in the cluster. + type: boolean + type: object + contour: + additionalProperties: false + description: Settings for the Contour component. + properties: + configFileContents: + default: null + description: The YAML contents of the Contour config file. See https://projectcontour.io/docs/latest/configuration/#configuration-file + for more information. + nullable: true + logLevel: + default: info + description: The Contour log level. Valid options are 'info' and 'debug'. + type: string + replicas: + default: 2 + description: How many Contour pod replicas to have. + type: integer + useProxyProtocol: + default: false + description: Whether to enable PROXY protocol for all Envoy listeners. + type: boolean + type: object + envoy: + additionalProperties: false + description: Settings for the Envoy component. + properties: + hostNetwork: + default: false + description: Whether to enable host networking for the Envoy pods. + type: boolean + hostPorts: + additionalProperties: false + description: Host port settings for the Envoy pods. + properties: + enable: + default: false + description: Whether to enable host ports. If false, http & https + are ignored. + type: boolean + http: + default: 80 + description: If enable == true, the host port number to expose Envoy's + HTTP listener on. + type: integer + https: + default: 443 + description: If enable == true, the host port number to expose Envoy's + HTTPS listener on. + type: integer + type: object + logLevel: + default: info + description: The Envoy log level. + type: string + service: + additionalProperties: false + description: Envoy service settings. + properties: + annotations: + default: null + description: Annotations to set on the Envoy service. + nullable: true + aws: + additionalProperties: false + description: AWS-specific settings for the Envoy service. If infrastructure + provider is not 'aws', these settings are ignored. + properties: + loadBalancerType: + default: classic + description: The type of AWS load balancer to provision. Options + are 'classic' and 'nlb'. + type: string + type: object + externalTrafficPolicy: + default: "" + description: The external traffic policy for the Envoy service. + If type is 'ClusterIP', this field is ignored. Otherwise, defaults + to 'Cluster' for vsphere and 'Local' for others. + type: string + loadBalancerIP: + default: "" + description: The desired load balancer IP. If type is not 'LoadBalancer', + this field is ignored. It is up to the cloud provider whether + to honor this request. If not specified, then load balancer IP + will be assigned by the cloud provider. + type: string + nodePorts: + additionalProperties: false + description: NodePort settings for the Envoy service. If type is + not 'NodePort' or 'LoadBalancer', these settings are ignored. + properties: + http: + default: 0 + description: The node port number to expose Envoy's HTTP listener + on. If not specified, a node port will be auto-assigned by + Kubernetes. + type: integer + https: + default: 0 + description: The node port number to expose Envoy's HTTPS listener + on. If not specified, a node port will be auto-assigned by + Kubernetes. + type: integer + type: object + type: + default: null + description: The type of Kubernetes service to provision for Envoy. + If not specified, will default to 'NodePort' for docker and vsphere + and 'LoadBalancer' for others. + nullable: true + type: string + type: object + terminationGracePeriodSeconds: + default: 300 + description: The termination grace period, in seconds, for the Envoy + pods. + type: integer + workload: + additionalProperties: false + description: Envoy workload settings. + properties: + replicas: + default: 2 + description: The number of Envoy replicas to deploy when 'type' + is set to 'Deployment'. If not specified, it will default to '2'. + type: integer + type: + default: DaemonSet + description: The type of Kubernetes workload Envoy is deployed as. + Options are 'Deployment' or 'DaemonSet'. If not specified, will + default to 'DaemonSet'. + type: string + type: object + type: object + infrastructureProvider: + default: "" + description: The underlying infrastructure provider. Options are aws, azure, + docker and vsphere. This field is not required, but enables better validation + and defaulting if provided. + type: string + namespace: + default: projectcontour + description: The namespace in which to deploy Contour and Envoy. + type: string + type: object + version: 1.23.0+kadras.4 diff --git a/repo/packages/fluxcd-source-controller.packages.kadras.io/0.31.0+kadras.1.yml b/repo/packages/fluxcd-source-controller.packages.kadras.io/0.31.0+kadras.1.yml new file mode 100644 index 0000000..78c3284 --- /dev/null +++ b/repo/packages/fluxcd-source-controller.packages.kadras.io/0.31.0+kadras.1.yml @@ -0,0 +1,72 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: fluxcd-source-controller.packages.kadras.io.0.31.0+kadras.1 +spec: + licenses: + - Apache 2.0 + refName: fluxcd-source-controller.packages.kadras.io + releaseNotes: https://github.com/fluxcd/source-controller/releases + releasedAt: "2022-11-13T21:44:27Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-fluxcd-source-controller@sha256:255eedc6c25ad88261df7df289ac6acdba2fab97544265c0b9a93cdf4d9c3c70 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + namespace: + default: source-system + description: The namespace where to install FluxCD Source Controller + type: string + proxy: + additionalProperties: false + description: Configure proxy support + properties: + http_proxy: + default: "" + description: The HTTP proxy URL + type: string + https_proxy: + default: "" + description: The HTTPS proxy URL + type: string + no_proxy: + default: "" + description: For which domains the proxy should not be used + type: string + type: object + resources: + additionalProperties: false + description: Resource configuration for the source-controller Deployment + properties: + limits: + additionalProperties: false + properties: + cpu: + default: 1000m + type: string + memory: + default: 1Gi + type: string + type: object + type: object + service_port: + default: 80 + description: Port configuration for the source-controller Service + type: integer + type: object + version: 0.31.0+kadras.1 diff --git a/repo/packages/fluxcd-source-controller.packages.kadras.io/0.32.1+kadras.1.yml b/repo/packages/fluxcd-source-controller.packages.kadras.io/0.32.1+kadras.1.yml new file mode 100644 index 0000000..b32dcc8 --- /dev/null +++ b/repo/packages/fluxcd-source-controller.packages.kadras.io/0.32.1+kadras.1.yml @@ -0,0 +1,72 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: fluxcd-source-controller.packages.kadras.io.0.32.1+kadras.1 +spec: + licenses: + - Apache 2.0 + refName: fluxcd-source-controller.packages.kadras.io + releaseNotes: https://github.com/fluxcd/source-controller/releases + releasedAt: "2022-11-27T21:29:11Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-fluxcd-source-controller@sha256:505bca54e3b3c22607c2e3ad22622334828348fb761cdd50adb1bee5f7d9c21b + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + namespace: + default: source-system + description: The namespace where to install FluxCD Source Controller + type: string + proxy: + additionalProperties: false + description: Configure proxy support + properties: + http_proxy: + default: "" + description: The HTTP proxy URL + type: string + https_proxy: + default: "" + description: The HTTPS proxy URL + type: string + no_proxy: + default: "" + description: For which domains the proxy should not be used + type: string + type: object + resources: + additionalProperties: false + description: Resource configuration for the source-controller Deployment + properties: + limits: + additionalProperties: false + properties: + cpu: + default: 1000m + type: string + memory: + default: 1Gi + type: string + type: object + type: object + service_port: + default: 80 + description: Port configuration for the source-controller Service + type: integer + type: object + version: 0.32.1+kadras.1 diff --git a/repo/packages/fluxcd-source-controller.packages.kadras.io/0.32.1.yml b/repo/packages/fluxcd-source-controller.packages.kadras.io/0.32.1.yml new file mode 100644 index 0000000..7942f3d --- /dev/null +++ b/repo/packages/fluxcd-source-controller.packages.kadras.io/0.32.1.yml @@ -0,0 +1,72 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: fluxcd-source-controller.packages.kadras.io.0.32.1 +spec: + licenses: + - Apache 2.0 + refName: fluxcd-source-controller.packages.kadras.io + releaseNotes: https://github.com/fluxcd/source-controller/releases + releasedAt: "2022-11-23T19:59:00Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-fluxcd-source-controller@sha256:255eedc6c25ad88261df7df289ac6acdba2fab97544265c0b9a93cdf4d9c3c70 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + namespace: + default: source-system + description: The namespace where to install FluxCD Source Controller + type: string + proxy: + additionalProperties: false + description: Configure proxy support + properties: + http_proxy: + default: "" + description: The HTTP proxy URL + type: string + https_proxy: + default: "" + description: The HTTPS proxy URL + type: string + no_proxy: + default: "" + description: For which domains the proxy should not be used + type: string + type: object + resources: + additionalProperties: false + description: Resource configuration for the source-controller Deployment + properties: + limits: + additionalProperties: false + properties: + cpu: + default: 1000m + type: string + memory: + default: 1Gi + type: string + type: object + type: object + service_port: + default: 80 + description: Port configuration for the source-controller Service + type: integer + type: object + version: 0.32.1 diff --git a/repo/packages/knative-eventing.packages.kadras.io/1.8.1+kadras.1.yml b/repo/packages/knative-eventing.packages.kadras.io/1.8.1+kadras.1.yml new file mode 100644 index 0000000..42bbd8c --- /dev/null +++ b/repo/packages/knative-eventing.packages.kadras.io/1.8.1+kadras.1.yml @@ -0,0 +1,45 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: knative-eventing.packages.kadras.io.1.8.1+kadras.1 +spec: + licenses: + - Apache 2.0 + refName: knative-eventing.packages.kadras.io + releaseNotes: https://github.com/knative/eventing/releases + releasedAt: "2022-11-27T22:36:10Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-knative-eventing@sha256:da0fb08e4091a1b530699eae0cbdce1556c08b7ee9af7f8364c4040cd0583310 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + default_broker: + additionalProperties: false + description: Configuration for the default in-memory broker + properties: + enabled: + default: false + description: Whether to install the default in-memory broker + type: boolean + namespace: + default: default + description: The namespace where to install the default broker + type: string + type: object + type: object + version: 1.8.1+kadras.1 diff --git a/repo/packages/knative-eventing.packages.kadras.io/1.8.1.yml b/repo/packages/knative-eventing.packages.kadras.io/1.8.1.yml new file mode 100644 index 0000000..b742e4f --- /dev/null +++ b/repo/packages/knative-eventing.packages.kadras.io/1.8.1.yml @@ -0,0 +1,45 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: knative-eventing.packages.kadras.io.1.8.1 +spec: + licenses: + - Apache 2.0 + refName: knative-eventing.packages.kadras.io + releaseNotes: https://github.com/knative/eventing/releases + releasedAt: "2022-11-24T06:30:01Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-knative-eventing@sha256:7b545966388cf21fc6b028928c54ad0f72f3e178cc585f60a6241a6badfac5a0 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + default_broker: + additionalProperties: false + description: Configuration for the default in-memory broker + properties: + enabled: + default: false + description: Whether to install the default in-memory broker + type: boolean + namespace: + default: default + description: The namespace where to install the default broker + type: string + type: object + type: object + version: 1.8.1 diff --git a/repo/packages/knative-serving.packages.kadras.io/1.8.0+kadras.1.yml b/repo/packages/knative-serving.packages.kadras.io/1.8.0+kadras.1.yml new file mode 100644 index 0000000..b753d1d --- /dev/null +++ b/repo/packages/knative-serving.packages.kadras.io/1.8.0+kadras.1.yml @@ -0,0 +1,122 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: knative-serving.packages.kadras.io.1.8.0+kadras.1 +spec: + licenses: + - Apache 2.0 + refName: knative-serving.packages.kadras.io + releaseNotes: https://github.com/knative/serving/releases + releasedAt: "2022-11-25T23:23:56Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-knative-serving@sha256:a4fb26462934be081544939ecf78716f2048c9ded6b1f660e9183cace87d001f + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + domain: + additionalProperties: false + description: DNS configuration + properties: + name: + default: "" + description: Your own domain name if type real or empty if type sslip.io + or nip.io + type: string + type: + default: nip.io + description: Type of DNS configuration + type: string + url_template: + default: '{{.Name}}.{{.Namespace}}.{{.Domain}}' + description: The domain template to use when creating new services + type: string + type: object + ingress: + additionalProperties: false + description: Ingress configuration + properties: + external: + additionalProperties: false + description: Configuration for the external Ingress controller + properties: + namespace: + default: projectcontour + description: The namespace where the external Ingress controller + is installed + type: string + type: object + internal: + additionalProperties: false + description: Configuration for the internale Ingress controller + properties: + namespace: + default: projectcontour + description: The namespace where the internal Ingress controller + is installed + type: string + type: object + type: object + namespace: + default: knative-serving + description: The namespace where to install Knative Serving + type: string + scaling: + additionalProperties: false + description: Configuration for the Knative autoscaler + properties: + allow_zero_initial_scale: + default: "true" + description: Whether either the initial_scale config or the 'autoscaling.knative.dev/initial-scale' + annotation can be set to 0 + type: string + initial_scale: + default: "1" + description: The initial target scale of a revision after creation + type: string + max_scale: + default: "0" + description: The maximum scale of a revision. If set to 0, the revision + has no maximum scale. + type: string + min_scale: + default: "0" + description: The minimum scale of a revision + type: string + scale_down_delay: + default: 0s + description: The amount of time that must pass at reduced concurrency + before a scale down decision is applied. If 0s, no delay. + type: string + type: object + tls: + additionalProperties: false + description: Configuration for automatic TLS certificates + properties: + certmanager: + additionalProperties: false + description: Configuration for integrating with cert-manager for certificate + issuing + properties: + clusterissuer: + default: "" + description: Provide a cluster issuer if you want to enable auto-TLS + type: string + type: object + type: object + type: object + version: 1.8.0+kadras.1 diff --git a/repo/packages/knative-serving.packages.kadras.io/1.8.0+kadras.2.yml b/repo/packages/knative-serving.packages.kadras.io/1.8.0+kadras.2.yml new file mode 100644 index 0000000..29abe86 --- /dev/null +++ b/repo/packages/knative-serving.packages.kadras.io/1.8.0+kadras.2.yml @@ -0,0 +1,122 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: knative-serving.packages.kadras.io.1.8.0+kadras.2 +spec: + licenses: + - Apache 2.0 + refName: knative-serving.packages.kadras.io + releaseNotes: https://github.com/knative/serving/releases + releasedAt: "2022-11-27T23:12:14Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-knative-serving@sha256:a701488c9a44e05dacd7e17650d05fbad1f5f452d20e398c72831e8a8b99d12c + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + domain: + additionalProperties: false + description: DNS configuration + properties: + name: + default: "" + description: Your own domain name if type real or empty if type sslip.io + or nip.io + type: string + type: + default: nip.io + description: Type of DNS configuration + type: string + url_template: + default: '{{.Name}}.{{.Namespace}}.{{.Domain}}' + description: The domain template to use when creating new services + type: string + type: object + ingress: + additionalProperties: false + description: Ingress configuration + properties: + external: + additionalProperties: false + description: Configuration for the external Ingress controller + properties: + namespace: + default: projectcontour + description: The namespace where the external Ingress controller + is installed + type: string + type: object + internal: + additionalProperties: false + description: Configuration for the internale Ingress controller + properties: + namespace: + default: projectcontour + description: The namespace where the internal Ingress controller + is installed + type: string + type: object + type: object + namespace: + default: knative-serving + description: The namespace where to install Knative Serving + type: string + scaling: + additionalProperties: false + description: Configuration for the Knative autoscaler + properties: + allow_zero_initial_scale: + default: "true" + description: Whether either the initial_scale config or the 'autoscaling.knative.dev/initial-scale' + annotation can be set to 0 + type: string + initial_scale: + default: "1" + description: The initial target scale of a revision after creation + type: string + max_scale: + default: "0" + description: The maximum scale of a revision. If set to 0, the revision + has no maximum scale. + type: string + min_scale: + default: "0" + description: The minimum scale of a revision + type: string + scale_down_delay: + default: 0s + description: The amount of time that must pass at reduced concurrency + before a scale down decision is applied. If 0s, no delay. + type: string + type: object + tls: + additionalProperties: false + description: Configuration for automatic TLS certificates + properties: + certmanager: + additionalProperties: false + description: Configuration for integrating with cert-manager for certificate + issuing + properties: + clusterissuer: + default: "" + description: Provide a cluster issuer if you want to enable auto-TLS + type: string + type: object + type: object + type: object + version: 1.8.0+kadras.2 diff --git a/repo/packages/kpack-dependencies.packages.kadras.io/0.3.1.yml b/repo/packages/kpack-dependencies.packages.kadras.io/0.3.1.yml new file mode 100644 index 0000000..75a9202 --- /dev/null +++ b/repo/packages/kpack-dependencies.packages.kadras.io/0.3.1.yml @@ -0,0 +1,34 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: kpack-dependencies.packages.kadras.io.0.3.1 +spec: + refName: kpack-dependencies.packages.kadras.io + releasedAt: "2022-11-25T23:44:12Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/kpack-dependencies@sha256:c7bc98f1f63e0879f3896fa008fbbdc24a832de7ebd3b40f8a8b56bafc6d7aba + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + kp_default_repository: + default: "" + description: The OCI registry where to publish builder images. The same + as configured in kpack. + type: string + type: object + version: 0.3.1 diff --git a/repo/packages/kpack-dependencies.packages.kadras.io/0.3.2.yml b/repo/packages/kpack-dependencies.packages.kadras.io/0.3.2.yml new file mode 100644 index 0000000..9c5614a --- /dev/null +++ b/repo/packages/kpack-dependencies.packages.kadras.io/0.3.2.yml @@ -0,0 +1,34 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: kpack-dependencies.packages.kadras.io.0.3.2 +spec: + refName: kpack-dependencies.packages.kadras.io + releasedAt: "2022-11-28T18:44:40Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/kpack-dependencies@sha256:6548de6f924a10c11236eea2b988b95b5702486ca91378f764422b68db25ee97 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + kp_default_repository: + default: "" + description: The OCI registry where to publish builder images. The same + as configured in kpack. + type: string + type: object + version: 0.3.2 diff --git a/repo/packages/kpack.packages.kadras.io/0.8.0.yml b/repo/packages/kpack.packages.kadras.io/0.8.0.yml new file mode 100644 index 0000000..fb6bdb8 --- /dev/null +++ b/repo/packages/kpack.packages.kadras.io/0.8.0.yml @@ -0,0 +1,95 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: kpack.packages.kadras.io.0.8.0 +spec: + capacityRequirementsDescription: Registry with > 1GB available space + licenses: + - Apache 2.0 + refName: kpack.packages.kadras.io + releaseNotes: https://github.com/pivotal/kpack/releases + releasedAt: "2022-11-21T22:28:35Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-kpack@sha256:9318ca1ffbc7b3cfcbbdaf7f2fd59df8249fba7556e30a710b544b6784eb4884 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + ca_cert_data: + default: "" + description: 'CA Certificate to be injected into the kpack controller trust + store for communicating with self signed registries. Note: This will not + be injected into builds, you need to use the cert injection webhook with + the kpack.io/build label value' + type: string + kp_default_repository: + default: "" + description: The default repository to use for builder images and dependencies + example: ghcr.io/thomasvitale/kpack + type: string + x-example-description: Repository on GitHub Container Registry + kp_default_repository_aws_iam_role_arn: + default: "" + description: IAM credentials to access kp_default_repository if the registry + is on AWS + type: string + kp_default_repository_password: + default: "" + description: 'Token to access kp_default_repository. Note: Use contents + of service account key json for GCR' + type: string + kp_default_repository_secret: + additionalProperties: false + description: Configuration for the Secret holding the credentials to access + kp_default_repository + properties: + name: + default: "" + description: The name of the Secret holding the credentials to access + kp_default_repository + type: string + namespace: + default: "" + description: The namespace of the Secret holding the credentials to + access kp_default_repository + type: string + type: object + kp_default_repository_username: + default: "" + description: 'Username to access kp_default_repository. Note: Use _json_key + for GCR' + type: string + proxy: + additionalProperties: false + description: Configure proxy support + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use a proxy + type: string + type: object + type: object + version: 0.8.0 diff --git a/repo/packages/kpack.packages.kadras.io/0.8.1+kadras.1.yml b/repo/packages/kpack.packages.kadras.io/0.8.1+kadras.1.yml new file mode 100644 index 0000000..2433bbe --- /dev/null +++ b/repo/packages/kpack.packages.kadras.io/0.8.1+kadras.1.yml @@ -0,0 +1,95 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: kpack.packages.kadras.io.0.8.1+kadras.1 +spec: + capacityRequirementsDescription: Registry with > 1GB available space + licenses: + - Apache 2.0 + refName: kpack.packages.kadras.io + releaseNotes: https://github.com/pivotal/kpack/releases + releasedAt: "2022-11-28T19:55:07Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-kpack@sha256:474f7923618c5d9a08aad70ce4121d002072370c86ba7cba69a5b2db2c142710 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + ca_cert_data: + default: "" + description: 'CA Certificate to be injected into the kpack controller trust + store for communicating with self signed registries. Note: This will not + be injected into builds, you need to use the cert injection webhook with + the kpack.io/build label value' + type: string + kp_default_repository: + default: "" + description: The default repository to use for builder images and dependencies + example: ghcr.io/thomasvitale/kpack + type: string + x-example-description: Repository on GitHub Container Registry + kp_default_repository_aws_iam_role_arn: + default: "" + description: IAM credentials to access kp_default_repository if the registry + is on AWS + type: string + kp_default_repository_password: + default: "" + description: 'Token to access kp_default_repository. Note: Use contents + of service account key json for GCR' + type: string + kp_default_repository_secret: + additionalProperties: false + description: Configuration for the Secret holding the credentials to access + kp_default_repository + properties: + name: + default: "" + description: The name of the Secret holding the credentials to access + kp_default_repository + type: string + namespace: + default: "" + description: The namespace of the Secret holding the credentials to + access kp_default_repository + type: string + type: object + kp_default_repository_username: + default: "" + description: 'Username to access kp_default_repository. Note: Use _json_key + for GCR' + type: string + proxy: + additionalProperties: false + description: Configure proxy support + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use a proxy + type: string + type: object + type: object + version: 0.8.1+kadras.1 diff --git a/repo/packages/kpack.packages.kadras.io/0.8.1.yml b/repo/packages/kpack.packages.kadras.io/0.8.1.yml new file mode 100644 index 0000000..e8f94fc --- /dev/null +++ b/repo/packages/kpack.packages.kadras.io/0.8.1.yml @@ -0,0 +1,95 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: kpack.packages.kadras.io.0.8.1 +spec: + capacityRequirementsDescription: Registry with > 1GB available space + licenses: + - Apache 2.0 + refName: kpack.packages.kadras.io + releaseNotes: https://github.com/pivotal/kpack/releases + releasedAt: "2022-11-22T21:50:17Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-kpack@sha256:a19bd62bfc496920f6578cf77378732db6efacfe143cc2c7b4766cf0d85ba51a + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + ca_cert_data: + default: "" + description: 'CA Certificate to be injected into the kpack controller trust + store for communicating with self signed registries. Note: This will not + be injected into builds, you need to use the cert injection webhook with + the kpack.io/build label value' + type: string + kp_default_repository: + default: "" + description: The default repository to use for builder images and dependencies + example: ghcr.io/thomasvitale/kpack + type: string + x-example-description: Repository on GitHub Container Registry + kp_default_repository_aws_iam_role_arn: + default: "" + description: IAM credentials to access kp_default_repository if the registry + is on AWS + type: string + kp_default_repository_password: + default: "" + description: 'Token to access kp_default_repository. Note: Use contents + of service account key json for GCR' + type: string + kp_default_repository_secret: + additionalProperties: false + description: Configuration for the Secret holding the credentials to access + kp_default_repository + properties: + name: + default: "" + description: The name of the Secret holding the credentials to access + kp_default_repository + type: string + namespace: + default: "" + description: The namespace of the Secret holding the credentials to + access kp_default_repository + type: string + type: object + kp_default_repository_username: + default: "" + description: 'Username to access kp_default_repository. Note: Use _json_key + for GCR' + type: string + proxy: + additionalProperties: false + description: Configure proxy support + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use a proxy + type: string + type: object + type: object + version: 0.8.1 diff --git a/repo/packages/metrics-server.packages.kadras.io/0.6.1+kadras.1.yml b/repo/packages/metrics-server.packages.kadras.io/0.6.1+kadras.1.yml new file mode 100644 index 0000000..a363fd8 --- /dev/null +++ b/repo/packages/metrics-server.packages.kadras.io/0.6.1+kadras.1.yml @@ -0,0 +1,148 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: metrics-server.packages.kadras.io.0.6.1+kadras.1 +spec: + licenses: + - Apache 2.0 + refName: metrics-server.packages.kadras.io + releaseNotes: https://github.com/kubernetes-sigs/metrics-server/releases + releasedAt: "2022-11-28T21:17:26Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-metrics-server@sha256:69e5e2583b47f308f8336f4cc5ae3e012e4eae61060232a36afd3031fa368f72 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + daemonset: + additionalProperties: false + properties: + updateStrategy: + default: null + description: Update strategy of daemonsets + nullable: true + type: string + type: object + deployment: + additionalProperties: false + properties: + rollingUpdate: + additionalProperties: false + properties: + maxSurge: + default: null + description: The maxSurge of rollingUpdate. Applied only if RollingUpdate + is used as updateStrategy + nullable: true + type: integer + maxUnavailable: + default: null + description: The maxUnavailable of rollingUpdate. Applied only if + RollingUpdate is used as updateStrategy + nullable: true + type: integer + type: object + updateStrategy: + default: null + description: Update strategy of deployments + nullable: true + type: string + type: object + metricsServer: + additionalProperties: false + properties: + config: + additionalProperties: false + properties: + apiServiceInsecureTLS: + default: true + description: Whether to enable insecure TLS for metrics-server api + service + type: boolean + args: + default: [] + description: Arguments passed into metrics-server container + items: + default: "" + type: string + type: array + probe: + additionalProperties: false + properties: + failureThreshold: + default: 3 + description: Probe failureThreshold of metrics-server deployment + type: integer + periodSeconds: + default: 10 + description: Probe period of metrics-server deployment + type: integer + type: object + securePort: + default: 4443 + description: The HTTPS secure port used by metrics-server + type: integer + tolerations: + default: [] + description: Metrics-server deployment tolerations + nullable: true + updateStrategy: + default: RollingUpdate + description: The update strategy of the metrics-server deployment + type: string + type: object + createNamespace: + default: true + description: Whether to create namespace specified for metrics-server + type: boolean + image: + additionalProperties: false + properties: + name: + default: "" + description: The path of image + type: string + pullPolicy: + default: IfNotPresent + description: The pull policy of image + type: string + repository: + default: "" + description: The repository of metrics-server image + type: string + tag: + default: "" + description: The image tag + type: string + type: object + namespace: + default: null + description: The namespace value used by older templates, will be overwriten + if top level namespace is present, kept for backward compatibility + nullable: true + type: string + type: object + namespace: + default: kube-system + description: The namespace in which metrics-server is deployed + type: string + nodeSelector: + default: null + description: NodeSelector configuration applied to all the deployments + nullable: true + type: object + version: 0.6.1+kadras.1 diff --git a/repo/packages/secretgen-controller.packages.kadras.io/0.12.0.yml b/repo/packages/secretgen-controller.packages.kadras.io/0.12.0.yml new file mode 100644 index 0000000..b2e5145 --- /dev/null +++ b/repo/packages/secretgen-controller.packages.kadras.io/0.12.0.yml @@ -0,0 +1,66 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + name: secretgen-controller.packages.kadras.io.0.12.0 +spec: + licenses: + - Apache 2.0 + refName: secretgen-controller.packages.kadras.io + releasedAt: "2022-11-22T20:23:09Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/vmware-tanzu/carvel-secretgen-controller-package-bundle@sha256:d509a0b0707d495b655d9a080ae638f7b24bdc16c5b7e6a1bca9a7a938b62120 + template: + - ytt: + paths: + - config/package-bundle/config + - config/release-config.yml + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + create_namespace: + default: true + description: Whether to create namespace specified for secretgen-controller + type: boolean + deployment: + additionalProperties: false + description: Configuration for secretgen-controller deployment + properties: + nodeSelector: + default: null + description: NodeSelector configuration applied to all the deployments + nullable: true + rollingUpdate: + additionalProperties: false + properties: + maxSurge: + default: 0 + description: The maxSurge of rollingUpdate. Applied only if RollingUpdate + is used as updateStrategy + type: integer + maxUnavailable: + default: 1 + description: The maxUnavailable of rollingUpdate. Applied only if + RollingUpdate is used as updateStrategy + type: integer + type: object + updateStrategy: + default: "" + description: Update strategy of deployments, empty uses default strategy + type: string + type: object + namespace: + default: secretgen-controller + description: The namespace in which to deploy secretgen-controller + type: string + type: object + version: 0.12.0 diff --git a/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml b/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml index baa19af..4300b28 100644 --- a/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml +++ b/repo/packages/secretgen-controller.packages.kadras.io/metadata.yml @@ -3,11 +3,12 @@ kind: PackageMetadata metadata: name: secretgen-controller.packages.kadras.io spec: - displayName: "secretgen-controller" - longDescription: "Provide CRDs to specify what secrets need to be on cluster (generated or not)." - shortDescription: "Secret generation and sharing" - providerName: carvel.dev - maintainers: - - name: Carvel team (see www.carvel.dev for team members) categories: - - "package management" + - package management + displayName: secretgen-controller + longDescription: Provide CRDs to specify what secrets need to be on cluster (generated + or not). + maintainers: + - name: Carvel team (see www.carvel.dev for team members) + providerName: carvel.dev + shortDescription: Secret generation and sharing diff --git a/repo/packages/tekton-pipelines.packages.kadras.io/0.42.0.yml b/repo/packages/tekton-pipelines.packages.kadras.io/0.42.0.yml new file mode 100644 index 0000000..4ea24e5 --- /dev/null +++ b/repo/packages/tekton-pipelines.packages.kadras.io/0.42.0.yml @@ -0,0 +1,151 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: tekton-pipelines.packages.kadras.io.0.42.0 +spec: + licenses: + - Apache 2.0 + refName: tekton-pipelines.packages.kadras.io + releaseNotes: https://github.com/tektoncd/pipeline/releases + releasedAt: "2022-11-29T22:26:40Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/arktonix/package-for-tekton-pipelines@sha256:86ebaf0133d4647454c3ddcb3783b344dcb750b37b350612bf534994db349bd9 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + defaults: + additionalProperties: false + description: Default configuration stored in the config-defaults ConfigMap. + properties: + affinity_assistant_pod_template: + default: "" + description: Pod template to use for affinity assistant pods. + type: string + cloud_events_sink: + default: "" + description: CloudEvents sink to be used for TaskRun and PipelineRun. + If no sink is specified, no CloudEvent is generated. + type: string + managed_by_label_value: + default: tekton-pipelines + description: Value given to the 'app.kubernetes.io/managed-by' label + applied to all Pods created for TaskRuns. + type: string + max_matrix_combinations_count: + default: "256" + description: Maximum number of combinations from a Matrix, if none is + specified. + type: string + pod_template: + default: "" + description: Pod template to use for TaskRun and PipelineRun. + type: string + service_account: + default: default + description: Service account name to use for TaskRun and PipelineRun, + if none is specified. + type: string + task_run_workspace_binding: + default: "" + description: Workspace configuration provided for any Workspaces that + a Task declares but that a TaskRun does not explicitly provide. + example: 'emptyDir: {}' + type: string + x-example-description: Use emptyDir volume for workspace + timeout_minutes: + default: "60" + description: Number of minutes to use for TaskRun and PipelineRun, if + none is specified. + type: string + type: object + feature_flags: + additionalProperties: false + description: Feature flags configuration stored in the feature-flags ConfigMap. + properties: + await_sidecar_readiness: + default: "true" + description: Setting this flag to 'false' will stop Tekton from waiting + for a TaskRun's sidecar containers to be running before starting the + first step. This will allow Tasks to be run in environments that don't + support the DownwardAPI volume type, but may lead to unintended behaviour + if sidecars are used. + type: string + disable_affinity_assistant: + default: "false" + description: Setting this flag to 'true' will prevent Tekton to create + an Affinity Assistant for every TaskRun sharing a PVC workspace. + type: string + disable_creds_init: + default: "false" + description: Setting this flag to 'true' will prevent Tekton scanning + attached service accounts and injecting any credentials it finds into + your Steps. + type: string + enable_api_fields: + default: stable + description: Setting this flag will determine which gated features are + enabled. + type: string + enable_custom_tasks: + default: "false" + description: Setting this flag to 'true' enables the use of custom tasks + from within pipelines. This is an experimental feature and thus should + still be considered an alpha feature. + type: string + enable_provenance_in_status: + default: "false" + description: Setting this flag to 'true' enables populating the 'provenance' + field in TaskRun and PipelineRun status. This field contains metadata + about resources used in the TaskRun/PipelineRun such as the source + from where a remote Task/Pipeline definition was fetched. + type: string + enable_tekton_oci_bundles: + default: "false" + description: Setting this flag to 'true' enables the use of Tekton OCI + bundle. This is an experimental feature and thus should still be considered + an alpha feature. + type: string + require_git_ssh_secret_known_hosts: + default: "false" + description: Setting this flag to 'true' will require that any Git SSH + Secret offered to Tekton must have known_hosts included. + type: string + resource_verification_mode: + default: skip + description: Setting this flag to 'enforce' will enforce verification + of tasks/pipeline. Failing to verify will fail the taskrun/pipelinerun. + 'warn' will only log the err message and 'skip' will skip the whole + verification. + type: string + running_in_environment_with_injected_sidecars: + default: "true" + description: This option should be set to 'false' when Pipelines is + running in a cluster that does not use injected sidecars such as Istio. + Setting it to false should decrease the time it takes for a TaskRun + to start running. For clusters that use injected sidecars, setting + this option to false can lead to unexpected behavior. + type: string + send_cloudevents_for_runs: + default: "false" + description: Setting this flag to 'true' enables CloudEvents for Runs, + as long as a CloudEvents sink is configured in the config-defaults + config map. + type: string + type: object + type: object + version: 0.42.0