diff --git a/charts/redpanda/Chart.lock b/charts/redpanda/Chart.lock index b3c6c0a2a7..9b0e72b48f 100644 --- a/charts/redpanda/Chart.lock +++ b/charts/redpanda/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: console repository: https://charts.redpanda.com - version: 0.7.29 + version: 0.7.30 - name: connectors repository: https://charts.redpanda.com version: 0.1.13 -digest: sha256:3023f8ca61cf80050d0f0e73f9e86b73ae796717c651be8765c9db90996e5462 -generated: "2024-09-26T22:13:55.854012+02:00" +digest: sha256:f40126de897d3ec8d707b28408763bfad218f7c688575371f6fa3cb371eb884c +generated: "2024-10-16T12:27:15.358101+02:00" diff --git a/charts/redpanda/chart.go b/charts/redpanda/chart.go index 37b703ace5..1b87782e95 100644 --- a/charts/redpanda/chart.go +++ b/charts/redpanda/chart.go @@ -116,6 +116,8 @@ func render(dot *helmette.Dot) []kube.Object { manifests = append(manifests, obj) } + manifests = append(manifests, consoleChartIntegration(dot)...) + // NB: This slice may contain nil interfaces! // Filtering happens elsewhere, don't call this function directly if you // can avoid it. diff --git a/charts/redpanda/chart_test.go b/charts/redpanda/chart_test.go index 7afce18614..28a563fd07 100644 --- a/charts/redpanda/chart_test.go +++ b/charts/redpanda/chart_test.go @@ -14,6 +14,7 @@ import ( "time" "github.com/pkg/errors" + "github.com/redpanda-data/helm-charts/charts/console" "github.com/redpanda-data/helm-charts/charts/redpanda" "github.com/redpanda-data/helm-charts/pkg/gotohelm/helmette" "github.com/redpanda-data/helm-charts/pkg/helm" @@ -685,7 +686,7 @@ func TestLabels(t *testing.T) { values := &redpanda.PartialValues{ CommonLabels: labels, // This guarantee does not currently extend to console. - Console: &redpanda.PartialConsole{Enabled: ptr.To(false)}, + Console: &console.PartialValues{Enabled: ptr.To(false)}, // Nor connectors. Connectors: &redpanda.PartialConnectors{Enabled: ptr.To(false)}, } @@ -738,7 +739,9 @@ func TestGoHelmEquivalence(t *testing.T) { // TODO: Add additional cases for better coverage. Generating random inputs // generally results in invalid inputs. - var values redpanda.PartialValues + values := redpanda.PartialValues{ + Enterprise: &redpanda.PartialEnterprise{License: ptr.To("LICENSE_PLACEHOLDER")}, + } // We're not interested in tests, console, or connectors so always disable // those. @@ -748,7 +751,18 @@ func TestGoHelmEquivalence(t *testing.T) { Enabled: ptr.To(false), } - values.Console = &redpanda.PartialConsole{Enabled: ptr.To(false)} + values.Console = &console.PartialValues{ + Enabled: ptr.To(true), + Ingress: &console.PartialIngressConfig{ + Enabled: ptr.To(true), + }, + Secret: &console.PartialSecretConfig{ + Login: &console.PartialLoginSecrets{ + JWTSecret: ptr.To("JWT_PLACEHOLDER"), + }, + }, + Tests: &console.PartialEnableable{Enabled: ptr.To(false)}, + } values.Connectors = &redpanda.PartialConnectors{Enabled: ptr.To(false)} goObjs, err := redpanda.Chart.Render(kube.Config{}, helmette.Release{ @@ -780,7 +794,7 @@ func TestGoHelmEquivalence(t *testing.T) { return strings.Compare(aStr, bStr) }) - const stsIdx = 7 + const stsIdx = 12 // resource.Quantity is a special object. To Ensure they compare correctly, // we'll round trip it through JSON so the internal representations will diff --git a/charts/redpanda/configmap.tpl.go b/charts/redpanda/configmap.tpl.go index a78e012ada..ad266c324c 100644 --- a/charts/redpanda/configmap.tpl.go +++ b/charts/redpanda/configmap.tpl.go @@ -350,8 +350,8 @@ func rpkKafkaClientTLSConfiguration(dot *helmette.Dot) map[string]any { } if tls.RequireClientAuth { - result["cert_file"] = fmt.Sprintf("/etc/tls/certs/%s-client/tls.crt", Fullname(dot)) - result["key_file"] = fmt.Sprintf("/etc/tls/certs/%s-client/tls.key", Fullname(dot)) + result["cert_file"] = fmt.Sprintf("%s/%s-client/tls.crt", certificateMountPoint, Fullname(dot)) + result["key_file"] = fmt.Sprintf("%s/%s-client/tls.key", certificateMountPoint, Fullname(dot)) } return result @@ -374,8 +374,8 @@ func rpkAdminAPIClientTLSConfiguration(dot *helmette.Dot) map[string]any { } if tls.RequireClientAuth { - result["cert_file"] = fmt.Sprintf("/etc/tls/certs/%s-client/tls.crt", Fullname(dot)) - result["key_file"] = fmt.Sprintf("/etc/tls/certs/%s-client/tls.key", Fullname(dot)) + result["cert_file"] = fmt.Sprintf("%s/%s-client/tls.crt", certificateMountPoint, Fullname(dot)) + result["key_file"] = fmt.Sprintf("%s/%s-client/tls.key", certificateMountPoint, Fullname(dot)) } return result @@ -409,8 +409,8 @@ func kafkaClient(dot *helmette.Dot) map[string]any { } if kafkaTLS.RequireClientAuth { - brokerTLS["cert_file"] = fmt.Sprintf("/etc/tls/certs/%s-client/tls.crt", Fullname(dot)) - brokerTLS["key_file"] = fmt.Sprintf("/etc/tls/certs/%s-client/tls.key", Fullname(dot)) + brokerTLS["cert_file"] = fmt.Sprintf("%s/%s-client/tls.crt", certificateMountPoint, Fullname(dot)) + brokerTLS["key_file"] = fmt.Sprintf("%s/%s-client/tls.key", certificateMountPoint, Fullname(dot)) } } @@ -496,8 +496,8 @@ func rpcListenersTLS(dot *helmette.Dot) map[string]any { return map[string]any{ "enabled": true, - "cert_file": fmt.Sprintf("/etc/tls/certs/%s/tls.crt", certName), - "key_file": fmt.Sprintf("/etc/tls/certs/%s/tls.key", certName), + "cert_file": fmt.Sprintf("%s/%s/tls.crt", certificateMountPoint, certName), + "key_file": fmt.Sprintf("%s/%s/tls.key", certificateMountPoint, certName), "require_client_auth": r.TLS.RequireClientAuth, "truststore_file": r.TLS.TrustStoreFilePath(&values.TLS), } @@ -521,8 +521,8 @@ func createInternalListenerTLSCfg(tls *TLS, internal InternalTLS) map[string]any return map[string]any{ "name": "internal", "enabled": true, - "cert_file": fmt.Sprintf("/etc/tls/certs/%s/tls.crt", internal.Cert), - "key_file": fmt.Sprintf("/etc/tls/certs/%s/tls.key", internal.Cert), + "cert_file": fmt.Sprintf("%s/%s/tls.crt", certificateMountPoint, internal.Cert), + "key_file": fmt.Sprintf("%s/%s/tls.key", certificateMountPoint, internal.Cert), "require_client_auth": internal.RequireClientAuth, "truststore_file": internal.TrustStoreFilePath(tls), } diff --git a/charts/redpanda/console.tpl.go b/charts/redpanda/console.tpl.go index 910ea8f3f3..2f57c863be 100644 --- a/charts/redpanda/console.tpl.go +++ b/charts/redpanda/console.tpl.go @@ -20,10 +20,187 @@ import ( "fmt" "github.com/redpanda-data/console/backend/pkg/config" + "github.com/redpanda-data/helm-charts/charts/console" "github.com/redpanda-data/helm-charts/pkg/gotohelm/helmette" + "github.com/redpanda-data/helm-charts/pkg/kube" + corev1 "k8s.io/api/core/v1" + "k8s.io/utils/ptr" ) -func ConsoleConfig(dot *helmette.Dot) any { +// consoleChartIntegration plumbs redpanda connection information into the console subchart. +// It does this by calculating Kafka, Schema registry, Redpanda Admin API configuration +// from Redpanda chart values. +func consoleChartIntegration(dot *helmette.Dot) []kube.Object { + values := helmette.UnmarshalInto[Values](dot.Values) + + if !ptr.Deref(values.Console.Enabled, true) { + return nil + } + + consoleDot := dot.Subcharts["console"] + loadedValues := consoleDot.Values + + consoleValue := helmette.UnmarshalInto[console.Values](consoleDot.Values) + // Pass the same Redpanda License to Console + if license := GetLicenseLiteral(dot); license != "" && !ptr.Deref(values.Console.Secret.Create, false) { + consoleValue.Secret.Create = true + consoleValue.Secret.Enterprise = console.EnterpriseSecrets{License: ptr.To(license)} + } + + // Create console configuration based on Redpanda helm chart values. + if !ptr.Deref(values.Console.ConfigMap.Create, false) { + consoleValue.ConfigMap.Create = true + consoleValue.Console.Config = ConsoleConfig(dot) + } + + if !ptr.Deref(values.Console.Deployment.Create, false) { + consoleValue.Deployment.Create = true + + // Adopt Console entry point to use SASL user in Kafka, + // Schema Registry and Redpanda Admin API connection + if values.Auth.IsSASLEnabled() { + command := []string{ + "sh", + "-c", + "set -e; IFS=':' read -r KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM < <(grep \"\" $(find /mnt/users/* -print));" + + fmt.Sprintf(" KAFKA_SASL_MECHANISM=${KAFKA_SASL_MECHANISM:-%s};", SASLMechanism(dot)) + + " export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM;" + + " export KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME;" + + " export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD;" + + " export REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME;" + + " export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD;" + + " /app/console $@", + " --", + } + consoleValue.Deployment.Command = command + } + + // Create License reference for Console + if secret := GetLicenseSecretReference(dot); secret != nil { + consoleValue.Enterprise = console.Enterprise{ + LicenseSecretRef: console.SecretKeyRef{ + Name: secret.Name, + Key: secret.Key, + }, + } + } + + consoleValue.ExtraVolumes = consoleTLSVolumes(dot) + consoleValue.ExtraVolumeMounts = consoleTLSVolumesMounts(dot) + + consoleDot.Values = helmette.UnmarshalInto[helmette.Values](consoleValue) + cfg := console.ConfigMap(consoleDot) + if consoleValue.PodAnnotations == nil { + consoleValue.PodAnnotations = map[string]string{} + } + consoleValue.PodAnnotations["checksum-redpanda-chart/config"] = helmette.Sha256Sum(helmette.ToYaml(cfg)) + + } + + consoleDot.Values = helmette.UnmarshalInto[helmette.Values](consoleValue) + + manifests := []kube.Object{ + console.Secret(consoleDot), + console.ConfigMap(consoleDot), + console.Deployment(consoleDot), + } + + consoleDot.Values = loadedValues + + // NB: This slice may contain nil interfaces! + // Filtering happens elsewhere, don't call this function directly if you + // can avoid it. + return manifests +} + +func consoleTLSVolumesMounts(dot *helmette.Dot) []corev1.VolumeMount { + values := helmette.Unwrap[Values](dot.Values) + + mounts := []corev1.VolumeMount{} + + if sasl := values.Auth.SASL; sasl.Enabled && sasl.SecretRef != "" { + mounts = append(mounts, corev1.VolumeMount{ + Name: fmt.Sprintf("%s-users", Fullname(dot)), + MountPath: "/mnt/users", + ReadOnly: true, + }) + } + + if len(values.Listeners.TrustStores(&values.TLS)) > 0 { + mounts = append( + mounts, + corev1.VolumeMount{Name: "truststores", MountPath: TrustStoreMountPath, ReadOnly: true}, + ) + } + + visitedCert := map[string]bool{} + for _, tlsCfg := range []InternalTLS{ + values.Listeners.Kafka.TLS, + values.Listeners.SchemaRegistry.TLS, + values.Listeners.Admin.TLS, + } { + _, visited := visitedCert[tlsCfg.Cert] + if !tlsCfg.IsEnabled(&values.TLS) || visited { + continue + } + visitedCert[tlsCfg.Cert] = true + + mounts = append(mounts, corev1.VolumeMount{ + Name: fmt.Sprintf("redpanda-%s-cert", tlsCfg.Cert), + MountPath: fmt.Sprintf("%s/%s", certificateMountPoint, tlsCfg.Cert), + }) + } + + return mounts +} + +func consoleTLSVolumes(dot *helmette.Dot) []corev1.Volume { + values := helmette.Unwrap[Values](dot.Values) + + volumes := []corev1.Volume{} + + if sasl := values.Auth.SASL; sasl.Enabled && sasl.SecretRef != "" { + volumes = append(volumes, corev1.Volume{ + Name: fmt.Sprintf("%s-users", Fullname(dot)), + VolumeSource: corev1.VolumeSource{ + Secret: &corev1.SecretVolumeSource{ + SecretName: values.Auth.SASL.SecretRef, + }, + }, + }) + } + + if vol := values.Listeners.TrustStoreVolume(&values.TLS); vol != nil { + volumes = append(volumes, *vol) + } + + visitedCert := map[string]bool{} + for _, tlsCfg := range []InternalTLS{ + values.Listeners.Kafka.TLS, + values.Listeners.SchemaRegistry.TLS, + values.Listeners.Admin.TLS, + } { + _, visited := visitedCert[tlsCfg.Cert] + if !tlsCfg.IsEnabled(&values.TLS) || visited { + continue + } + visitedCert[tlsCfg.Cert] = true + + volumes = append(volumes, corev1.Volume{ + Name: fmt.Sprintf("redpanda-%s-cert", tlsCfg.Cert), + VolumeSource: corev1.VolumeSource{ + Secret: &corev1.SecretVolumeSource{ + DefaultMode: ptr.To[int32](0o420), + SecretName: CertSecretName(dot, tlsCfg.Cert, values.TLS.Certs.MustGet(tlsCfg.Cert)), + }, + }, + }) + } + + return volumes +} + +func ConsoleConfig(dot *helmette.Dot) map[string]any { values := helmette.Unwrap[Values](dot.Values) var schemaURLs []string @@ -42,13 +219,14 @@ func ConsoleConfig(dot *helmette.Dot) any { if values.Listeners.Admin.TLS.IsEnabled(&values.TLS) { schema = "https" } + c := map[string]any{ "kafka": map[string]any{ "brokers": BrokerList(dot, values.Statefulset.Replicas, values.Listeners.Kafka.Port), "sasl": map[string]any{ "enabled": values.Auth.IsSASLEnabled(), }, - "tls": values.Listeners.Kafka.ConsolemTLS(&values.TLS), + "tls": values.Listeners.Kafka.ConsoleTLS(&values.TLS), "schemaRegistry": map[string]any{ "enabled": values.Listeners.SchemaRegistry.Enabled, "urls": schemaURLs, @@ -105,6 +283,12 @@ func ConsoleConfig(dot *helmette.Dot) any { } } + if values.Console.Console == nil { + values.Console.Console = &console.PartialConsole{ + Config: map[string]any{}, + } + } + return helmette.Merge(values.Console.Console.Config, c) } diff --git a/charts/redpanda/helpers.go b/charts/redpanda/helpers.go index a38e935f83..6a56c96491 100644 --- a/charts/redpanda/helpers.go +++ b/charts/redpanda/helpers.go @@ -220,7 +220,7 @@ func CommonMounts(dot *helmette.Dot) []corev1.VolumeMount { mounts = append(mounts, corev1.VolumeMount{ Name: fmt.Sprintf("redpanda-%s-cert", name), - MountPath: fmt.Sprintf("/etc/tls/certs/%s", name), + MountPath: fmt.Sprintf("%s/%s", certificateMountPoint, name), }) } @@ -228,7 +228,7 @@ func CommonMounts(dot *helmette.Dot) []corev1.VolumeMount { if adminTLS.RequireClientAuth { mounts = append(mounts, corev1.VolumeMount{ Name: "mtls-client", - MountPath: fmt.Sprintf("/etc/tls/certs/%s-client", Fullname(dot)), + MountPath: fmt.Sprintf("%s/%s-client", certificateMountPoint, Fullname(dot)), }) } } diff --git a/charts/redpanda/secrets.go b/charts/redpanda/secrets.go index e6f0a7af5f..a9a41ca145 100644 --- a/charts/redpanda/secrets.go +++ b/charts/redpanda/secrets.go @@ -685,7 +685,7 @@ func adminTLSCurlFlags(dot *helmette.Dot) string { } if values.Listeners.Admin.TLS.RequireClientAuth { - path := fmt.Sprintf("/etc/tls/certs/%s-client", Fullname(dot)) + path := fmt.Sprintf("%s/%s-client", certificateMountPoint, Fullname(dot)) return fmt.Sprintf("--cacert %s/ca.crt --cert %s/tls.crt --key %s/tls.key", path, path, path) } diff --git a/charts/redpanda/templates/_chart.go.tpl b/charts/redpanda/templates/_chart.go.tpl index 88bb1f8d22..46f6423e12 100644 --- a/charts/redpanda/templates/_chart.go.tpl +++ b/charts/redpanda/templates/_chart.go.tpl @@ -53,6 +53,7 @@ {{- if $_is_returning -}} {{- break -}} {{- end -}} +{{- $manifests = (concat (default (list ) $manifests) (default (list ) (get (fromJson (include "redpanda.consoleChartIntegration" (dict "a" (list $dot) ))) "r"))) -}} {{- $_is_returning = true -}} {{- (dict "r" $manifests) | toJson -}} {{- break -}} diff --git a/charts/redpanda/templates/_configmap.go.tpl b/charts/redpanda/templates/_configmap.go.tpl index 5f234bfecd..5425d6e8ea 100644 --- a/charts/redpanda/templates/_configmap.go.tpl +++ b/charts/redpanda/templates/_configmap.go.tpl @@ -282,8 +282,8 @@ {{- end -}} {{- $result := (dict "ca_file" (get (fromJson (include "redpanda.InternalTLS.ServerCAPath" (dict "a" (list $tls $values.tls) ))) "r") ) -}} {{- if $tls.requireClientAuth -}} -{{- $_ := (set $result "cert_file" (printf "/etc/tls/certs/%s-client/tls.crt" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} -{{- $_ := (set $result "key_file" (printf "/etc/tls/certs/%s-client/tls.key" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} +{{- $_ := (set $result "cert_file" (printf "%s/%s-client/tls.crt" "/etc/tls/certs" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} +{{- $_ := (set $result "key_file" (printf "%s/%s-client/tls.key" "/etc/tls/certs" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} {{- end -}} {{- $_is_returning = true -}} {{- (dict "r" $result) | toJson -}} @@ -304,8 +304,8 @@ {{- end -}} {{- $result := (dict "ca_file" (get (fromJson (include "redpanda.InternalTLS.ServerCAPath" (dict "a" (list $tls $values.tls) ))) "r") ) -}} {{- if $tls.requireClientAuth -}} -{{- $_ := (set $result "cert_file" (printf "/etc/tls/certs/%s-client/tls.crt" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} -{{- $_ := (set $result "key_file" (printf "/etc/tls/certs/%s-client/tls.key" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} +{{- $_ := (set $result "cert_file" (printf "%s/%s-client/tls.crt" "/etc/tls/certs" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} +{{- $_ := (set $result "key_file" (printf "%s/%s-client/tls.key" "/etc/tls/certs" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} {{- end -}} {{- $_is_returning = true -}} {{- (dict "r" $result) | toJson -}} @@ -330,8 +330,8 @@ {{- if (get (fromJson (include "redpanda.InternalTLS.IsEnabled" (dict "a" (list $values.listeners.kafka.tls $values.tls) ))) "r") -}} {{- $brokerTLS = (dict "enabled" true "require_client_auth" $kafkaTLS.requireClientAuth "truststore_file" (get (fromJson (include "redpanda.InternalTLS.ServerCAPath" (dict "a" (list $kafkaTLS $values.tls) ))) "r") ) -}} {{- if $kafkaTLS.requireClientAuth -}} -{{- $_ := (set $brokerTLS "cert_file" (printf "/etc/tls/certs/%s-client/tls.crt" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} -{{- $_ := (set $brokerTLS "key_file" (printf "/etc/tls/certs/%s-client/tls.key" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} +{{- $_ := (set $brokerTLS "cert_file" (printf "%s/%s-client/tls.crt" "/etc/tls/certs" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} +{{- $_ := (set $brokerTLS "key_file" (printf "%s/%s-client/tls.key" "/etc/tls/certs" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r"))) -}} {{- end -}} {{- end -}} {{- $cfg := (dict "brokers" $brokerList ) -}} @@ -422,7 +422,7 @@ {{- end -}} {{- $certName := $r.tls.cert -}} {{- $_is_returning = true -}} -{{- (dict "r" (dict "enabled" true "cert_file" (printf "/etc/tls/certs/%s/tls.crt" $certName) "key_file" (printf "/etc/tls/certs/%s/tls.key" $certName) "require_client_auth" $r.tls.requireClientAuth "truststore_file" (get (fromJson (include "redpanda.InternalTLS.TrustStoreFilePath" (dict "a" (list $r.tls $values.tls) ))) "r") )) | toJson -}} +{{- (dict "r" (dict "enabled" true "cert_file" (printf "%s/%s/tls.crt" "/etc/tls/certs" $certName) "key_file" (printf "%s/%s/tls.key" "/etc/tls/certs" $certName) "require_client_auth" $r.tls.requireClientAuth "truststore_file" (get (fromJson (include "redpanda.InternalTLS.TrustStoreFilePath" (dict "a" (list $r.tls $values.tls) ))) "r") )) | toJson -}} {{- break -}} {{- end -}} {{- end -}} @@ -449,7 +449,7 @@ {{- break -}} {{- end -}} {{- $_is_returning = true -}} -{{- (dict "r" (dict "name" "internal" "enabled" true "cert_file" (printf "/etc/tls/certs/%s/tls.crt" $internal.cert) "key_file" (printf "/etc/tls/certs/%s/tls.key" $internal.cert) "require_client_auth" $internal.requireClientAuth "truststore_file" (get (fromJson (include "redpanda.InternalTLS.TrustStoreFilePath" (dict "a" (list $internal $tls) ))) "r") )) | toJson -}} +{{- (dict "r" (dict "name" "internal" "enabled" true "cert_file" (printf "%s/%s/tls.crt" "/etc/tls/certs" $internal.cert) "key_file" (printf "%s/%s/tls.key" "/etc/tls/certs" $internal.cert) "require_client_auth" $internal.requireClientAuth "truststore_file" (get (fromJson (include "redpanda.InternalTLS.TrustStoreFilePath" (dict "a" (list $internal $tls) ))) "r") )) | toJson -}} {{- break -}} {{- end -}} {{- end -}} diff --git a/charts/redpanda/templates/_console.go.tpl b/charts/redpanda/templates/_console.go.tpl index f8498e9986..bee783a823 100644 --- a/charts/redpanda/templates/_console.go.tpl +++ b/charts/redpanda/templates/_console.go.tpl @@ -1,5 +1,120 @@ {{- /* Generated from "console.tpl.go" */ -}} +{{- define "redpanda.consoleChartIntegration" -}} +{{- $dot := (index .a 0) -}} +{{- range $_ := (list 1) -}} +{{- $_is_returning := false -}} +{{- $values := $dot.Values -}} +{{- if (not (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $values.console.enabled true) ))) "r")) -}} +{{- $_is_returning = true -}} +{{- (dict "r" (coalesce nil)) | toJson -}} +{{- break -}} +{{- end -}} +{{- $consoleDot := (index $dot.Subcharts "console") -}} +{{- $loadedValues := $consoleDot.Values -}} +{{- $consoleValue := $consoleDot.Values -}} +{{- $license_1 := (get (fromJson (include "redpanda.GetLicenseLiteral" (dict "a" (list $dot) ))) "r") -}} +{{- if (and (ne $license_1 "") (not (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $values.console.secret.create false) ))) "r"))) -}} +{{- $_ := (set $consoleValue.secret "create" true) -}} +{{- $_ := (set $consoleValue.secret "enterprise" (mustMergeOverwrite (dict ) (dict "license" $license_1 ))) -}} +{{- end -}} +{{- if (not (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $values.console.configmap.create false) ))) "r")) -}} +{{- $_ := (set $consoleValue.configmap "create" true) -}} +{{- $_ := (set $consoleValue.console "config" (get (fromJson (include "redpanda.ConsoleConfig" (dict "a" (list $dot) ))) "r")) -}} +{{- end -}} +{{- if (not (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $values.console.deployment.create false) ))) "r")) -}} +{{- $_ := (set $consoleValue.deployment "create" true) -}} +{{- if (get (fromJson (include "redpanda.Auth.IsSASLEnabled" (dict "a" (list $values.auth) ))) "r") -}} +{{- $command := (list "sh" "-c" (printf "%s%s" (printf "%s%s" (printf "%s%s" (printf "%s%s" (printf "%s%s" (printf "%s%s" (printf "%s%s" "set -e; IFS=':' read -r KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM < <(grep \"\" $(find /mnt/users/* -print));" (printf " KAFKA_SASL_MECHANISM=${KAFKA_SASL_MECHANISM:-%s};" (get (fromJson (include "redpanda.SASLMechanism" (dict "a" (list $dot) ))) "r"))) " export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM;") " export KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME;") " export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD;") " export REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME;") " export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD;") " /app/console $@") " --") -}} +{{- $_ := (set $consoleValue.deployment "command" $command) -}} +{{- end -}} +{{- $secret_2 := (get (fromJson (include "redpanda.GetLicenseSecretReference" (dict "a" (list $dot) ))) "r") -}} +{{- if (ne (toJson $secret_2) "null") -}} +{{- $_ := (set $consoleValue "enterprise" (mustMergeOverwrite (dict "licenseSecretRef" (dict "name" "" "key" "" ) ) (dict "licenseSecretRef" (mustMergeOverwrite (dict "name" "" "key" "" ) (dict "name" $secret_2.name "key" $secret_2.key )) ))) -}} +{{- end -}} +{{- $_ := (set $consoleValue "extraVolumes" (get (fromJson (include "redpanda.consoleTLSVolumes" (dict "a" (list $dot) ))) "r")) -}} +{{- $_ := (set $consoleValue "extraVolumeMounts" (get (fromJson (include "redpanda.consoleTLSVolumesMounts" (dict "a" (list $dot) ))) "r")) -}} +{{- $_ := (set $consoleDot "Values" $consoleValue) -}} +{{- $cfg := (get (fromJson (include "console.ConfigMap" (dict "a" (list $consoleDot) ))) "r") -}} +{{- if (eq (toJson $consoleValue.podAnnotations) "null") -}} +{{- $_ := (set $consoleValue "podAnnotations" (dict )) -}} +{{- end -}} +{{- $_ := (set $consoleValue.podAnnotations "checksum-redpanda-chart/config" (sha256sum (toYaml $cfg))) -}} +{{- end -}} +{{- $_ := (set $consoleDot "Values" $consoleValue) -}} +{{- $manifests := (list (get (fromJson (include "console.Secret" (dict "a" (list $consoleDot) ))) "r") (get (fromJson (include "console.ConfigMap" (dict "a" (list $consoleDot) ))) "r") (get (fromJson (include "console.Deployment" (dict "a" (list $consoleDot) ))) "r")) -}} +{{- $_ := (set $consoleDot "Values" $loadedValues) -}} +{{- $_is_returning = true -}} +{{- (dict "r" $manifests) | toJson -}} +{{- break -}} +{{- end -}} +{{- end -}} + +{{- define "redpanda.consoleTLSVolumesMounts" -}} +{{- $dot := (index .a 0) -}} +{{- range $_ := (list 1) -}} +{{- $_is_returning := false -}} +{{- $values := $dot.Values.AsMap -}} +{{- $mounts := (list ) -}} +{{- $sasl_3 := $values.auth.sasl -}} +{{- if (and $sasl_3.enabled (ne $sasl_3.secretRef "")) -}} +{{- $mounts = (concat (default (list ) $mounts) (list (mustMergeOverwrite (dict "name" "" "mountPath" "" ) (dict "name" (printf "%s-users" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r")) "mountPath" "/mnt/users" "readOnly" true )))) -}} +{{- end -}} +{{- if (gt ((get (fromJson (include "_shims.len" (dict "a" (list (get (fromJson (include "redpanda.Listeners.TrustStores" (dict "a" (list $values.listeners $values.tls) ))) "r")) ))) "r") | int) (0 | int)) -}} +{{- $mounts = (concat (default (list ) $mounts) (list (mustMergeOverwrite (dict "name" "" "mountPath" "" ) (dict "name" "truststores" "mountPath" "/etc/truststores" "readOnly" true )))) -}} +{{- end -}} +{{- $visitedCert := (dict ) -}} +{{- range $_, $tlsCfg := (list $values.listeners.kafka.tls $values.listeners.schemaRegistry.tls $values.listeners.admin.tls) -}} +{{- $tmp_tuple_1 := (get (fromJson (include "_shims.compact" (dict "a" (list (get (fromJson (include "_shims.dicttest" (dict "a" (list $visitedCert $tlsCfg.cert (coalesce nil)) ))) "r")) ))) "r") -}} +{{- $visited := $tmp_tuple_1.T2 -}} +{{- if (or (not (get (fromJson (include "redpanda.InternalTLS.IsEnabled" (dict "a" (list $tlsCfg $values.tls) ))) "r")) $visited) -}} +{{- continue -}} +{{- end -}} +{{- $_ := (set $visitedCert $tlsCfg.cert true) -}} +{{- $mounts = (concat (default (list ) $mounts) (list (mustMergeOverwrite (dict "name" "" "mountPath" "" ) (dict "name" (printf "redpanda-%s-cert" $tlsCfg.cert) "mountPath" (printf "%s/%s" "/etc/tls/certs" $tlsCfg.cert) )))) -}} +{{- end -}} +{{- if $_is_returning -}} +{{- break -}} +{{- end -}} +{{- $_is_returning = true -}} +{{- (dict "r" $mounts) | toJson -}} +{{- break -}} +{{- end -}} +{{- end -}} + +{{- define "redpanda.consoleTLSVolumes" -}} +{{- $dot := (index .a 0) -}} +{{- range $_ := (list 1) -}} +{{- $_is_returning := false -}} +{{- $values := $dot.Values.AsMap -}} +{{- $volumes := (list ) -}} +{{- $sasl_4 := $values.auth.sasl -}} +{{- if (and $sasl_4.enabled (ne $sasl_4.secretRef "")) -}} +{{- $volumes = (concat (default (list ) $volumes) (list (mustMergeOverwrite (dict "name" "" ) (mustMergeOverwrite (dict ) (dict "secret" (mustMergeOverwrite (dict ) (dict "secretName" $values.auth.sasl.secretRef )) )) (dict "name" (printf "%s-users" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r")) )))) -}} +{{- end -}} +{{- $vol_5 := (get (fromJson (include "redpanda.Listeners.TrustStoreVolume" (dict "a" (list $values.listeners $values.tls) ))) "r") -}} +{{- if (ne (toJson $vol_5) "null") -}} +{{- $volumes = (concat (default (list ) $volumes) (list $vol_5)) -}} +{{- end -}} +{{- $visitedCert := (dict ) -}} +{{- range $_, $tlsCfg := (list $values.listeners.kafka.tls $values.listeners.schemaRegistry.tls $values.listeners.admin.tls) -}} +{{- $tmp_tuple_2 := (get (fromJson (include "_shims.compact" (dict "a" (list (get (fromJson (include "_shims.dicttest" (dict "a" (list $visitedCert $tlsCfg.cert (coalesce nil)) ))) "r")) ))) "r") -}} +{{- $visited := $tmp_tuple_2.T2 -}} +{{- if (or (not (get (fromJson (include "redpanda.InternalTLS.IsEnabled" (dict "a" (list $tlsCfg $values.tls) ))) "r")) $visited) -}} +{{- continue -}} +{{- end -}} +{{- $_ := (set $visitedCert $tlsCfg.cert true) -}} +{{- $volumes = (concat (default (list ) $volumes) (list (mustMergeOverwrite (dict "name" "" ) (mustMergeOverwrite (dict ) (dict "secret" (mustMergeOverwrite (dict ) (dict "defaultMode" (0o420 | int) "secretName" (get (fromJson (include "redpanda.CertSecretName" (dict "a" (list $dot $tlsCfg.cert (get (fromJson (include "redpanda.TLSCertMap.MustGet" (dict "a" (list (deepCopy $values.tls.certs) $tlsCfg.cert) ))) "r")) ))) "r") )) )) (dict "name" (printf "redpanda-%s-cert" $tlsCfg.cert) )))) -}} +{{- end -}} +{{- if $_is_returning -}} +{{- break -}} +{{- end -}} +{{- $_is_returning = true -}} +{{- (dict "r" $volumes) | toJson -}} +{{- break -}} +{{- end -}} +{{- end -}} + {{- define "redpanda.ConsoleConfig" -}} {{- $dot := (index .a 0) -}} {{- range $_ := (list 1) -}} @@ -22,12 +137,12 @@ {{- if (get (fromJson (include "redpanda.InternalTLS.IsEnabled" (dict "a" (list $values.listeners.admin.tls $values.tls) ))) "r") -}} {{- $schema = "https" -}} {{- end -}} -{{- $c := (dict "kafka" (dict "brokers" (get (fromJson (include "redpanda.BrokerList" (dict "a" (list $dot ($values.statefulset.replicas | int) ($values.listeners.kafka.port | int)) ))) "r") "sasl" (dict "enabled" (get (fromJson (include "redpanda.Auth.IsSASLEnabled" (dict "a" (list $values.auth) ))) "r") ) "tls" (get (fromJson (include "redpanda.KafkaListeners.ConsolemTLS" (dict "a" (list $values.listeners.kafka $values.tls) ))) "r") "schemaRegistry" (dict "enabled" $values.listeners.schemaRegistry.enabled "urls" $schemaURLs "tls" (get (fromJson (include "redpanda.SchemaRegistryListeners.ConsoleTLS" (dict "a" (list $values.listeners.schemaRegistry $values.tls) ))) "r") ) ) "redpanda" (dict "adminApi" (dict "enabled" true "urls" (list (printf "%s://%s:%d" $schema (get (fromJson (include "redpanda.InternalDomain" (dict "a" (list $dot) ))) "r") ($values.listeners.admin.port | int))) "tls" (get (fromJson (include "redpanda.AdminListeners.ConsoleTLS" (dict "a" (list $values.listeners.admin $values.tls) ))) "r") ) ) ) -}} +{{- $c := (dict "kafka" (dict "brokers" (get (fromJson (include "redpanda.BrokerList" (dict "a" (list $dot ($values.statefulset.replicas | int) ($values.listeners.kafka.port | int)) ))) "r") "sasl" (dict "enabled" (get (fromJson (include "redpanda.Auth.IsSASLEnabled" (dict "a" (list $values.auth) ))) "r") ) "tls" (get (fromJson (include "redpanda.KafkaListeners.ConsoleTLS" (dict "a" (list $values.listeners.kafka $values.tls) ))) "r") "schemaRegistry" (dict "enabled" $values.listeners.schemaRegistry.enabled "urls" $schemaURLs "tls" (get (fromJson (include "redpanda.SchemaRegistryListeners.ConsoleTLS" (dict "a" (list $values.listeners.schemaRegistry $values.tls) ))) "r") ) ) "redpanda" (dict "adminApi" (dict "enabled" true "urls" (list (printf "%s://%s:%d" $schema (get (fromJson (include "redpanda.InternalDomain" (dict "a" (list $dot) ))) "r") ($values.listeners.admin.port | int))) "tls" (get (fromJson (include "redpanda.AdminListeners.ConsoleTLS" (dict "a" (list $values.listeners.admin $values.tls) ))) "r") ) ) ) -}} {{- if $values.connectors.enabled -}} {{- $port := (dig "connectors" "connectors" "restPort" (8083 | int) $dot.Values.AsMap) -}} -{{- $tmp_tuple_1 := (get (fromJson (include "_shims.compact" (dict "a" (list (get (fromJson (include "_shims.asintegral" (dict "a" (list $port) ))) "r")) ))) "r") -}} -{{- $ok := $tmp_tuple_1.T2 -}} -{{- $p := ($tmp_tuple_1.T1 | int) -}} +{{- $tmp_tuple_3 := (get (fromJson (include "_shims.compact" (dict "a" (list (get (fromJson (include "_shims.asintegral" (dict "a" (list $port) ))) "r")) ))) "r") -}} +{{- $ok := $tmp_tuple_3.T2 -}} +{{- $p := ($tmp_tuple_3.T1 | int) -}} {{- if (not $ok) -}} {{- $_is_returning = true -}} {{- (dict "r" $c) | toJson -}} @@ -36,6 +151,9 @@ {{- $connectorsURL := (printf "http://%s.%s.svc.%s:%d" (get (fromJson (include "redpanda.ConnectorsFullName" (dict "a" (list $dot) ))) "r") $dot.Release.Namespace (trimSuffix "." $values.clusterDomain) $p) -}} {{- $_ := (set $c "connect" (mustMergeOverwrite (dict "enabled" false "clusters" (coalesce nil) "connectTimeout" 0 "readTimeout" 0 "requestTimeout" 0 ) (dict "enabled" $values.connectors.enabled "clusters" (list (mustMergeOverwrite (dict "name" "" "url" "" "tls" (dict "enabled" false "caFilepath" "" "certFilepath" "" "keyFilepath" "" "insecureSkipTlsVerify" false ) "username" "" "password" "" "token" "" ) (dict "name" "connectors" "url" $connectorsURL "tls" (mustMergeOverwrite (dict "enabled" false "caFilepath" "" "certFilepath" "" "keyFilepath" "" "insecureSkipTlsVerify" false ) (dict "enabled" false "caFilepath" "" "certFilepath" "" "keyFilepath" "" "insecureSkipTlsVerify" false )) "username" "" "password" "" "token" "" ))) ))) -}} {{- end -}} +{{- if (eq (toJson $values.console.console) "null") -}} +{{- $_ := (set $values.console "console" (mustMergeOverwrite (dict ) (dict "config" (dict ) ))) -}} +{{- end -}} {{- $_is_returning = true -}} {{- (dict "r" (merge (dict ) $values.console.console.config $c)) | toJson -}} {{- break -}} diff --git a/charts/redpanda/templates/_helpers.go.tpl b/charts/redpanda/templates/_helpers.go.tpl index 58805d14c5..0314d29a41 100644 --- a/charts/redpanda/templates/_helpers.go.tpl +++ b/charts/redpanda/templates/_helpers.go.tpl @@ -235,14 +235,14 @@ {{- if (not (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $cert.enabled true) ))) "r")) -}} {{- continue -}} {{- end -}} -{{- $mounts = (concat (default (list ) $mounts) (list (mustMergeOverwrite (dict "name" "" "mountPath" "" ) (dict "name" (printf "redpanda-%s-cert" $name) "mountPath" (printf "/etc/tls/certs/%s" $name) )))) -}} +{{- $mounts = (concat (default (list ) $mounts) (list (mustMergeOverwrite (dict "name" "" "mountPath" "" ) (dict "name" (printf "redpanda-%s-cert" $name) "mountPath" (printf "%s/%s" "/etc/tls/certs" $name) )))) -}} {{- end -}} {{- if $_is_returning -}} {{- break -}} {{- end -}} {{- $adminTLS := $values.listeners.admin.tls -}} {{- if $adminTLS.requireClientAuth -}} -{{- $mounts = (concat (default (list ) $mounts) (list (mustMergeOverwrite (dict "name" "" "mountPath" "" ) (dict "name" "mtls-client" "mountPath" (printf "/etc/tls/certs/%s-client" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r")) )))) -}} +{{- $mounts = (concat (default (list ) $mounts) (list (mustMergeOverwrite (dict "name" "" "mountPath" "" ) (dict "name" "mtls-client" "mountPath" (printf "%s/%s-client" "/etc/tls/certs" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r")) )))) -}} {{- end -}} {{- end -}} {{- $_is_returning = true -}} diff --git a/charts/redpanda/templates/_secrets.go.tpl b/charts/redpanda/templates/_secrets.go.tpl index 5b91c2ce61..7baaa0d4a7 100644 --- a/charts/redpanda/templates/_secrets.go.tpl +++ b/charts/redpanda/templates/_secrets.go.tpl @@ -332,7 +332,7 @@ echo "passed"`) -}} {{- break -}} {{- end -}} {{- if $values.listeners.admin.tls.requireClientAuth -}} -{{- $path := (printf "/etc/tls/certs/%s-client" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r")) -}} +{{- $path := (printf "%s/%s-client" "/etc/tls/certs" (get (fromJson (include "redpanda.Fullname" (dict "a" (list $dot) ))) "r")) -}} {{- $_is_returning = true -}} {{- (dict "r" (printf "--cacert %s/ca.crt --cert %s/tls.crt --key %s/tls.key" $path $path $path)) | toJson -}} {{- break -}} diff --git a/charts/redpanda/templates/_values.go.tpl b/charts/redpanda/templates/_values.go.tpl index 5b802d218b..386b647f67 100644 --- a/charts/redpanda/templates/_values.go.tpl +++ b/charts/redpanda/templates/_values.go.tpl @@ -602,7 +602,7 @@ {{- end -}} {{- if (get (fromJson (include "redpanda.TLSCertMap.MustGet" (dict "a" (list (deepCopy $tls.certs) $t.cert) ))) "r").caEnabled -}} {{- $_is_returning = true -}} -{{- (dict "r" (printf "/etc/tls/certs/%s/ca.crt" $t.cert)) | toJson -}} +{{- (dict "r" (printf "%s/%s/ca.crt" "/etc/tls/certs" $t.cert)) | toJson -}} {{- break -}} {{- end -}} {{- $_is_returning = true -}} @@ -618,11 +618,11 @@ {{- $_is_returning := false -}} {{- if (get (fromJson (include "redpanda.TLSCertMap.MustGet" (dict "a" (list (deepCopy $tls.certs) $t.cert) ))) "r").caEnabled -}} {{- $_is_returning = true -}} -{{- (dict "r" (printf "/etc/tls/certs/%s/ca.crt" $t.cert)) | toJson -}} +{{- (dict "r" (printf "%s/%s/ca.crt" "/etc/tls/certs" $t.cert)) | toJson -}} {{- break -}} {{- end -}} {{- $_is_returning = true -}} -{{- (dict "r" (printf "/etc/tls/certs/%s/tls.crt" $t.cert)) | toJson -}} +{{- (dict "r" (printf "%s/%s/tls.crt" "/etc/tls/certs" $t.cert)) | toJson -}} {{- break -}} {{- end -}} {{- end -}} @@ -663,7 +663,7 @@ {{- end -}} {{- if (get (fromJson (include "redpanda.ExternalTLS.GetCert" (dict "a" (list $t $i $tls) ))) "r").caEnabled -}} {{- $_is_returning = true -}} -{{- (dict "r" (printf "/etc/tls/certs/%s/ca.crt" (get (fromJson (include "redpanda.ExternalTLS.GetCertName" (dict "a" (list $t $i) ))) "r"))) | toJson -}} +{{- (dict "r" (printf "%s/%s/ca.crt" "/etc/tls/certs" (get (fromJson (include "redpanda.ExternalTLS.GetCertName" (dict "a" (list $t $i) ))) "r"))) | toJson -}} {{- break -}} {{- end -}} {{- $_is_returning = true -}} @@ -700,15 +700,19 @@ {{- (dict "r" $t) | toJson -}} {{- break -}} {{- end -}} -{{- $adminAPIPrefix := "/mnt/cert/adminapi" -}} -{{- $_ := (set $t "caFilepath" (printf "%s/%s/ca.crt" $adminAPIPrefix $l.tls.cert)) -}} +{{- $adminAPIPrefix := (printf "%s/%s" "/etc/tls/certs" $l.tls.cert) -}} +{{- if (get (fromJson (include "redpanda.TLSCertMap.MustGet" (dict "a" (list (deepCopy $tls.certs) $l.tls.cert) ))) "r").caEnabled -}} +{{- $_ := (set $t "caFilepath" (printf "%s/ca.crt" $adminAPIPrefix)) -}} +{{- else -}} +{{- $_ := (set $t "caFilepath" (printf "%s/tls.crt" $adminAPIPrefix)) -}} +{{- end -}} {{- if (not $l.tls.requireClientAuth) -}} {{- $_is_returning = true -}} {{- (dict "r" $t) | toJson -}} {{- break -}} {{- end -}} -{{- $_ := (set $t "certFilepath" (printf "%s/%s/tls.crt" $adminAPIPrefix $l.tls.cert)) -}} -{{- $_ := (set $t "keyFilepath" (printf "%s/%s/tls.key" $adminAPIPrefix $l.tls.cert)) -}} +{{- $_ := (set $t "certFilepath" (printf "%s/tls.crt" $adminAPIPrefix)) -}} +{{- $_ := (set $t "keyFilepath" (printf "%s/tls.key" $adminAPIPrefix)) -}} {{- $_is_returning = true -}} {{- (dict "r" $t) | toJson -}} {{- break -}} @@ -750,7 +754,7 @@ {{- continue -}} {{- end -}} {{- $certName := (get (fromJson (include "redpanda.ExternalTLS.GetCertName" (dict "a" (list $lis.tls $l.tls) ))) "r") -}} -{{- $admin = (concat (default (list ) $admin) (list (dict "name" $k "enabled" true "cert_file" (printf "/etc/tls/certs/%s/tls.crt" $certName) "key_file" (printf "/etc/tls/certs/%s/tls.key" $certName) "require_client_auth" (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $lis.tls.requireClientAuth false) ))) "r") "truststore_file" (get (fromJson (include "redpanda.ExternalTLS.TrustStoreFilePath" (dict "a" (list $lis.tls $l.tls $tls) ))) "r") ))) -}} +{{- $admin = (concat (default (list ) $admin) (list (dict "name" $k "enabled" true "cert_file" (printf "%s/%s/tls.crt" "/etc/tls/certs" $certName) "key_file" (printf "%s/%s/tls.key" "/etc/tls/certs" $certName) "require_client_auth" (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $lis.tls.requireClientAuth false) ))) "r") "truststore_file" (get (fromJson (include "redpanda.ExternalTLS.TrustStoreFilePath" (dict "a" (list $lis.tls $l.tls $tls) ))) "r") ))) -}} {{- end -}} {{- if $_is_returning -}} {{- break -}} @@ -848,7 +852,7 @@ {{- continue -}} {{- end -}} {{- $certName := (get (fromJson (include "redpanda.ExternalTLS.GetCertName" (dict "a" (list $lis.tls $l.tls) ))) "r") -}} -{{- $pp = (concat (default (list ) $pp) (list (dict "name" $k "enabled" true "cert_file" (printf "/etc/tls/certs/%s/tls.crt" $certName) "key_file" (printf "/etc/tls/certs/%s/tls.key" $certName) "require_client_auth" (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $lis.tls.requireClientAuth false) ))) "r") "truststore_file" (get (fromJson (include "redpanda.ExternalTLS.TrustStoreFilePath" (dict "a" (list $lis.tls $l.tls $tls) ))) "r") ))) -}} +{{- $pp = (concat (default (list ) $pp) (list (dict "name" $k "enabled" true "cert_file" (printf "%s/%s/tls.crt" "/etc/tls/certs" $certName) "key_file" (printf "%s/%s/tls.key" "/etc/tls/certs" $certName) "require_client_auth" (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $lis.tls.requireClientAuth false) ))) "r") "truststore_file" (get (fromJson (include "redpanda.ExternalTLS.TrustStoreFilePath" (dict "a" (list $lis.tls $l.tls $tls) ))) "r") ))) -}} {{- end -}} {{- if $_is_returning -}} {{- break -}} @@ -946,7 +950,7 @@ {{- continue -}} {{- end -}} {{- $certName := (get (fromJson (include "redpanda.ExternalTLS.GetCertName" (dict "a" (list $lis.tls $l.tls) ))) "r") -}} -{{- $kafka = (concat (default (list ) $kafka) (list (dict "name" $k "enabled" true "cert_file" (printf "/etc/tls/certs/%s/tls.crt" $certName) "key_file" (printf "/etc/tls/certs/%s/tls.key" $certName) "require_client_auth" (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $lis.tls.requireClientAuth false) ))) "r") "truststore_file" (get (fromJson (include "redpanda.ExternalTLS.TrustStoreFilePath" (dict "a" (list $lis.tls $l.tls $tls) ))) "r") ))) -}} +{{- $kafka = (concat (default (list ) $kafka) (list (dict "name" $k "enabled" true "cert_file" (printf "%s/%s/tls.crt" "/etc/tls/certs" $certName) "key_file" (printf "%s/%s/tls.key" "/etc/tls/certs" $certName) "require_client_auth" (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $lis.tls.requireClientAuth false) ))) "r") "truststore_file" (get (fromJson (include "redpanda.ExternalTLS.TrustStoreFilePath" (dict "a" (list $lis.tls $l.tls $tls) ))) "r") ))) -}} {{- end -}} {{- if $_is_returning -}} {{- break -}} @@ -982,7 +986,7 @@ {{- end -}} {{- end -}} -{{- define "redpanda.KafkaListeners.ConsolemTLS" -}} +{{- define "redpanda.KafkaListeners.ConsoleTLS" -}} {{- $k := (index .a 0) -}} {{- $tls := (index .a 1) -}} {{- range $_ := (list 1) -}} @@ -993,15 +997,19 @@ {{- (dict "r" $t) | toJson -}} {{- break -}} {{- end -}} -{{- $kafkaPathPrefix := "/mnt/cert/kafka" -}} -{{- $_ := (set $t "caFilepath" (printf "%s/%s/ca.crt" $kafkaPathPrefix $k.tls.cert)) -}} +{{- $kafkaPathPrefix := (printf "%s/%s" "/etc/tls/certs" $k.tls.cert) -}} +{{- if (get (fromJson (include "redpanda.TLSCertMap.MustGet" (dict "a" (list (deepCopy $tls.certs) $k.tls.cert) ))) "r").caEnabled -}} +{{- $_ := (set $t "caFilepath" (printf "%s/ca.crt" $kafkaPathPrefix)) -}} +{{- else -}} +{{- $_ := (set $t "caFilepath" (printf "%s/tls.crt" $kafkaPathPrefix)) -}} +{{- end -}} {{- if (not $k.tls.requireClientAuth) -}} {{- $_is_returning = true -}} {{- (dict "r" $t) | toJson -}} {{- break -}} {{- end -}} -{{- $_ := (set $t "certFilepath" (printf "%s/%s/tls.crt" $kafkaPathPrefix $k.tls.cert)) -}} -{{- $_ := (set $t "keyFilepath" (printf "%s/%s/tls.key" $kafkaPathPrefix $k.tls.cert)) -}} +{{- $_ := (set $t "certFilepath" (printf "%s/tls.crt" $kafkaPathPrefix)) -}} +{{- $_ := (set $t "keyFilepath" (printf "%s/tls.key" $kafkaPathPrefix)) -}} {{- $_is_returning = true -}} {{- (dict "r" $t) | toJson -}} {{- break -}} @@ -1070,7 +1078,7 @@ {{- continue -}} {{- end -}} {{- $certName := (get (fromJson (include "redpanda.ExternalTLS.GetCertName" (dict "a" (list $lis.tls $l.tls) ))) "r") -}} -{{- $listeners = (concat (default (list ) $listeners) (list (dict "name" $k "enabled" true "cert_file" (printf "/etc/tls/certs/%s/tls.crt" $certName) "key_file" (printf "/etc/tls/certs/%s/tls.key" $certName) "require_client_auth" (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $lis.tls.requireClientAuth false) ))) "r") "truststore_file" (get (fromJson (include "redpanda.ExternalTLS.TrustStoreFilePath" (dict "a" (list $lis.tls $l.tls $tls) ))) "r") ))) -}} +{{- $listeners = (concat (default (list ) $listeners) (list (dict "name" $k "enabled" true "cert_file" (printf "%s/%s/tls.crt" "/etc/tls/certs" $certName) "key_file" (printf "%s/%s/tls.key" "/etc/tls/certs" $certName) "require_client_auth" (get (fromJson (include "_shims.ptr_Deref" (dict "a" (list $lis.tls.requireClientAuth false) ))) "r") "truststore_file" (get (fromJson (include "redpanda.ExternalTLS.TrustStoreFilePath" (dict "a" (list $lis.tls $l.tls $tls) ))) "r") ))) -}} {{- end -}} {{- if $_is_returning -}} {{- break -}} @@ -1117,15 +1125,19 @@ {{- (dict "r" $t) | toJson -}} {{- break -}} {{- end -}} -{{- $schemaRegistryPrefix := "/mnt/cert/schemaregistry" -}} -{{- $_ := (set $t "caFilepath" (printf "%s/%s/ca.crt" $schemaRegistryPrefix $sr.tls.cert)) -}} +{{- $schemaRegistryPrefix := (printf "%s/%s" "/etc/tls/certs" $sr.tls.cert) -}} +{{- if (get (fromJson (include "redpanda.TLSCertMap.MustGet" (dict "a" (list (deepCopy $tls.certs) $sr.tls.cert) ))) "r").caEnabled -}} +{{- $_ := (set $t "caFilepath" (printf "%s/ca.crt" $schemaRegistryPrefix)) -}} +{{- else -}} +{{- $_ := (set $t "caFilepath" (printf "%s/tls.crt" $schemaRegistryPrefix)) -}} +{{- end -}} {{- if (not $sr.tls.requireClientAuth) -}} {{- $_is_returning = true -}} {{- (dict "r" $t) | toJson -}} {{- break -}} {{- end -}} -{{- $_ := (set $t "certFilepath" (printf "%s/%s/tls.crt" $schemaRegistryPrefix $sr.tls.cert)) -}} -{{- $_ := (set $t "keyFilepath" (printf "%s/%s/tls.key" $schemaRegistryPrefix $sr.tls.cert)) -}} +{{- $_ := (set $t "certFilepath" (printf "%s/tls.crt" $schemaRegistryPrefix)) -}} +{{- $_ := (set $t "keyFilepath" (printf "%s/tls.key" $schemaRegistryPrefix)) -}} {{- $_is_returning = true -}} {{- (dict "r" $t) | toJson -}} {{- break -}} diff --git a/charts/redpanda/templates/console/configmap-and-deployment.yaml b/charts/redpanda/templates/console/configmap-and-deployment.yaml deleted file mode 100644 index 0f4de4a71b..0000000000 --- a/charts/redpanda/templates/console/configmap-and-deployment.yaml +++ /dev/null @@ -1,239 +0,0 @@ -{{/* -Licensed to the Apache Software Foundation (ASF) under one or more -contributor license agreements. See the NOTICE file distributed with -this work for additional information regarding copyright ownership. -The ASF licenses this file to You under the Apache License, Version 2.0 -(the "License"); you may not use this file except in compliance with -the License. You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/}} - -{{/* Secret */}} -{{ $secretConfig := dict ( dict - "create" $.Values.console.secret.create - ) -}} -{{/* if the console chart has the creation of the secret disabled, create it here instead if needed */}} -{{ if and .Values.console.enabled (not .Values.console.secret.create) }} -{{ $licenseKey := ( include "enterprise-license" . ) }} -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. - {{ if ( not (empty $licenseKey ) ) }} -{{/* License and license are set twice here as a work around to a bug in the post-go console chart. */}} -{{ $secretConfig = ( dict - "create" true - "enterprise" ( dict "license" $licenseKey "License" $licenseKey) - ) -}} - -{{ $config := dict - "Values" (dict - "secret" $secretConfig - )}} - -{{ $secretValues := merge $config .Subcharts.console }} -{{ $wrappedSecretValues := (dict "Chart" .Subcharts.console.Chart "Release" .Release "Values" (dict "AsMap" $secretValues.Values)) }} ---- -{{- include "_shims.render-manifest" (list "console.Secret" $wrappedSecretValues) -}} - {{ end }} -{{ end }} - -{{ $configmap := dict }} -{{/* if the console chart has the creation of the configmap disabled, create it here instead */}} -{{ if and .Values.console.enabled (not .Values.console.configmap.create) }} -{{ $consoleConfigmap := dict "create" true }} - -{{ $consoleConfig := merge .Values.console.config (get ((include "redpanda.ConsoleConfig" (dict "a" (list .))) | fromJson) "r") }} - -{{ $config := dict - "Values" (dict - "console" (dict "config" $consoleConfig) - "configmap" $consoleConfigmap - "secret" $secretConfig - ) -}} - -{{ $configMapValues := merge $config .Subcharts.console }} ---- -{{- $wrappedSecretValues := (dict - "Chart" .Subcharts.console.Chart - "Release" .Release - "Values" (dict "AsMap" $configMapValues.Values) - "Template" (dict "BasePath" "" "Name" "") -) -}} -{{- include "_shims.render-manifest" (list "console.ConfigMap" $wrappedSecretValues) -}} -{{ $configmap = include "_shims.render-manifest" (list "console.ConfigMap" $wrappedSecretValues) }} -{{ end }} - -{{/* Deployment */}} -{{ if and .Values.console.enabled (not .Values.console.deployment.create) }} - -{{ $extraVolumes := list }} -{{ $extraVolumeMounts := list }} -{{ $command := list }} -{{ if (include "sasl-enabled" . | fromJson).bool }} - {{ $command = concat $command (list "sh" "-c") }} - {{ $consoleSASLConfig := (printf "set -e; IFS=':' read -r KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM < <(grep \"\" $(find /mnt/users/* -print)); KAFKA_SASL_MECHANISM=${KAFKA_SASL_MECHANISM:-%s}; export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM;" ( include "sasl-mechanism" . )) }} - {{ $consoleSASLConfig = cat $consoleSASLConfig " export KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME;" }} - {{ $consoleSASLConfig = cat $consoleSASLConfig " export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD;" }} - {{ $consoleSASLConfig = cat $consoleSASLConfig " export REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME;" }} - {{ $consoleSASLConfig = cat $consoleSASLConfig " export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD;" }} - {{ $consoleSASLConfig = cat $consoleSASLConfig " /app/console $@" }} - {{ $command = append $command $consoleSASLConfig }} - {{ $command = append $command "--" }} - {{ $extraVolumes = append $extraVolumes (dict - "name" (printf "%s-users" (include "redpanda.fullname" .)) - "secret" (dict - "secretName" .Values.auth.sasl.secretRef - ) - )}} - {{ $extraVolumeMounts = append $extraVolumeMounts (dict - "name" (printf "%s-users" (include "redpanda.fullname" .)) - "mountPath" "/mnt/users" - "readOnly" true - ) }} -{{ end }} - -{{ $kafkaTLS := list }} -{{ if (include "kafka-internal-tls-enabled" . | fromJson).bool }} - {{ $service := .Values.listeners.kafka }} - {{ $cert := get .Values.tls.certs $service.tls.cert }} - {{- $secretName := (printf "%s-%s-cert" (include "redpanda.fullname" .) $service.tls.cert) }} - {{- if $cert.secretRef }} - {{- $secretName = $cert.secretRef.name }} - {{- end }} - {{ if $cert.caEnabled }} - {{ $kafkaTLS = append $kafkaTLS (dict - "name" "KAFKA_TLS_CAFILEPATH" - "value" (printf "/mnt/cert/kafka/%s/ca.crt" $service.tls.cert) - )}} - {{ $extraVolumes = append $extraVolumes (dict - "name" (printf "kafka-%s-cert" $service.tls.cert) - "secret" (dict - "defaultMode" 0420 - "secretName" ( $secretName ) - ))}} - {{ $extraVolumeMounts = append $extraVolumeMounts (dict - "name" (printf "kafka-%s-cert" $service.tls.cert) - "mountPath" (printf "/mnt/cert/kafka/%s" $service.tls.cert) - "readOnly" true - )}} - {{ end }} -{{ end }} - -{{ $schemaRegistryTLS := list }} -{{ if (include "schemaRegistry-internal-tls-enabled" . | fromJson).bool }} - {{ $service := .Values.listeners.schemaRegistry }} - {{ $cert := get .Values.tls.certs $service.tls.cert }} - {{- $secretName := (printf "%s-%s-cert" (include "redpanda.fullname" .) $service.tls.cert) }} - {{- if $cert.secretRef }} - {{- $secretName = $cert.secretRef.name }} - {{- end }} - {{ if $cert.caEnabled }} - {{ $schemaRegistryTLS = append $schemaRegistryTLS (dict - "name" "KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH" - "value" (printf "/mnt/cert/schemaregistry/%s/ca.crt" $service.tls.cert) - )}} - {{ $extraVolumes = append $extraVolumes (dict - "name" (printf "schemaregistry-%s-cert" $service.tls.cert) - "secret" (dict - "defaultMode" 0420 - "secretName" ( $secretName ) - ))}} - {{ $extraVolumeMounts = append $extraVolumeMounts (dict - "name" (printf "schemaregistry-%s-cert" $service.tls.cert) - "mountPath" (printf "/mnt/cert/schemaregistry/%s" $service.tls.cert) - "readOnly" true - )}} - {{ end }} -{{ end }} - -{{ $adminAPI := list }} -{{ if (include "admin-internal-tls-enabled" . | fromJson).bool }} - {{ $service := .Values.listeners.admin }} - {{ $cert := get .Values.tls.certs $service.tls.cert }} - {{- $secretName := (printf "%s-%s-cert" (include "redpanda.fullname" .) $service.tls.cert) }} - {{- if $cert.secretRef }} - {{- $secretName = $cert.secretRef.name }} - {{- end }} - {{ if $cert.caEnabled }} - {{ $extraVolumes = append $extraVolumes (dict - "name" (printf "adminapi-%s-cert" $service.tls.cert) - "secret" (dict - "defaultMode" 0420 - "secretName" ( $secretName ) - ))}} - {{ $extraVolumeMounts = append $extraVolumeMounts (dict - "name" (printf "adminapi-%s-cert" $service.tls.cert) - "mountPath" (printf "/mnt/cert/adminapi/%s" $service.tls.cert) - "readOnly" true - )}} - {{ end }} -{{ end }} - -{{ $enterprise := dict }} -{{ if ( include "enterprise-secret" .) }} - {{ $enterprise = dict - "licenseSecretRef" ( dict - "name" ( include "enterprise-secret-name" . ) - "key" ( include "enterprise-secret-key" . ) - ) - }} -{{ end }} - -{{ $extraEnv := concat $kafkaTLS $schemaRegistryTLS $adminAPI .Values.console.extraEnv }} -{{ $extraVolumes = concat $extraVolumes .Values.console.extraVolumes }} -{{ $extraVolumeMounts = concat $extraVolumeMounts .Values.console.extraVolumeMounts }} -{{ $consoleValues := dict - "Values" (dict - "extraVolumes" $extraVolumes - "extraVolumeMounts" $extraVolumeMounts - "extraEnv" $extraEnv - "secret" $secretConfig - "enterprise" $enterprise - "image" $.Values.console.image - "autoscaling" .Values.console.autoscaling - "replicaCount" .Values.console.replicaCount - "strategy" .Values.console.strategy - "podAnnotations" .Values.console.podAnnotations - "podLabels" .Values.console.podLabels - "imagePullSecrets" .Values.console.imagePullSecrets - "podSecurityContext" .Values.console.podSecurityContext - "secretMounts" .Values.console.secretMounts - "initContainers" .Values.console.initContainers - "extraArgs" .Values.console.extraArgs - "securityContext" .Values.console.securityContext - "livenessProbe" .Values.console.livenessProbe - "readinessProbe" .Values.console.readinessProbe - "resources" .Values.console.resources - "extraContainers" .Values.console.extraContainers - "nodeSelector" .Values.console.nodeSelector - "affinity" .Values.console.affinity - "topologySpreadConstraints" .Values.console.topologySpreadConstraints - "priorityClassName" .Values.console.priorityClassName - "tolerations" .Values.console.tolerations -)}} - -{{ if not (empty $command) }} - {{ $consoleValues := merge $consoleValues (dict "Values" (dict "deployment" (dict "command" $command))) }} -{{ end }} -{{ $consoleValues := merge $consoleValues (dict "Values" (dict "deployment" (dict "create" (not .Values.console.deployment.create)))) }} - -{{ if and .Values.console.enabled (not .Values.console.configmap.create) }} -{{ $consoleValues := merge $consoleValues (dict "Values" (dict "podAnnotations" (dict "checksum-redpanda-chart/config" ( $configmap | toYaml | sha256sum )))) }} -{{ end }} - -{{ $deploymentValues := merge $consoleValues .Subcharts.console }} -{{ $wrappedDeploymentValues := (dict "Chart" .Subcharts.console.Chart "Release" .Release "Template" (dict "BasePath" "" "Name" "") "Values" (dict "AsMap" $deploymentValues.Values)) }} - ---- -{{- include "_shims.render-manifest" (list "console.Deployment" $wrappedDeploymentValues) -}} -{{ end }} diff --git a/charts/redpanda/testdata/template-cases.golden.txtar b/charts/redpanda/testdata/template-cases.golden.txtar index 5037d4b257..34a20fa8c3 100644 --- a/charts/redpanda/testdata/template-cases.golden.txtar +++ b/charts/redpanda/testdata/template-cases.golden.txtar @@ -22,7 +22,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -33,8 +33,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -228,59 +228,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -496,7 +443,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -506,8 +505,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -612,8 +611,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -623,8 +621,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -637,8 +635,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -650,13 +648,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -688,17 +682,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -711,15 +698,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -1057,11 +1036,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -1266,8 +1240,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -1406,7 +1380,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -1417,8 +1391,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -1604,55 +1578,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - http://redpanda-0.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - http://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -1782,7 +1707,55 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - http://redpanda-0.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - http://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -1792,8 +1765,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -1900,8 +1873,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -1911,8 +1883,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -1925,8 +1897,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 895351138cae180241f2817a18b3cd5a837629f917c3dbdb391cab2c9fecb2a4 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 20b69e8a263ca5fc132438b2cfebefbab20613dc46b937f2d576912f8bbace8b + checksum/config: 20b69e8a263ca5fc132438b2cfebefbab20613dc46b937f2d576912f8bbace8b creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -1940,7 +1912,7 @@ spec: command: null env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -1973,7 +1945,7 @@ spec: name: configs readOnly: true imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -2298,11 +2270,6 @@ spec: storage: 3Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/charts/console/templates/tests/test-connection.yaml apiVersion: v1 kind: Pod @@ -2313,8 +2280,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -2442,7 +2409,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -2453,8 +2420,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -2637,55 +2604,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -2878,7 +2796,55 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -2888,8 +2854,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -2994,8 +2960,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -3005,8 +2970,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -3019,8 +2984,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 11410ed158ed152574d88ce537b0c869fb8351cb1bd563b538e1d0136a68cdfa - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 8c3c11c4095817f18d6566fc52a723f092c546f487eb20cb9f5bda7f82e8089e + checksum/config: 8c3c11c4095817f18d6566fc52a723f092c546f487eb20cb9f5bda7f82e8089e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -3032,13 +2997,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -3070,17 +3031,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -3093,15 +3047,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -3439,11 +3385,6 @@ spec: storage: 3Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -3648,8 +3589,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -3787,7 +3728,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -3798,8 +3739,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -4115,55 +4056,6 @@ stringData: password: changeme type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: true - schemaRegistry: - enabled: true - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - http://redpanda-0.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - http://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -4299,7 +4191,55 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: true + schemaRegistry: + enabled: true + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - http://redpanda-0.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - http://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -4309,8 +4249,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -4415,8 +4355,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -4426,8 +4365,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -4440,8 +4379,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 1e16142159bcecafacda84c87d52e2389eb38261965ffdf4b369422f3059ba71 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 692034a9c4a568d670d4a6282ec6742b7f0265aeb80cadbba23c7e36c4872cf4 + checksum/config: 692034a9c4a568d670d4a6282ec6742b7f0265aeb80cadbba23c7e36c4872cf4 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -4457,14 +4396,14 @@ spec: - -c - set -e; IFS=':' read -r KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM < <(grep "" $(find /mnt/users/* -print)); KAFKA_SASL_MECHANISM=${KAFKA_SASL_MECHANISM:-SCRAM-SHA-512}; - export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export - KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; export - REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; /app/console - $@ - - -- + export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export + KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; + export REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; + /app/console $@ + - ' --' env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -4500,7 +4439,7 @@ spec: name: redpanda-users readOnly: true imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -4869,11 +4808,6 @@ spec: storage: 3Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/charts/console/templates/tests/test-connection.yaml apiVersion: v1 kind: Pod @@ -4884,8 +4818,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -5028,7 +4962,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -5039,8 +4973,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -5356,55 +5290,6 @@ stringData: password: changeme type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: true - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -5611,7 +5496,55 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: true + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -5621,8 +5554,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -5727,8 +5660,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -5738,8 +5670,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -5752,8 +5684,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 65863c7c89a027a8bd7647d75504b0cc672c1c99ee06770ec989a86cadabb9a9 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: f1bb97e1da0365508833900c59bbf8063a8b08138c59118de115810adbc6adc3 + checksum/config: f1bb97e1da0365508833900c59bbf8063a8b08138c59118de115810adbc6adc3 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -5769,18 +5701,14 @@ spec: - -c - set -e; IFS=':' read -r KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM < <(grep "" $(find /mnt/users/* -print)); KAFKA_SASL_MECHANISM=${KAFKA_SASL_MECHANISM:-SCRAM-SHA-512}; - export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export - KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; export - REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; /app/console - $@ - - -- - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export + KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; + export REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; + /app/console $@ + - ' --' + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -5815,17 +5743,10 @@ spec: - mountPath: /mnt/users name: redpanda-users readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -5841,15 +5762,7 @@ spec: - name: redpanda-users secret: secretName: redpanda-users - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -6231,11 +6144,6 @@ spec: storage: 3Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -6440,8 +6348,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -6596,7 +6504,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -6607,8 +6515,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -6824,59 +6732,6 @@ stringData: rpk --config "$CONFIG" redpanda config set redpanda.rack "${RACK}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -7093,6 +6948,58 @@ metadata: namespace: default --- # Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/templates/entry-point.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -7190,7 +7097,7 @@ subjects: name: redpanda namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -7200,8 +7107,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -7306,8 +7213,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -7317,8 +7223,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -7331,8 +7237,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -7344,13 +7250,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -7382,17 +7284,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -7405,15 +7300,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -7751,11 +7638,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -7960,8 +7842,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -8099,7 +7981,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -8110,8 +7992,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -8357,59 +8239,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[3] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - http://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - http://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - http://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -8633,7 +8462,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - http://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - http://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - http://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -8643,8 +8524,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -8779,8 +8660,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -8790,8 +8670,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -8804,8 +8684,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 885ad29f488ce929e8b7dbcefc063f9539ff6222addcbb0aed8c28c88073804e - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 3282a592e67bdd07fcf92b91d8f0f22719d50700c2e5770d7f7d2c64c82c1de3 + checksum/config: 3282a592e67bdd07fcf92b91d8f0f22719d50700c2e5770d7f7d2c64c82c1de3 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -8819,7 +8699,7 @@ spec: command: null env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -8851,11 +8731,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -8868,7 +8747,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -9230,11 +9109,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -9536,8 +9410,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -9681,7 +9555,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -9692,8 +9566,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -9887,59 +9761,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -10155,7 +9976,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -10165,8 +10038,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -10271,8 +10144,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -10282,8 +10154,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -10296,8 +10168,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -10309,13 +10181,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -10347,17 +10215,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -10370,15 +10231,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -10715,11 +10568,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -10924,8 +10772,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -11063,7 +10911,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -11074,8 +10922,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -11324,59 +11172,6 @@ stringData: echo "passed" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -11592,7 +11387,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -11602,8 +11449,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -11708,8 +11555,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -11719,8 +11565,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -11733,8 +11579,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -11746,13 +11592,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -11784,17 +11626,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -11807,15 +11642,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -12237,11 +12064,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -12446,8 +12268,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -12585,7 +12407,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -12596,8 +12418,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -12791,59 +12613,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -13059,7 +12828,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -13069,8 +12890,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -13175,8 +12996,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -13186,8 +13006,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -13200,8 +13020,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -13213,13 +13033,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -13251,17 +13067,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -13274,15 +13083,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -13620,11 +13421,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -13833,8 +13629,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -13972,7 +13768,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -13983,8 +13779,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -14315,59 +14111,6 @@ stringData: password: changeme type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: true - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -14595,7 +14338,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: true + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -14605,8 +14400,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -14711,8 +14506,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -14722,8 +14516,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -14736,8 +14530,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 4007d2775ef209d95445aae9091252dbc6a59caa90054071c08682609ab4d5f0 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: ce88ec0458ba329e35796c95e19d51ba8af720c7b41dad5d25ec41c233c4d354 + checksum/config: ce88ec0458ba329e35796c95e19d51ba8af720c7b41dad5d25ec41c233c4d354 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -14753,18 +14547,14 @@ spec: - -c - set -e; IFS=':' read -r KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM < <(grep "" $(find /mnt/users/* -print)); KAFKA_SASL_MECHANISM=${KAFKA_SASL_MECHANISM:-SCRAM-SHA-512}; - export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export - KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; export - REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; /app/console - $@ - - -- - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export + KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; + export REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; + /app/console $@ + - ' --' + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -14799,17 +14589,10 @@ spec: - mountPath: /mnt/users name: redpanda-users readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -14825,15 +14608,7 @@ spec: - name: redpanda-users secret: secretName: some-users - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -15215,11 +14990,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -15424,8 +15194,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -15580,7 +15350,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -15591,8 +15361,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -15786,59 +15556,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -16054,7 +15771,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -16064,8 +15833,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -16170,8 +15939,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -16181,8 +15949,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -16195,8 +15963,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -16208,13 +15976,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -16246,17 +16010,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -16269,15 +16026,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -16615,11 +16364,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -16729,8 +16473,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -16868,7 +16612,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -16879,8 +16623,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -17074,59 +16818,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -17342,7 +17033,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -17352,8 +17095,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -17545,8 +17288,7 @@ spec: sessionAffinity: None type: LoadBalancer --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -17556,8 +17298,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -17570,8 +17312,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -17583,13 +17325,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -17621,17 +17359,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -17644,15 +17375,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -17990,11 +17713,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -18104,8 +17822,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -18243,7 +17961,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -18254,8 +17972,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -18449,59 +18167,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - http://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - http://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - http://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - http://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -18651,7 +18316,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - http://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - http://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - http://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - http://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -18661,8 +18378,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -18767,8 +18484,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -18778,8 +18494,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -18792,8 +18508,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 37deb802dbedb43b95fe086f12a7b0e1722fbe1646fceaccc1a9a029ebe3a27f - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 52702122b5fd400071d966af9d0d1690f134906b34d3e6c2c28014d626117705 + checksum/config: 52702122b5fd400071d966af9d0d1690f134906b34d3e6c2c28014d626117705 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -18807,7 +18523,7 @@ spec: command: null env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -18840,7 +18556,7 @@ spec: name: configs readOnly: true imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -19162,11 +18878,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor @@ -19205,8 +18916,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -19332,7 +19043,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -19343,8 +19054,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -19538,59 +19249,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -19806,7 +19464,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -19816,8 +19526,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -19922,8 +19632,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -19933,8 +19642,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -19947,8 +19656,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -19960,13 +19669,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -19998,17 +19703,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -20021,15 +19719,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -20367,11 +20057,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -20608,8 +20293,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -20747,7 +20432,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -20758,8 +20443,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -20953,59 +20638,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -21222,6 +20854,58 @@ metadata: namespace: default --- # Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/templates/entry-point.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -21451,7 +21135,7 @@ subjects: name: default namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -21461,8 +21145,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -21567,8 +21251,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -21578,8 +21261,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -21592,8 +21275,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -21605,13 +21288,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -21643,17 +21322,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -21666,15 +21338,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -22027,11 +21691,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -22236,8 +21895,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -22375,7 +22034,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -22386,8 +22045,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -22581,59 +22240,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -22849,7 +22455,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -22859,8 +22517,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -22965,8 +22623,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -22976,8 +22633,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -22990,8 +22647,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -23003,13 +22660,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -23041,17 +22694,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -23064,15 +22710,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -23413,11 +23051,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -23622,8 +23255,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -23761,7 +23394,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -23772,8 +23405,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -23967,59 +23600,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -24235,7 +23815,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -24245,8 +23877,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -24351,8 +23983,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -24362,8 +23993,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -24376,8 +24007,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -24389,13 +24020,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -24427,17 +24054,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -24450,15 +24070,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -24796,11 +24408,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -25009,8 +24616,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -25148,7 +24755,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -25159,50 +24766,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_SAMPLE_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -25393,58 +24961,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_SAMPLE_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -25667,7 +25220,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -25677,8 +25282,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -25783,8 +25388,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -25794,8 +25398,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -25808,8 +25412,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -25822,10 +25426,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -25872,17 +25472,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -25898,15 +25491,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -26265,11 +25850,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -26474,8 +26054,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -26615,7 +26195,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -26626,50 +26206,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_SAMPLE_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -26860,58 +26401,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_SAMPLE_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -27135,7 +26661,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -27145,8 +26723,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -27251,8 +26829,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -27262,8 +26839,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -27276,8 +26853,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -27290,10 +26867,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -27340,17 +26913,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -27366,15 +26932,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -27733,11 +27291,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -27942,8 +27495,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -28083,7 +27636,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -28094,50 +27647,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_SAMPLE_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -28328,58 +27842,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_SAMPLE_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -28601,7 +28100,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -28611,8 +28162,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -28717,8 +28268,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -28728,8 +28278,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -28742,8 +28292,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -28756,10 +28306,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -28806,17 +28352,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -28832,15 +28371,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -29200,11 +28731,6 @@ spec: storageClassName: managed-csi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -29409,8 +28935,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -29550,7 +29076,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -29561,8 +29087,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -29756,59 +29282,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -30029,7 +29502,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -30039,8 +29564,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -30145,8 +29670,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -30156,8 +29680,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -30170,8 +29694,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -30183,11 +29707,7 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] image: redpandadata/console-unstable:master-8a51854 imagePullPolicy: IfNotPresent @@ -30221,17 +29741,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -30244,15 +29757,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -30612,11 +30117,6 @@ spec: storageClassName: managed-csi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -30821,8 +30321,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -30960,7 +30460,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -30971,50 +30471,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_SAMPLE_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -31205,58 +30666,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_SAMPLE_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -31479,7 +30925,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -31489,8 +30987,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -31595,8 +31093,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -31606,8 +31103,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -31620,8 +31117,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -31634,10 +31131,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -31684,17 +31177,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -31710,15 +31196,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -32089,11 +31567,6 @@ spec: storage: 5368709120 status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -32298,8 +31771,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -32439,7 +31912,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -32450,50 +31923,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_SAMPLE_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -32684,58 +32118,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_SAMPLE_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -32959,7 +32378,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -32969,8 +32440,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -33075,8 +32546,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -33086,8 +32556,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -33100,8 +32570,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -33114,10 +32584,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -33164,17 +32630,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -33190,15 +32649,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -33569,11 +33020,6 @@ spec: storage: 5368709120 status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -33778,8 +33224,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -33919,7 +33365,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -33930,50 +33376,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_SAMPLE_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -34164,58 +33571,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_SAMPLE_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -34437,7 +33829,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -34447,8 +33891,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -34553,8 +33997,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -34564,8 +34007,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -34578,8 +34021,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -34592,10 +34035,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -34642,17 +34081,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -34668,15 +34100,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -35049,11 +34473,6 @@ spec: storageClassName: managed-csi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -35258,8 +34677,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -35399,7 +34818,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -35410,8 +34829,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -35605,59 +35024,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -35878,7 +35244,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -35888,8 +35306,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -35994,8 +35412,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -36005,8 +35422,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -36019,8 +35436,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -36032,11 +35449,7 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] image: redpandadata/console-unstable:master-8a51854 imagePullPolicy: IfNotPresent @@ -36070,17 +35483,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -36093,15 +35499,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -36474,11 +35872,6 @@ spec: storageClassName: managed-csi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -36683,8 +36076,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -36822,7 +36215,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -36833,50 +36226,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_SAMPLE_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -37067,58 +36421,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_SAMPLE_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -37341,7 +36680,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -37351,8 +36742,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -37457,8 +36848,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -37468,8 +36858,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -37482,8 +36872,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -37496,10 +36886,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -37546,17 +36932,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -37572,15 +36951,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -37951,11 +37322,6 @@ spec: storage: 5368709120 status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -38160,8 +37526,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -38301,7 +37667,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -38312,50 +37678,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_SAMPLE_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -38546,58 +37873,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_SAMPLE_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -38821,7 +38133,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -38831,8 +38195,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -38937,8 +38301,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -38948,8 +38311,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -38962,8 +38325,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -38976,10 +38339,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -39026,17 +38385,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -39052,15 +38404,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -39431,11 +38775,6 @@ spec: storage: 5368709120 status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -39640,8 +38979,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -39781,7 +39120,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -39792,50 +39131,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_SAMPLE_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -40026,58 +39326,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_SAMPLE_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -40299,7 +39584,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -40309,8 +39646,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -40415,8 +39752,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -40426,8 +39762,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -40440,8 +39776,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -40454,10 +39790,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -40504,17 +39836,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -40530,15 +39855,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -40911,11 +40228,6 @@ spec: storageClassName: managed-csi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -41120,8 +40432,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -41261,7 +40573,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -41272,8 +40584,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -41467,59 +40779,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -41740,7 +40999,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -41750,8 +41061,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -41856,8 +41167,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -41867,8 +41177,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -41881,8 +41191,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -41894,11 +41204,7 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] image: redpandadata/console-unstable:master-8a51854 imagePullPolicy: IfNotPresent @@ -41932,17 +41238,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -41955,15 +41254,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -42336,11 +41627,6 @@ spec: storageClassName: managed-csi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -42545,8 +41831,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -42684,7 +41970,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -42695,8 +41981,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -42890,59 +42176,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -43158,7 +42391,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -43168,8 +42453,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -43274,8 +42559,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -43285,8 +42569,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -43299,8 +42583,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -43312,13 +42596,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -43350,17 +42630,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -43373,15 +42646,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -43719,11 +42984,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -43928,8 +43188,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -44067,7 +43327,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -44078,8 +43338,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -44273,59 +43533,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -44541,7 +43748,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -44551,8 +43810,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -44657,8 +43916,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -44668,8 +43926,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -44682,8 +43940,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -44695,13 +43953,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -44733,17 +43987,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -44756,15 +44003,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -45103,11 +44342,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -45312,8 +44546,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -45451,7 +44685,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -45462,8 +44696,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -45657,59 +44891,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -45925,7 +45106,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -45935,8 +45168,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -46041,8 +45274,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -46052,8 +45284,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -46066,8 +45298,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -46079,13 +45311,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -46117,17 +45345,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -46140,15 +45361,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -46492,11 +45705,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -46701,8 +45909,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -46840,7 +46048,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -46851,8 +46059,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -47116,61 +46324,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[3] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - - redpanda-3.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-3.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -47375,7 +46528,61 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + - redpanda-3.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-3.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -47385,8 +46592,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -47511,8 +46718,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -47522,8 +46728,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -47536,8 +46742,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 9ae1260f14e2391b79f2d023b159e46afa8b1d7f4438ce8f9597941d907b3533 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 8f95415d2dcbc543d08ce05d719ebd623c9ded6071ff97ca45913a155c206b68 + checksum/config: 8f95415d2dcbc543d08ce05d719ebd623c9ded6071ff97ca45913a155c206b68 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -47549,11 +46755,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -47585,14 +46789,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -47605,11 +46805,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -47955,11 +47151,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -48164,8 +47355,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -48306,7 +47497,7 @@ spec: redpanda.com/testing-samples: sample redpanda.com/testing-samples-two: two --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -48317,8 +47508,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -48512,59 +47703,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -48780,7 +47918,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -48790,8 +47980,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -48902,8 +48092,7 @@ spec: redpanda.com/testing-samples-two: two type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -48913,8 +48102,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -48927,8 +48116,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -48940,13 +48129,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -48978,17 +48163,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -49001,15 +48179,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -49359,11 +48529,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -49568,8 +48733,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -49707,7 +48872,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -49718,8 +48883,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -49913,59 +49078,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -50182,6 +49294,58 @@ metadata: namespace: default --- # Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/templates/entry-point.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -50411,7 +49575,7 @@ subjects: name: default namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -50421,8 +49585,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -50527,8 +49691,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -50538,8 +49701,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -50552,8 +49715,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -50565,13 +49728,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -50603,17 +49762,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -50626,15 +49778,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -50999,11 +50143,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -51208,8 +50347,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -51347,7 +50486,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -51358,8 +50497,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -51608,59 +50747,6 @@ stringData: echo "passed" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -51877,6 +50963,58 @@ metadata: namespace: default --- # Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/templates/entry-point.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -52008,7 +51146,7 @@ subjects: name: default namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -52018,8 +51156,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -52124,8 +51262,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -52135,8 +51272,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -52149,8 +51286,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -52162,13 +51299,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -52200,17 +51333,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -52223,15 +51349,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -52610,11 +51728,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -52819,8 +51932,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -52958,7 +52071,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -52969,8 +52082,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -53164,76 +52277,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - connect: - clusters: - - name: connectors - password: "" - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - token: "" - url: http://redpanda-connectors.default.svc.cluster.local:8083 - username: "" - connectTimeout: 0 - enabled: true - readTimeout: 0 - requestTimeout: 0 - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -53449,6 +52492,75 @@ metadata: name: redpanda-rpk namespace: default --- +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + connect: + clusters: + - name: connectors + password: "" + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + token: "" + url: http://redpanda-connectors.default.svc.cluster.local:8083 + username: "" + connectTimeout: 0 + enabled: true + readTimeout: 0 + requestTimeout: 0 + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- # Source: redpanda/charts/connectors/templates/service.yaml apiVersion: v1 kind: Service @@ -53481,7 +52593,7 @@ spec: sessionAffinity: None type: ClusterIP --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -53491,8 +52603,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -53753,8 +52865,7 @@ spec: sizeLimit: 5Mi name: rp-connect-tmp --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -53764,8 +52875,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -53778,8 +52889,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: b22919d0130d0b5d8d29e11d30b2119a0639739f5643b7ce1e9f94e38de30c6e - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 71a88dc7a5147c97b5b7f51931035e1aa62cdceb27860879d1681e5b80d057fe + checksum/config: 71a88dc7a5147c97b5b7f51931035e1aa62cdceb27860879d1681e5b80d057fe creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -53791,13 +52902,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -53829,17 +52936,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -53852,15 +52952,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -54198,11 +53290,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -54407,8 +53494,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -54546,7 +53633,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -54557,8 +53644,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -54752,59 +53839,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -55020,7 +54054,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -55030,8 +54116,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -55136,8 +54222,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -55147,8 +54232,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -55161,8 +54246,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -55174,13 +54259,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -55212,17 +54293,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -55235,15 +54309,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -55581,11 +54647,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -55794,8 +54855,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -55934,7 +54995,7 @@ spec: redpanda.com/poddisruptionbudget: redpanda test: test --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -55945,8 +55006,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -56140,59 +55201,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.change-name.default.svc.cluster.local.:9093 - - redpanda-1.change-name.default.svc.cluster.local.:9093 - - redpanda-2.change-name.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.change-name.default.svc.cluster.local.:8081 - - https://redpanda-1.change-name.default.svc.cluster.local.:8081 - - https://redpanda-2.change-name.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://change-name.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -56408,7 +55416,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.change-name.default.svc.cluster.local.:9093 + - redpanda-1.change-name.default.svc.cluster.local.:9093 + - redpanda-2.change-name.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.change-name.default.svc.cluster.local.:8081 + - https://redpanda-1.change-name.default.svc.cluster.local.:8081 + - https://redpanda-2.change-name.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://change-name.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -56418,8 +55478,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -56527,8 +55587,7 @@ spec: test: test type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -56538,8 +55597,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -56552,8 +55611,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 1173e85b7289a3ba46f9dffa93e6bbdce0f1f3663a87d6a743ab682692a93e5f - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: fa1725ee7497d23c6e014fc22d082cb9ca57326ebc8e97207ef9d9af72750381 + checksum/config: fa1725ee7497d23c6e014fc22d082cb9ca57326ebc8e97207ef9d9af72750381 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -56565,13 +55624,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -56603,17 +55658,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -56626,15 +55674,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -56976,11 +56016,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -57216,8 +56251,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -57355,7 +56390,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -57366,8 +56401,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -57561,59 +56596,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -57829,7 +56811,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -57839,8 +56873,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -57945,8 +56979,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -57956,8 +56989,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -57970,8 +57003,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -57983,13 +57016,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -58021,17 +57050,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -58044,15 +57066,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -58405,11 +57419,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -58614,8 +57623,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -58772,7 +57781,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -58783,8 +57792,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -58978,59 +57987,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -59246,7 +58202,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -59256,8 +58264,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -59362,8 +58370,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -59373,8 +58380,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -59387,8 +58394,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -59400,13 +58407,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -59438,17 +58441,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -59461,15 +58457,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -59822,11 +58810,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -60031,8 +59014,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -60191,7 +59174,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -60202,8 +59185,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -60397,59 +59380,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -60665,7 +59595,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -60675,8 +59657,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -60781,8 +59763,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -60792,8 +59773,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -60806,8 +59787,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -60819,13 +59800,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -60857,17 +59834,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -60880,15 +59850,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -61228,11 +60190,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -61437,8 +60394,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -62852,7 +61809,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -62863,8 +61820,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -63058,59 +62015,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -63326,7 +62230,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -63336,8 +62292,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -63442,8 +62398,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -63453,8 +62408,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -63467,8 +62422,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -63480,13 +62435,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -63518,17 +62469,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -63541,15 +62485,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -63887,11 +62823,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -64040,8 +62971,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -64179,7 +63110,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -64190,50 +63121,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -64557,58 +63449,43 @@ stringData: password: changeme type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: true - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -64847,7 +63724,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: true + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -64857,8 +63786,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -64963,8 +63892,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -64974,8 +63902,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -64988,8 +63916,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 4007d2775ef209d95445aae9091252dbc6a59caa90054071c08682609ab4d5f0 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: ce88ec0458ba329e35796c95e19d51ba8af720c7b41dad5d25ec41c233c4d354 + checksum/config: ce88ec0458ba329e35796c95e19d51ba8af720c7b41dad5d25ec41c233c4d354 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -65005,16 +63933,12 @@ spec: - -c - set -e; IFS=':' read -r KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM < <(grep "" $(find /mnt/users/* -print)); KAFKA_SASL_MECHANISM=${KAFKA_SASL_MECHANISM:-SCRAM-SHA-512}; - export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export - KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; export - REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; /app/console - $@ - - -- + export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export + KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; + export REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; + /app/console $@ + - ' --' env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -65026,7 +63950,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -65064,17 +63988,10 @@ spec: - mountPath: /mnt/users name: redpanda-users readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -65093,15 +64010,7 @@ spec: - name: redpanda-users secret: secretName: redpanda-users - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -65483,11 +64392,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -65692,8 +64596,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -65850,7 +64754,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -65861,50 +64765,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: eyJ2ZXJzaW9uIjogMCwgIm9yZyI6ICJSZWRwYW5kYSIsICJ0eXBlIjogMSwgImV4cGlyeSI6IDE3NjA0MjY5MzN9.P+GOdmWF5AE+6sKQ3nVS/weocxzDIZtgyIAe4oYUl6LCnjWK6iWxCjZJaTTyjVTIMKQ0RYHHviLymaD9Qrk8D/orlEi4OMmwGYzWxPJfjK4vY2ZXhRLAFEtkNiIKZdoMLcsrZm4GXgEIe4BiWluENNsp60C9ZwN2jKr9uYvks25uFFu9aeymRU6L9dqzr1La44XVRdy8kJClbg2DgSH7AdguQmumzuXLItihxYQaRzSIv4/KcCxuxn+Ti4jibOPJ0EQtphezIB/ujsBGaeChMifx0XaiWvHVJku1XJN8oV2Z+Y+F+rDEfWXqgY0F3H4qmV3QjGN5mDGyTFqqNseKBA== - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -66228,58 +65093,43 @@ stringData: password: changeme type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: true - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: eyJ2ZXJzaW9uIjogMCwgIm9yZyI6ICJSZWRwYW5kYSIsICJ0eXBlIjogMSwgImV4cGlyeSI6IDE3NjA0MjY5MzN9.P+GOdmWF5AE+6sKQ3nVS/weocxzDIZtgyIAe4oYUl6LCnjWK6iWxCjZJaTTyjVTIMKQ0RYHHviLymaD9Qrk8D/orlEi4OMmwGYzWxPJfjK4vY2ZXhRLAFEtkNiIKZdoMLcsrZm4GXgEIe4BiWluENNsp60C9ZwN2jKr9uYvks25uFFu9aeymRU6L9dqzr1La44XVRdy8kJClbg2DgSH7AdguQmumzuXLItihxYQaRzSIv4/KcCxuxn+Ti4jibOPJ0EQtphezIB/ujsBGaeChMifx0XaiWvHVJku1XJN8oV2Z+Y+F+rDEfWXqgY0F3H4qmV3QjGN5mDGyTFqqNseKBA== + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -66518,7 +65368,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: true + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -66528,8 +65430,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -66634,8 +65536,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -66645,8 +65546,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -66659,8 +65560,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 4007d2775ef209d95445aae9091252dbc6a59caa90054071c08682609ab4d5f0 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: ce88ec0458ba329e35796c95e19d51ba8af720c7b41dad5d25ec41c233c4d354 + checksum/config: ce88ec0458ba329e35796c95e19d51ba8af720c7b41dad5d25ec41c233c4d354 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -66676,16 +65577,12 @@ spec: - -c - set -e; IFS=':' read -r KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM < <(grep "" $(find /mnt/users/* -print)); KAFKA_SASL_MECHANISM=${KAFKA_SASL_MECHANISM:-SCRAM-SHA-512}; - export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export - KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; export - REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; /app/console - $@ - - -- + export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export + KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; + export REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; + /app/console $@ + - ' --' env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -66697,7 +65594,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -66735,17 +65632,10 @@ spec: - mountPath: /mnt/users name: redpanda-users readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -66764,15 +65654,7 @@ spec: - name: redpanda-users secret: secretName: redpanda-users - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -67154,11 +66036,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -67363,8 +66240,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -67521,7 +66398,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -67532,50 +66409,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ${REDPANDA_LICENSE} - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -67766,58 +66604,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ${REDPANDA_LICENSE} + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -68034,7 +66857,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -68044,8 +66919,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -68150,8 +67025,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -68161,8 +67035,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -68175,8 +67049,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -68189,10 +67063,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -68204,7 +67074,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -68239,17 +67109,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -68265,15 +67128,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -68611,11 +67466,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -68820,8 +67670,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -68961,7 +67811,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -68972,50 +67822,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: eyJ2ZXJzaW9uIjogMCwgIm9yZyI6ICJSZWRwYW5kYSIsICJ0eXBlIjogMSwgImV4cGlyeSI6IDE3NjA0MjY5MzN9.P+GOdmWF5AE+6sKQ3nVS/weocxzDIZtgyIAe4oYUl6LCnjWK6iWxCjZJaTTyjVTIMKQ0RYHHviLymaD9Qrk8D/orlEi4OMmwGYzWxPJfjK4vY2ZXhRLAFEtkNiIKZdoMLcsrZm4GXgEIe4BiWluENNsp60C9ZwN2jKr9uYvks25uFFu9aeymRU6L9dqzr1La44XVRdy8kJClbg2DgSH7AdguQmumzuXLItihxYQaRzSIv4/KcCxuxn+Ti4jibOPJ0EQtphezIB/ujsBGaeChMifx0XaiWvHVJku1XJN8oV2Z+Y+F+rDEfWXqgY0F3H4qmV3QjGN5mDGyTFqqNseKBA== - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -69206,58 +68017,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: eyJ2ZXJzaW9uIjogMCwgIm9yZyI6ICJSZWRwYW5kYSIsICJ0eXBlIjogMSwgImV4cGlyeSI6IDE3NjA0MjY5MzN9.P+GOdmWF5AE+6sKQ3nVS/weocxzDIZtgyIAe4oYUl6LCnjWK6iWxCjZJaTTyjVTIMKQ0RYHHviLymaD9Qrk8D/orlEi4OMmwGYzWxPJfjK4vY2ZXhRLAFEtkNiIKZdoMLcsrZm4GXgEIe4BiWluENNsp60C9ZwN2jKr9uYvks25uFFu9aeymRU6L9dqzr1La44XVRdy8kJClbg2DgSH7AdguQmumzuXLItihxYQaRzSIv4/KcCxuxn+Ti4jibOPJ0EQtphezIB/ujsBGaeChMifx0XaiWvHVJku1XJN8oV2Z+Y+F+rDEfWXqgY0F3H4qmV3QjGN5mDGyTFqqNseKBA== + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -69474,7 +68270,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -69484,8 +68332,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -69590,8 +68438,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -69601,8 +68448,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -69615,8 +68462,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -69629,10 +68476,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -69644,7 +68487,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -69679,17 +68522,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -69705,15 +68541,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -70051,11 +68879,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -70260,8 +69083,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -70401,7 +69224,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -70412,8 +69235,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -70607,59 +69430,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -70875,7 +69645,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -70885,8 +69707,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -70991,8 +69813,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -71002,8 +69823,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -71016,8 +69837,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -71030,17 +69851,13 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LICENSE valueFrom: secretKeyRef: key: license-key name: redpanda-license envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -71072,17 +69889,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -71095,15 +69905,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -71441,11 +70243,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -71650,8 +70447,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -73283,7 +72080,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -73294,8 +72091,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -73489,59 +72286,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -73757,7 +72501,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -73767,8 +72563,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -73873,8 +72669,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -73884,8 +72679,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -73898,8 +72693,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -73911,13 +72706,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -73949,17 +72740,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -73972,15 +72756,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -74319,11 +73095,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -74528,8 +73299,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -74668,7 +73439,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -74679,8 +73450,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -74874,59 +73645,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -75142,7 +73860,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -75152,8 +73922,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -75258,8 +74028,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -75269,8 +74038,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -75283,8 +74052,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -75296,13 +74065,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -75334,17 +74099,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -75357,15 +74115,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -75704,11 +74454,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -75913,8 +74658,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -76053,7 +74798,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -76064,8 +74809,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -76259,59 +75004,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -76527,7 +75219,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -76537,8 +75281,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -76643,8 +75387,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -76654,8 +75397,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -76668,8 +75411,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -76681,13 +75424,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -76719,17 +75458,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -76742,15 +75474,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -77088,11 +75812,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -77297,8 +76016,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -77436,7 +76155,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -77447,8 +76166,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -77778,59 +76497,6 @@ stringData: password: changeme type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: true - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -78057,7 +76723,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: true + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -78067,8 +76785,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -78173,8 +76891,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -78184,8 +76901,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -78198,8 +76915,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 4007d2775ef209d95445aae9091252dbc6a59caa90054071c08682609ab4d5f0 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: ce88ec0458ba329e35796c95e19d51ba8af720c7b41dad5d25ec41c233c4d354 + checksum/config: ce88ec0458ba329e35796c95e19d51ba8af720c7b41dad5d25ec41c233c4d354 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -78215,18 +76932,14 @@ spec: - -c - set -e; IFS=':' read -r KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM < <(grep "" $(find /mnt/users/* -print)); KAFKA_SASL_MECHANISM=${KAFKA_SASL_MECHANISM:-SCRAM-SHA-512}; - export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export - KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; export - REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; /app/console - $@ - - -- - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + export KAFKA_SASL_USERNAME KAFKA_SASL_PASSWORD KAFKA_SASL_MECHANISM; export + KAFKA_SCHEMAREGISTRY_USERNAME=$KAFKA_SASL_USERNAME; export KAFKA_SCHEMAREGISTRY_PASSWORD=$KAFKA_SASL_PASSWORD; + export REDPANDA_ADMINAPI_USERNAME=$KAFKA_SASL_USERNAME; export REDPANDA_ADMINAPI_PASSWORD=$KAFKA_SASL_PASSWORD; + /app/console $@ + - ' --' + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -78261,17 +76974,10 @@ spec: - mountPath: /mnt/users name: redpanda-users readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -78287,15 +76993,7 @@ spec: - name: redpanda-users secret: secretName: redpanda-users - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -78677,11 +77375,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -78886,8 +77579,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -79066,7 +77759,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -79077,8 +77770,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -79272,59 +77965,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -79540,7 +78180,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -79550,8 +78242,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -79656,8 +78348,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -79667,8 +78358,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -79681,8 +78372,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -79694,13 +78385,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -79732,17 +78419,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -79755,15 +78435,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -80101,11 +78773,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -80310,8 +78977,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -80449,7 +79116,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -80460,50 +79127,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ATOTALLYVALIDLICENSE - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -80694,58 +79322,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ATOTALLYVALIDLICENSE + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -80961,7 +79574,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -80971,8 +79636,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -81077,8 +79742,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -81088,8 +79752,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -81102,8 +79766,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -81116,10 +79780,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -81131,7 +79791,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -81166,17 +79826,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -81192,15 +79845,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -81538,11 +80183,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -81747,8 +80387,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -81888,7 +80528,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -81899,8 +80539,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -82100,59 +80740,6 @@ stringData: rpk --config "$CONFIG" redpanda config set redpanda.rack "${RACK}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -82367,7 +80954,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -82377,8 +81016,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -82483,8 +81122,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -82494,8 +81132,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -82508,8 +81146,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -82521,13 +81159,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -82559,17 +81193,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -82582,15 +81209,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -82928,11 +81547,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -83137,8 +81751,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -83288,7 +81902,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -83299,8 +81913,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -83494,59 +82108,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -83762,7 +82323,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -83772,8 +82385,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -83878,8 +82491,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -83889,8 +82501,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -83903,8 +82515,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -83916,13 +82528,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -83954,17 +82562,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -83977,15 +82578,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -84323,11 +82916,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -84532,8 +83120,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -84671,7 +83259,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -84682,50 +83270,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ATOTALLYVALIDLICENSE - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -84916,58 +83465,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ATOTALLYVALIDLICENSE + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -85183,7 +83717,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -85193,8 +83779,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -85299,8 +83885,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -85310,8 +83895,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -85324,8 +83909,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -85338,10 +83923,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -85353,7 +83934,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -85388,17 +83969,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -85414,15 +83988,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -85760,11 +84326,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -85969,8 +84530,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -86110,7 +84671,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -86121,8 +84682,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -86322,59 +84883,6 @@ stringData: rpk --config "$CONFIG" redpanda config set redpanda.rack "${RACK}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -86589,7 +85097,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -86599,8 +85159,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -86705,8 +85265,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -86716,8 +85275,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -86730,8 +85289,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -86743,13 +85302,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -86781,17 +85336,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -86804,15 +85352,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -87150,11 +85690,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -87359,8 +85894,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -87498,7 +86033,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -87509,8 +86044,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -87704,59 +86239,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -87972,7 +86454,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -87982,8 +86516,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -88088,8 +86622,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -88099,8 +86632,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -88113,8 +86646,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -88126,13 +86659,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -88164,17 +86693,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -88187,15 +86709,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -88533,11 +87047,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -88742,8 +87251,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -88881,7 +87390,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -88892,50 +87401,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ATOTALLYVALIDLICENSE - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -89126,58 +87596,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ATOTALLYVALIDLICENSE + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -89393,7 +87848,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -89403,8 +87910,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -89509,8 +88016,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -89520,8 +88026,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -89534,8 +88040,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -89548,10 +88054,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -89563,7 +88065,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -89598,17 +88100,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -89624,15 +88119,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -89970,11 +88457,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -90179,8 +88661,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -90320,7 +88802,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -90331,8 +88813,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -90532,59 +89014,6 @@ stringData: rpk --config "$CONFIG" redpanda config set redpanda.rack "${RACK}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -90799,7 +89228,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -90809,8 +89290,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -90915,8 +89396,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -90926,8 +89406,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -90940,8 +89420,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -90953,13 +89433,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -90991,17 +89467,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -91014,15 +89483,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -91360,11 +89821,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -91569,8 +90025,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -91708,7 +90164,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -91719,8 +90175,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -91914,59 +90370,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -92182,7 +90585,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -92192,8 +90647,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -92298,8 +90753,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -92309,8 +90763,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -92323,8 +90777,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -92336,13 +90790,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -92374,17 +90824,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -92397,15 +90840,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -92743,11 +91178,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -92952,8 +91382,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -93091,7 +91521,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -93102,50 +91532,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ATOTALLYVALIDLICENSE - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -93336,58 +91727,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ATOTALLYVALIDLICENSE + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -93603,7 +91979,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -93613,8 +92041,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -93719,8 +92147,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -93730,8 +92157,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -93744,8 +92171,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -93758,10 +92185,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -93773,7 +92196,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -93808,17 +92231,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -93834,15 +92250,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -94180,11 +92588,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -94389,8 +92792,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -94530,7 +92933,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -94541,8 +92944,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -94742,59 +93145,6 @@ stringData: rpk --config "$CONFIG" redpanda config set redpanda.rack "${RACK}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -95009,7 +93359,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -95019,8 +93421,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -95125,8 +93527,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -95136,8 +93537,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -95150,8 +93551,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -95163,13 +93564,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -95201,17 +93598,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -95224,15 +93614,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -95570,11 +93952,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -95779,8 +94156,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -95918,7 +94295,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -95929,8 +94306,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -96124,59 +94501,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -96393,7 +94717,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -96403,8 +94779,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -96509,8 +94885,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -96520,8 +94895,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -96534,8 +94909,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -96547,13 +94922,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -96585,17 +94956,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -96608,15 +94972,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -96954,11 +95310,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -97163,8 +95514,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -97302,7 +95653,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -97313,50 +95664,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ATOTALLYVALIDLICENSE - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -97547,58 +95859,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ATOTALLYVALIDLICENSE + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -97815,7 +96112,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -97825,8 +96174,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -97931,8 +96280,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -97942,8 +96290,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -97956,8 +96304,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -97970,10 +96318,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -97985,7 +96329,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -98020,17 +96364,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -98046,15 +96383,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -98392,11 +96721,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -98601,8 +96925,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -98742,7 +97066,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -98753,8 +97077,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -98954,59 +97278,6 @@ stringData: rpk --config "$CONFIG" redpanda config set redpanda.rack "${RACK}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -99222,7 +97493,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -99232,8 +97555,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -99338,8 +97661,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -99349,8 +97671,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -99363,8 +97685,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -99376,13 +97698,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -99414,17 +97732,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -99437,15 +97748,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -99783,11 +98086,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -99992,8 +98290,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -100131,7 +98429,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -100142,8 +98440,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -100337,59 +98635,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -100606,7 +98851,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -100616,8 +98913,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -100722,8 +99019,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -100733,8 +99029,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -100747,8 +99043,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -100760,13 +99056,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -100798,17 +99090,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -100821,15 +99106,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -101167,11 +99444,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -101376,8 +99648,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -101515,7 +99787,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -101526,50 +99798,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ATOTALLYVALIDLICENSE - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -101760,58 +99993,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ATOTALLYVALIDLICENSE + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -102028,7 +100246,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -102038,8 +100308,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -102144,8 +100414,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -102155,8 +100424,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -102169,8 +100438,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -102183,10 +100452,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -102198,7 +100463,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -102233,17 +100498,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -102259,15 +100517,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -102605,11 +100855,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -102814,8 +101059,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -102955,7 +101200,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -102966,8 +101211,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -103167,59 +101412,6 @@ stringData: rpk --config "$CONFIG" redpanda config set redpanda.rack "${RACK}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -103435,7 +101627,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -103445,8 +101689,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -103551,8 +101795,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -103562,8 +101805,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -103576,8 +101819,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -103589,13 +101832,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -103627,17 +101866,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -103650,15 +101882,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -103996,11 +102220,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -104205,8 +102424,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -104344,7 +102563,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -104355,8 +102574,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -104550,59 +102769,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -104818,7 +102984,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -104828,8 +103046,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -104934,8 +103152,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -104945,8 +103162,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -104959,8 +103176,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -104972,13 +103189,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -105010,17 +103223,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -105033,15 +103239,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: some-secret - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: some-secret - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: some-secret @@ -105379,11 +103577,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/charts/console/templates/tests/test-connection.yaml apiVersion: v1 kind: Pod @@ -105394,8 +103587,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -105533,7 +103726,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -105544,8 +103737,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -105739,59 +103932,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/for-internal/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/for-internal/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -106007,7 +104147,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/for-internal/tls.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/for-internal/tls.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -106017,8 +104209,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -106123,8 +104315,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -106134,8 +104325,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -106148,8 +104339,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 05b42942b3c17de0dc4a36c918f79702d8043e49e145165261299c2ec672d694 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: dbcfabd7ee8196e67d185922194f112445b1cbb060593ec5b494f8572213fae6 + checksum/config: dbcfabd7ee8196e67d185922194f112445b1cbb060593ec5b494f8572213fae6 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -106163,7 +104354,7 @@ spec: command: null env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -106195,11 +104386,12 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/for-internal + name: redpanda-for-internal-cert + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -106212,7 +104404,11 @@ spec: - configMap: name: redpanda-console name: configs - - name: adminapi-default-cert + - name: redpanda-for-internal-cert + secret: + defaultMode: 272 + secretName: some-secret + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -106550,11 +104746,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/charts/console/templates/tests/test-connection.yaml apiVersion: v1 kind: Pod @@ -106565,8 +104756,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -106704,7 +104895,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: false kind: ServiceAccount @@ -106715,8 +104906,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -106926,59 +105117,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -107194,7 +105332,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -107204,8 +105394,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -107310,8 +105500,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -107321,8 +105510,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -107335,8 +105524,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -107348,13 +105537,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -107386,17 +105571,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -107409,15 +105587,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -107755,11 +105925,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -107964,8 +106129,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -108103,7 +106268,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -108114,8 +106279,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -108309,76 +106474,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - connect: - clusters: - - name: connectors - password: "" - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - token: "" - url: http://redpanda-connectors.default.svc.cluster.local:8083 - username: "" - connectTimeout: 0 - enabled: true - readTimeout: 0 - requestTimeout: 0 - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -108594,6 +106689,75 @@ metadata: name: redpanda-rpk namespace: default --- +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + connect: + clusters: + - name: connectors + password: "" + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + token: "" + url: http://redpanda-connectors.default.svc.cluster.local:8083 + username: "" + connectTimeout: 0 + enabled: true + readTimeout: 0 + requestTimeout: 0 + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- # Source: redpanda/charts/connectors/templates/service.yaml apiVersion: v1 kind: Service @@ -108626,7 +106790,7 @@ spec: sessionAffinity: None type: ClusterIP --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -108636,8 +106800,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -108906,8 +107070,7 @@ spec: sizeLimit: 5Mi name: rp-connect-tmp --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -108917,8 +107080,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -108931,8 +107094,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: b22919d0130d0b5d8d29e11d30b2119a0639739f5643b7ce1e9f94e38de30c6e - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 71a88dc7a5147c97b5b7f51931035e1aa62cdceb27860879d1681e5b80d057fe + checksum/config: 71a88dc7a5147c97b5b7f51931035e1aa62cdceb27860879d1681e5b80d057fe creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -108944,13 +107107,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -108982,17 +107141,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -109005,15 +107157,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -109351,11 +107495,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -109560,8 +107699,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -109832,7 +107971,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: false kind: ServiceAccount @@ -109843,8 +107982,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -110054,59 +108193,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -110322,7 +108408,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -110332,8 +108470,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -110438,8 +108576,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -110449,8 +108586,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -110463,8 +108600,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -110476,13 +108613,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -110514,17 +108647,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -110537,15 +108663,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -110883,11 +109001,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -111092,8 +109205,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -111231,7 +109344,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -111242,8 +109355,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -111463,59 +109576,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[2] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -111767,7 +109827,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -111777,8 +109889,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -111903,8 +110015,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -111914,8 +110025,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -111928,8 +110039,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -111941,13 +110052,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -111979,17 +110086,13 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert + - mountPath: /etc/truststores + name: truststores readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -112002,15 +110105,41 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: truststores + projected: + sources: + - configMap: + items: + - key: other.crt + path: configmaps/admin-cm-other.crt + - key: my-admin.crt + path: configmaps/admin-cm-my-admin.crt + name: admin-cm + - configMap: + items: + - key: ca.crt + path: configmaps/http-cm-ca.crt + - key: my-http.crt + path: configmaps/http-cm-my-http.crt + name: http-cm + - configMap: + items: + - key: ca.crt + path: configmaps/my-ca-bundle-ca.crt + name: my-ca-bundle + - secret: + items: + - key: my-kafka.crt + path: secrets/kafka-secret-my-kafka.crt + name: kafka-secret + - secret: + items: + - key: ca.crt + path: secrets/sr-secret-ca.crt + - key: my-sr.crt + path: secrets/sr-secret-my-sr.crt + name: sr-secret + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -112393,11 +110522,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -112602,8 +110726,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -112741,7 +110865,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -112752,8 +110876,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -112947,59 +111071,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/kafka-internal-0/ca.crt - certFilepath: /mnt/cert/kafka/kafka-internal-0/tls.crt - enabled: true - insecureSkipTlsVerify: false - keyFilepath: /mnt/cert/kafka/kafka-internal-0/tls.key - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -113224,7 +111295,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/kafka-internal-0/ca.crt + certFilepath: /etc/tls/certs/kafka-internal-0/tls.crt + enabled: true + insecureSkipTlsVerify: false + keyFilepath: /etc/tls/certs/kafka-internal-0/tls.key + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -113234,8 +111357,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -113340,8 +111463,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -113351,8 +111473,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -113365,8 +111487,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 26fe8c5f310f568555877033931dddedfe7064bac17a33bce02c16287aba76c1 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: a8fa53066e6dcb3d43acd876c6ac7c72c15902fd3a60c0735cd522360a6305fc + checksum/config: a8fa53066e6dcb3d43acd876c6ac7c72c15902fd3a60c0735cd522360a6305fc creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -113378,13 +111500,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/kafka-internal-0/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -113416,17 +111534,12 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/kafka-internal-0 - name: kafka-kafka-internal-0-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/kafka-internal-0 + name: redpanda-kafka-internal-0-cert + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -113439,15 +111552,11 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-kafka-internal-0-cert + - name: redpanda-kafka-internal-0-cert secret: defaultMode: 272 secretName: redpanda-kafka-internal-0-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -113797,11 +111906,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -114128,8 +112232,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -114273,7 +112377,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -114284,8 +112388,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -114479,59 +112583,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -114747,7 +112798,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -114757,8 +112860,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -114863,8 +112966,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -114874,8 +112976,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -114888,8 +112990,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -114901,13 +113003,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -114939,17 +113037,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -114962,15 +113053,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -115308,11 +113391,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -115517,8 +113595,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -115656,7 +113734,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -115667,8 +113745,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -115862,59 +113940,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -116130,7 +114155,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -116140,8 +114217,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -116246,8 +114323,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -116257,8 +114333,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -116271,8 +114347,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -116284,13 +114360,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -116322,17 +114394,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -116345,15 +114410,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -116691,11 +114748,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -116931,8 +114983,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -117070,7 +115122,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -117081,8 +115133,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -117276,59 +115328,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: "" - certFilepath: "" - enabled: false - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - http://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -117530,7 +115529,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: "" + certFilepath: "" + enabled: false + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - http://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -117540,8 +115591,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -117646,8 +115697,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -117657,8 +115707,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -117671,8 +115721,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: dc3cccc1b9cdacf34f471ee60df90296f0ca10bd7f23de1cb5967216a21d614f - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 6aacba5f8ebe5c2dd56db55182c429cfef05fa53455962f37b51f90cf8952613 + checksum/config: 6aacba5f8ebe5c2dd56db55182c429cfef05fa53455962f37b51f90cf8952613 creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -117684,13 +115734,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -117722,14 +115768,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -117742,11 +115784,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -118083,11 +116121,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -118319,8 +116352,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -118458,7 +116491,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -118469,8 +116502,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -118664,59 +116697,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -118932,7 +116912,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -118942,8 +116974,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -119048,8 +117080,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -119059,8 +117090,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -119073,8 +117104,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -119086,13 +117117,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -119124,17 +117151,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -119147,15 +117167,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -119493,11 +117505,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -119702,8 +117709,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -119841,7 +117848,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -119852,50 +117859,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ATOTALLYVALIDLICENSE - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -120086,58 +118054,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ATOTALLYVALIDLICENSE + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -120353,7 +118306,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -120363,8 +118368,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -120469,8 +118474,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -120480,8 +118484,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -120494,8 +118498,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -120508,10 +118512,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -120523,7 +118523,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -120558,17 +118558,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -120584,15 +118577,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -120930,11 +118915,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -121139,8 +119119,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -121280,7 +119260,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -121291,8 +119271,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -121492,59 +119472,6 @@ stringData: rpk --config "$CONFIG" redpanda config set redpanda.rack "${RACK}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -121759,7 +119686,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -121769,8 +119748,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -121875,8 +119854,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -121886,8 +119864,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -121900,8 +119878,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -121913,13 +119891,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -121951,17 +119925,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -121974,15 +119941,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -122320,11 +120279,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -122529,8 +120483,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -122668,7 +120622,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -122679,8 +120633,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -122874,59 +120828,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -123143,7 +121044,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -123153,8 +121106,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -123259,8 +121212,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -123270,8 +121222,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -123284,8 +121236,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -123297,13 +121249,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -123335,17 +121283,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -123358,15 +121299,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -123704,11 +121637,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -123913,8 +121841,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -124052,7 +121980,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -124063,50 +121991,11 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -kind: Secret -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console -stringData: - enterprise-license: ATOTALLYVALIDLICENSE - kafka-protobuf-git-basicauth-password: "" - kafka-sasl-aws-msk-iam-secret-key: "" - kafka-sasl-password: "" - kafka-schema-registry-password: "" - kafka-schemaregistry-tls-ca: "" - kafka-schemaregistry-tls-cert: "" - kafka-schemaregistry-tls-key: "" - kafka-tls-ca: "" - kafka-tls-cert: "" - kafka-tls-key: "" - login-github-oauth-client-secret: "" - login-github-personal-access-token: "" - login-google-groups-service-account.json: "" - login-google-oauth-client-secret: "" - login-jwt-secret: SECRETKEY - login-oidc-client-secret: "" - login-okta-client-secret: "" - login-okta-directory-api-token: "" - redpanda-admin-api-password: "" - redpanda-admin-api-tls-ca: "" - redpanda-admin-api-tls-cert: "" - redpanda-admin-api-tls-key: "" -type: Opaque ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 kind: Secret @@ -124297,58 +122186,43 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap +kind: Secret metadata: creationTimestamp: null labels: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console +stringData: + enterprise-license: ATOTALLYVALIDLICENSE + kafka-protobuf-git-basicauth-password: "" + kafka-sasl-aws-msk-iam-secret-key: "" + kafka-sasl-password: "" + kafka-schema-registry-password: "" + kafka-schemaregistry-tls-ca: "" + kafka-schemaregistry-tls-cert: "" + kafka-schemaregistry-tls-key: "" + kafka-tls-ca: "" + kafka-tls-cert: "" + kafka-tls-key: "" + login-github-oauth-client-secret: "" + login-github-personal-access-token: "" + login-google-groups-service-account.json: "" + login-google-oauth-client-secret: "" + login-jwt-secret: SECRETKEY + login-oidc-client-secret: "" + login-okta-client-secret: "" + login-okta-directory-api-token: "" + redpanda-admin-api-password: "" + redpanda-admin-api-tls-ca: "" + redpanda-admin-api-tls-cert: "" + redpanda-admin-api-tls-key: "" +type: Opaque --- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 @@ -124565,7 +122439,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -124575,8 +122501,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -124681,8 +122607,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -124692,8 +122617,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -124706,8 +122631,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -124720,10 +122645,6 @@ spec: - --config.filepath=/etc/console/configs/config.yaml command: null env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt - name: LOGIN_JWTSECRET valueFrom: secretKeyRef: @@ -124735,7 +122656,7 @@ spec: key: enterprise-license name: redpanda-console envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -124770,17 +122691,10 @@ spec: - mountPath: /etc/console/secrets name: secrets readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -124796,15 +122710,7 @@ spec: - name: secrets secret: secretName: redpanda-console - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -125142,11 +123048,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -125351,8 +123252,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -125492,7 +123393,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -125503,8 +123404,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -125704,59 +123605,6 @@ stringData: rpk --config "$CONFIG" redpanda config set redpanda.rack "${RACK}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -125972,7 +123820,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -125982,8 +123882,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -126088,8 +123988,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -126099,8 +123998,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -126113,8 +124012,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -126126,13 +124025,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -126164,17 +124059,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -126187,15 +124075,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -126533,11 +124413,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -126742,8 +124617,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: @@ -126881,7 +124756,7 @@ spec: app.kubernetes.io/name: redpanda redpanda.com/poddisruptionbudget: redpanda --- -# Source: redpanda/charts/console/templates/serviceaccount.yaml +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 automountServiceAccountToken: true kind: ServiceAccount @@ -126892,8 +124767,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default --- @@ -127087,59 +124962,6 @@ stringData: rpk redpanda config --config "$CONFIG" set pandaproxy.advertised_pandaproxy_api[1] "${ADVERTISED_HTTP_ADDRESSES[$POD_ORDINAL]}" type: Opaque --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- -apiVersion: v1 -data: - config.yaml: | - # from .Values.console.config - kafka: - brokers: - - redpanda-0.redpanda.default.svc.cluster.local.:9093 - - redpanda-1.redpanda.default.svc.cluster.local.:9093 - - redpanda-2.redpanda.default.svc.cluster.local.:9093 - sasl: - enabled: false - schemaRegistry: - enabled: true - tls: - caFilepath: /mnt/cert/schemaregistry/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 - - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 - tls: - caFilepath: /mnt/cert/kafka/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - redpanda: - adminApi: - enabled: true - tls: - caFilepath: /mnt/cert/adminapi/default/ca.crt - certFilepath: "" - enabled: true - insecureSkipTlsVerify: false - keyFilepath: "" - urls: - - https://redpanda.default.svc.cluster.local.:9644 -kind: ConfigMap -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/instance: redpanda - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 - name: redpanda-console ---- # Source: redpanda/templates/entry-point.yaml apiVersion: v1 data: @@ -127355,7 +125177,59 @@ metadata: name: redpanda-rpk namespace: default --- -# Source: redpanda/charts/console/templates/service.yaml +# Source: redpanda/templates/entry-point.yaml +apiVersion: v1 +data: + config.yaml: | + # from .Values.console.config + kafka: + brokers: + - redpanda-0.redpanda.default.svc.cluster.local.:9093 + - redpanda-1.redpanda.default.svc.cluster.local.:9093 + - redpanda-2.redpanda.default.svc.cluster.local.:9093 + sasl: + enabled: false + schemaRegistry: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda-0.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-1.redpanda.default.svc.cluster.local.:8081 + - https://redpanda-2.redpanda.default.svc.cluster.local.:8081 + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + redpanda: + adminApi: + enabled: true + tls: + caFilepath: /etc/tls/certs/default/ca.crt + certFilepath: "" + enabled: true + insecureSkipTlsVerify: false + keyFilepath: "" + urls: + - https://redpanda.default.svc.cluster.local.:9644 +kind: ConfigMap +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/instance: redpanda + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: console + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 + name: redpanda-console +--- +# Source: redpanda/charts/console/templates/entry-point.yaml apiVersion: v1 kind: Service metadata: @@ -127365,8 +125239,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -127471,8 +125345,7 @@ spec: app.kubernetes.io/name: redpanda type: ClusterIP --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml ---- +# Source: redpanda/templates/entry-point.yaml apiVersion: apps/v1 kind: Deployment metadata: @@ -127482,8 +125355,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 name: redpanda-console namespace: default spec: @@ -127496,8 +125369,8 @@ spec: template: metadata: annotations: - checksum-redpanda-chart/config: 502f2d8b8dbc5a51fe7492cd2217ee0bc2ea1660a83dca07f42329157abd7567 - checksum/config: 74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b + checksum-redpanda-chart/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e + checksum/config: 5e7f28375b4bf738fd8a0c863cf19efdbfe0a20c7a491f134b3b1c38f54b259e creationTimestamp: null labels: app.kubernetes.io/instance: redpanda @@ -127509,13 +125382,9 @@ spec: - args: - --config.filepath=/etc/console/configs/config.yaml command: null - env: - - name: KAFKA_TLS_CAFILEPATH - value: /mnt/cert/kafka/default/ca.crt - - name: KAFKA_SCHEMAREGISTRY_TLS_CAFILEPATH - value: /mnt/cert/schemaregistry/default/ca.crt + env: [] envFrom: [] - image: docker.redpanda.com/redpandadata/console:v2.7.0 + image: docker.redpanda.com/redpandadata/console:v2.7.2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 @@ -127547,17 +125416,10 @@ spec: - mountPath: /etc/console/configs name: configs readOnly: true - - mountPath: /mnt/cert/kafka/default - name: kafka-default-cert - readOnly: true - - mountPath: /mnt/cert/schemaregistry/default - name: schemaregistry-default-cert - readOnly: true - - mountPath: /mnt/cert/adminapi/default - name: adminapi-default-cert - readOnly: true + - mountPath: /etc/tls/certs/default + name: redpanda-default-cert imagePullSecrets: [] - initContainers: [] + initContainers: null nodeSelector: {} priorityClassName: "" securityContext: @@ -127570,15 +125432,7 @@ spec: - configMap: name: redpanda-console name: configs - - name: kafka-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: schemaregistry-default-cert - secret: - defaultMode: 272 - secretName: redpanda-default-cert - - name: adminapi-default-cert + - name: redpanda-default-cert secret: defaultMode: 272 secretName: redpanda-default-cert @@ -127916,11 +125770,6 @@ spec: storage: 20Gi status: {} --- -# Source: redpanda/templates/console/configmap-and-deployment.yaml -# before license changes, this was not printing a secret, so we gather in which case to print -# for now only if we have a license do we print, however, this may be an issue for some -# since if we do include a license we MUST also print all secret items. ---- # Source: redpanda/templates/entry-point.yaml apiVersion: cert-manager.io/v1 kind: Certificate @@ -128125,8 +125974,8 @@ metadata: app.kubernetes.io/instance: redpanda app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: console - app.kubernetes.io/version: v2.7.0 - helm.sh/chart: console-0.7.29 + app.kubernetes.io/version: v2.7.2 + helm.sh/chart: console-0.7.30 annotations: "helm.sh/hook": test spec: diff --git a/charts/redpanda/values.go b/charts/redpanda/values.go index 27378a474f..b8cdbbbb4b 100644 --- a/charts/redpanda/values.go +++ b/charts/redpanda/values.go @@ -7,7 +7,7 @@ import ( cmmeta "github.com/cert-manager/cert-manager/pkg/apis/meta/v1" "github.com/invopop/jsonschema" monitoringv1 "github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring/v1" - "github.com/redpanda-data/console/backend/pkg/config" + "github.com/redpanda-data/helm-charts/charts/console" "github.com/redpanda-data/helm-charts/pkg/gotohelm/helmette" orderedmap "github.com/wk8/go-ordered-map/v2" corev1 "k8s.io/api/core/v1" @@ -31,6 +31,11 @@ const ( // PostUpgradeContainerName is the user facing name of the post-upgrade // job's container. PostUpgradeContainerName = "post-upgrade" + + // certificateMountPoint is a common mount point for any TLS certificate + // defined as external truststore or as certificate that would be + // created by cert-manager. + certificateMountPoint = "/etc/tls/certs" ) // values.go contains a collection of go structs that (loosely) map to @@ -59,7 +64,7 @@ type Values struct { AuditLogging AuditLogging `json:"auditLogging"` Enterprise Enterprise `json:"enterprise"` RackAwareness RackAwareness `json:"rackAwareness"` - Console Console `json:"console"` + Console console.PartialValues `json:"console,omitempty"` Connectors Connectors `json:"connectors"` Auth Auth `json:"auth"` TLS TLS `json:"tls"` @@ -82,13 +87,6 @@ type Values struct { Force bool `json:"force"` } -type Console struct { - Enabled bool `json:"enabled"` - Console struct { - Config map[string]any `json:"config"` - } `json:"console"` -} - type Connectors struct { Enabled bool `json:"enabled"` Connectors ConnectorsChartValues `json:"connectors"` @@ -1054,7 +1052,7 @@ func (t *InternalTLS) TrustStoreFilePath(tls *TLS) string { } if tls.Certs.MustGet(t.Cert).CAEnabled { - return fmt.Sprintf("/etc/tls/certs/%s/ca.crt", t.Cert) + return fmt.Sprintf("%s/%s/ca.crt", certificateMountPoint, t.Cert) } return defaultTruststorePath @@ -1064,14 +1062,14 @@ func (t *InternalTLS) TrustStoreFilePath(tls *TLS) string { // verify a connection with this server. func (t *InternalTLS) ServerCAPath(tls *TLS) string { if tls.Certs.MustGet(t.Cert).CAEnabled { - return fmt.Sprintf("/etc/tls/certs/%s/ca.crt", t.Cert) + return fmt.Sprintf("%s/%s/ca.crt", certificateMountPoint, t.Cert) } // Strange but technically correct, if CAEnabled is false, we can't safely // assume that a ca.crt file will exist. So we fallback to using the // server's certificate itself. // Other options would be: failing or falling back to the container's // default truststore. - return fmt.Sprintf("/etc/tls/certs/%s/tls.crt", t.Cert) + return fmt.Sprintf("%s/%s/tls.crt", certificateMountPoint, t.Cert) } // ExternalTLS is the TLS configuration associated with a given "external" @@ -1102,7 +1100,7 @@ func (t *ExternalTLS) TrustStoreFilePath(i *InternalTLS, tls *TLS) string { } if t.GetCert(i, tls).CAEnabled { - return fmt.Sprintf("/etc/tls/certs/%s/ca.crt", t.GetCertName(i)) + return fmt.Sprintf("%s/%s/ca.crt", certificateMountPoint, t.GetCertName(i)) } return defaultTruststorePath @@ -1125,22 +1123,45 @@ type AdminListeners struct { TLS InternalTLS `json:"tls" jsonschema:"required"` } -func (l *AdminListeners) ConsoleTLS(tls *TLS) config.RedpandaAdminAPITLS { - t := config.RedpandaAdminAPITLS{Enabled: l.TLS.IsEnabled(tls)} +// ConsoleTLS is a struct that represents TLS configuration used +// in console configuration in Kafka, Schema Registry and +// Redpanda Admin API. +// For the above configuration helm chart could import struct, but +// as of the writing the struct fields tag have only `yaml` annotation. +// `sigs.k8s.io/yaml` requires `json` tags. +type ConsoleTLS struct { + Enabled bool `json:"enabled"` + CaFilepath string `json:"caFilepath"` + CertFilepath string `json:"certFilepath"` + KeyFilepath string `json:"keyFilepath"` + InsecureSkipTLSVerify bool `json:"insecureSkipTlsVerify"` +} + +func (l *AdminListeners) ConsoleTLS(tls *TLS) ConsoleTLS { + t := ConsoleTLS{Enabled: l.TLS.IsEnabled(tls)} if !t.Enabled { return t } - adminAPIPrefix := "/mnt/cert/adminapi" + adminAPIPrefix := fmt.Sprintf("%s/%s", certificateMountPoint, l.TLS.Cert) - t.CaFilepath = fmt.Sprintf("%s/%s/ca.crt", adminAPIPrefix, l.TLS.Cert) + // Strange but technically correct, if CAEnabled is false, we can't safely + // assume that a ca.crt file will exist. So we fallback to using the + // server's certificate itself. + // Other options would be: failing or falling back to the container's + // default truststore. + if tls.Certs.MustGet(l.TLS.Cert).CAEnabled { + t.CaFilepath = fmt.Sprintf("%s/ca.crt", adminAPIPrefix) + } else { + t.CaFilepath = fmt.Sprintf("%s/tls.crt", adminAPIPrefix) + } if !l.TLS.RequireClientAuth { return t } - t.CertFilepath = fmt.Sprintf("%s/%s/tls.crt", adminAPIPrefix, l.TLS.Cert) - t.KeyFilepath = fmt.Sprintf("%s/%s/tls.key", adminAPIPrefix, l.TLS.Cert) + t.CertFilepath = fmt.Sprintf("%s/tls.crt", adminAPIPrefix) + t.KeyFilepath = fmt.Sprintf("%s/tls.key", adminAPIPrefix) return t } @@ -1182,8 +1203,8 @@ func (l *AdminListeners) ListenersTLS(tls *TLS) []map[string]any { admin = append(admin, map[string]any{ "name": k, "enabled": true, - "cert_file": fmt.Sprintf("/etc/tls/certs/%s/tls.crt", certName), - "key_file": fmt.Sprintf("/etc/tls/certs/%s/tls.key", certName), + "cert_file": fmt.Sprintf("%s/%s/tls.crt", certificateMountPoint, certName), + "key_file": fmt.Sprintf("%s/%s/tls.key", certificateMountPoint, certName), "require_client_auth": ptr.Deref(lis.TLS.RequireClientAuth, false), "truststore_file": lis.TLS.TrustStoreFilePath(&l.TLS, tls), }) @@ -1298,8 +1319,8 @@ func (l *HTTPListeners) ListenersTLS(tls *TLS) []map[string]any { pp = append(pp, map[string]any{ "name": k, "enabled": true, - "cert_file": fmt.Sprintf("/etc/tls/certs/%s/tls.crt", certName), - "key_file": fmt.Sprintf("/etc/tls/certs/%s/tls.key", certName), + "cert_file": fmt.Sprintf("%s/%s/tls.crt", certificateMountPoint, certName), + "key_file": fmt.Sprintf("%s/%s/tls.key", certificateMountPoint, certName), "require_client_auth": ptr.Deref(lis.TLS.RequireClientAuth, false), "truststore_file": lis.TLS.TrustStoreFilePath(&l.TLS, tls), }) @@ -1427,8 +1448,8 @@ func (l *KafkaListeners) ListenersTLS(tls *TLS) []map[string]any { kafka = append(kafka, map[string]any{ "name": k, "enabled": true, - "cert_file": fmt.Sprintf("/etc/tls/certs/%s/tls.crt", certName), - "key_file": fmt.Sprintf("/etc/tls/certs/%s/tls.key", certName), + "cert_file": fmt.Sprintf("%s/%s/tls.crt", certificateMountPoint, certName), + "key_file": fmt.Sprintf("%s/%s/tls.key", certificateMountPoint, certName), "require_client_auth": ptr.Deref(lis.TLS.RequireClientAuth, false), "truststore_file": lis.TLS.TrustStoreFilePath(&l.TLS, tls), }) @@ -1457,22 +1478,31 @@ func (l *KafkaListeners) TrustStores(tls *TLS) []*TrustStore { return tss } -func (k *KafkaListeners) ConsolemTLS(tls *TLS) config.KafkaTLS { - t := config.KafkaTLS{Enabled: k.TLS.IsEnabled(tls)} +func (k *KafkaListeners) ConsoleTLS(tls *TLS) ConsoleTLS { + t := ConsoleTLS{Enabled: k.TLS.IsEnabled(tls)} if !t.Enabled { return t } - kafkaPathPrefix := "/mnt/cert/kafka" + kafkaPathPrefix := fmt.Sprintf("%s/%s", certificateMountPoint, k.TLS.Cert) - t.CaFilepath = fmt.Sprintf("%s/%s/ca.crt", kafkaPathPrefix, k.TLS.Cert) + // Strange but technically correct, if CAEnabled is false, we can't safely + // assume that a ca.crt file will exist. So we fallback to using the + // server's certificate itself. + // Other options would be: failing or falling back to the container's + // default truststore. + if tls.Certs.MustGet(k.TLS.Cert).CAEnabled { + t.CaFilepath = fmt.Sprintf("%s/ca.crt", kafkaPathPrefix) + } else { + t.CaFilepath = fmt.Sprintf("%s/tls.crt", kafkaPathPrefix) + } if !k.TLS.RequireClientAuth { return t } - t.CertFilepath = fmt.Sprintf("%s/%s/tls.crt", kafkaPathPrefix, k.TLS.Cert) - t.KeyFilepath = fmt.Sprintf("%s/%s/tls.key", kafkaPathPrefix, k.TLS.Cert) + t.CertFilepath = fmt.Sprintf("%s/tls.crt", kafkaPathPrefix) + t.KeyFilepath = fmt.Sprintf("%s/tls.key", kafkaPathPrefix) return t } @@ -1573,8 +1603,8 @@ func (l *SchemaRegistryListeners) ListenersTLS(tls *TLS) []map[string]any { listeners = append(listeners, map[string]any{ "name": k, "enabled": true, - "cert_file": fmt.Sprintf("/etc/tls/certs/%s/tls.crt", certName), - "key_file": fmt.Sprintf("/etc/tls/certs/%s/tls.key", certName), + "cert_file": fmt.Sprintf("%s/%s/tls.crt", certificateMountPoint, certName), + "key_file": fmt.Sprintf("%s/%s/tls.key", certificateMountPoint, certName), "require_client_auth": ptr.Deref(lis.TLS.RequireClientAuth, false), "truststore_file": lis.TLS.TrustStoreFilePath(&l.TLS, tls), }) @@ -1603,22 +1633,31 @@ func (l *SchemaRegistryListeners) TrustStores(tls *TLS) []*TrustStore { return tss } -func (sr *SchemaRegistryListeners) ConsoleTLS(tls *TLS) config.SchemaTLS { - t := config.SchemaTLS{Enabled: sr.TLS.IsEnabled(tls)} +func (sr *SchemaRegistryListeners) ConsoleTLS(tls *TLS) ConsoleTLS { + t := ConsoleTLS{Enabled: sr.TLS.IsEnabled(tls)} if !t.Enabled { return t } - schemaRegistryPrefix := "/mnt/cert/schemaregistry" + schemaRegistryPrefix := fmt.Sprintf("%s/%s", certificateMountPoint, sr.TLS.Cert) - t.CaFilepath = fmt.Sprintf("%s/%s/ca.crt", schemaRegistryPrefix, sr.TLS.Cert) + // Strange but technically correct, if CAEnabled is false, we can't safely + // assume that a ca.crt file will exist. So we fallback to using the + // server's certificate itself. + // Other options would be: failing or falling back to the container's + // default truststore. + if tls.Certs.MustGet(sr.TLS.Cert).CAEnabled { + t.CaFilepath = fmt.Sprintf("%s/ca.crt", schemaRegistryPrefix) + } else { + t.CaFilepath = fmt.Sprintf("%s/tls.crt", schemaRegistryPrefix) + } if !sr.TLS.RequireClientAuth { return t } - t.CertFilepath = fmt.Sprintf("%s/%s/tls.crt", schemaRegistryPrefix, sr.TLS.Cert) - t.KeyFilepath = fmt.Sprintf("%s/%s/tls.key", schemaRegistryPrefix, sr.TLS.Cert) + t.CertFilepath = fmt.Sprintf("%s/tls.crt", schemaRegistryPrefix) + t.KeyFilepath = fmt.Sprintf("%s/tls.key", schemaRegistryPrefix) return t } diff --git a/charts/redpanda/values.schema.json b/charts/redpanda/values.schema.json index cde7a0d541..400596b10a 100644 --- a/charts/redpanda/values.schema.json +++ b/charts/redpanda/values.schema.json @@ -836,16 +836,3738 @@ }, "console": { "properties": { + "affinity": { + "properties": { + "nodeAffinity": { + "properties": { + "preferredDuringSchedulingIgnoredDuringExecution": { + "oneOf": [ + { + "items": { + "properties": { + "preference": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchFields": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "weight": { + "type": "integer" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "requiredDuringSchedulingIgnoredDuringExecution": { + "properties": { + "nodeSelectorTerms": { + "oneOf": [ + { + "items": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchFields": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + } + }, + "type": "object" + } + }, + "type": "object" + }, + "podAffinity": { + "properties": { + "preferredDuringSchedulingIgnoredDuringExecution": { + "oneOf": [ + { + "items": { + "properties": { + "podAffinityTerm": { + "properties": { + "labelSelector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "matchLabelKeys": { + "items": { + "type": "string" + }, + "type": "array" + }, + "mismatchLabelKeys": { + "items": { + "type": "string" + }, + "type": "array" + }, + "namespaceSelector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "namespaces": { + "items": { + "type": "string" + }, + "type": "array" + }, + "topologyKey": { + "type": "string" + } + }, + "type": "object" + }, + "weight": { + "type": "integer" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "requiredDuringSchedulingIgnoredDuringExecution": { + "oneOf": [ + { + "items": { + "properties": { + "labelSelector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "matchLabelKeys": { + "items": { + "type": "string" + }, + "type": "array" + }, + "mismatchLabelKeys": { + "items": { + "type": "string" + }, + "type": "array" + }, + "namespaceSelector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "namespaces": { + "items": { + "type": "string" + }, + "type": "array" + }, + "topologyKey": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + } + }, + "type": "object" + }, + "podAntiAffinity": { + "properties": { + "preferredDuringSchedulingIgnoredDuringExecution": { + "oneOf": [ + { + "items": { + "properties": { + "podAffinityTerm": { + "properties": { + "labelSelector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "matchLabelKeys": { + "items": { + "type": "string" + }, + "type": "array" + }, + "mismatchLabelKeys": { + "items": { + "type": "string" + }, + "type": "array" + }, + "namespaceSelector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "namespaces": { + "items": { + "type": "string" + }, + "type": "array" + }, + "topologyKey": { + "type": "string" + } + }, + "type": "object" + }, + "weight": { + "type": "integer" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "requiredDuringSchedulingIgnoredDuringExecution": { + "oneOf": [ + { + "items": { + "properties": { + "labelSelector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "matchLabelKeys": { + "items": { + "type": "string" + }, + "type": "array" + }, + "mismatchLabelKeys": { + "items": { + "type": "string" + }, + "type": "array" + }, + "namespaceSelector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "namespaces": { + "items": { + "type": "string" + }, + "type": "array" + }, + "topologyKey": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + } + }, + "type": "object" + } + }, + "type": "object" + }, + "annotations": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "automountServiceAccountToken": { + "type": "boolean" + }, + "autoscaling": { + "properties": { + "enabled": { + "type": "boolean" + }, + "maxReplicas": { + "type": "integer" + }, + "minReplicas": { + "type": "integer" + }, + "targetCPUUtilizationPercentage": { + "type": "integer" + }, + "targetMemoryUtilizationPercentage": { + "type": "integer" + } + }, + "type": "object" + }, + "commonLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "configmap": { + "properties": { + "create": { + "type": "boolean" + } + }, + "type": "object" + }, "console": { "properties": { - "config": { + "config": { + "type": "object" + }, + "roleBindings": { + "oneOf": [ + { + "items": { + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "roles": { + "oneOf": [ + { + "items": { + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + } + }, + "type": "object" + }, + "deployment": { + "properties": { + "command": { + "oneOf": [ + { + "items": { + "type": "string" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "create": { + "type": "boolean" + }, + "extraArgs": { + "oneOf": [ + { + "items": { + "type": "string" + }, + "type": "array" + }, + { + "type": "null" + } + ] + } + }, + "type": "object" + }, + "enabled": { + "type": "boolean" + }, + "enterprise": { + "properties": { + "licenseSecretRef": { + "properties": { + "key": { + "type": "string" + }, + "name": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "extraContainers": { + "oneOf": [ + { + "items": { + "properties": { + "args": { + "items": { + "type": "string" + }, + "type": "array" + }, + "command": { + "items": { + "type": "string" + }, + "type": "array" + }, + "env": { + "items": { + "properties": { + "name": { + "type": "string" + }, + "value": { + "type": "string" + }, + "valueFrom": { + "properties": { + "configMapKeyRef": { + "properties": { + "key": { + "type": "string" + }, + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + }, + "fieldRef": { + "properties": { + "apiVersion": { + "type": "string" + }, + "fieldPath": { + "type": "string" + } + }, + "type": "object" + }, + "resourceFieldRef": { + "properties": { + "containerName": { + "type": "string" + }, + "divisor": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + }, + "resource": { + "type": "string" + } + }, + "type": "object" + }, + "secretKeyRef": { + "properties": { + "key": { + "type": "string" + }, + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "type": "array" + }, + "envFrom": { + "items": { + "properties": { + "configMapRef": { + "properties": { + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + }, + "prefix": { + "type": "string" + }, + "secretRef": { + "properties": { + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "type": "array" + }, + "image": { + "type": "string" + }, + "imagePullPolicy": { + "type": "string" + }, + "lifecycle": { + "properties": { + "postStart": { + "properties": { + "exec": { + "properties": { + "command": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "httpGet": { + "properties": { + "host": { + "type": "string" + }, + "httpHeaders": { + "items": { + "properties": { + "name": { + "type": "string" + }, + "value": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "path": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + }, + "scheme": { + "type": "string" + } + }, + "type": "object" + }, + "sleep": { + "properties": { + "seconds": { + "type": "integer" + } + }, + "type": "object" + }, + "tcpSocket": { + "properties": { + "host": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + } + }, + "type": "object" + } + }, + "type": "object" + }, + "preStop": { + "properties": { + "exec": { + "properties": { + "command": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "httpGet": { + "properties": { + "host": { + "type": "string" + }, + "httpHeaders": { + "items": { + "properties": { + "name": { + "type": "string" + }, + "value": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "path": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + }, + "scheme": { + "type": "string" + } + }, + "type": "object" + }, + "sleep": { + "properties": { + "seconds": { + "type": "integer" + } + }, + "type": "object" + }, + "tcpSocket": { + "properties": { + "host": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + } + }, + "type": "object" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "livenessProbe": { + "properties": { + "exec": { + "properties": { + "command": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "failureThreshold": { + "type": "integer" + }, + "grpc": { + "properties": { + "port": { + "type": "integer" + }, + "service": { + "type": "string" + } + }, + "type": "object" + }, + "httpGet": { + "properties": { + "host": { + "type": "string" + }, + "httpHeaders": { + "items": { + "properties": { + "name": { + "type": "string" + }, + "value": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "path": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + }, + "scheme": { + "type": "string" + } + }, + "type": "object" + }, + "initialDelaySeconds": { + "type": "integer" + }, + "periodSeconds": { + "type": "integer" + }, + "successThreshold": { + "type": "integer" + }, + "tcpSocket": { + "properties": { + "host": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + } + }, + "type": "object" + }, + "terminationGracePeriodSeconds": { + "type": "integer" + }, + "timeoutSeconds": { + "type": "integer" + } + }, + "type": "object" + }, + "name": { + "type": "string" + }, + "ports": { + "items": { + "properties": { + "containerPort": { + "type": "integer" + }, + "hostIP": { + "type": "string" + }, + "hostPort": { + "type": "integer" + }, + "name": { + "type": "string" + }, + "protocol": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "readinessProbe": { + "properties": { + "exec": { + "properties": { + "command": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "failureThreshold": { + "type": "integer" + }, + "grpc": { + "properties": { + "port": { + "type": "integer" + }, + "service": { + "type": "string" + } + }, + "type": "object" + }, + "httpGet": { + "properties": { + "host": { + "type": "string" + }, + "httpHeaders": { + "items": { + "properties": { + "name": { + "type": "string" + }, + "value": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "path": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + }, + "scheme": { + "type": "string" + } + }, + "type": "object" + }, + "initialDelaySeconds": { + "type": "integer" + }, + "periodSeconds": { + "type": "integer" + }, + "successThreshold": { + "type": "integer" + }, + "tcpSocket": { + "properties": { + "host": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + } + }, + "type": "object" + }, + "terminationGracePeriodSeconds": { + "type": "integer" + }, + "timeoutSeconds": { + "type": "integer" + } + }, + "type": "object" + }, + "resizePolicy": { + "items": { + "properties": { + "resourceName": { + "type": "string" + }, + "restartPolicy": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "resources": { + "properties": { + "claims": { + "items": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "limits": { + "additionalProperties": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + }, + "type": "object" + }, + "requests": { + "additionalProperties": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + }, + "type": "object" + } + }, + "type": "object" + }, + "restartPolicy": { + "type": "string" + }, + "securityContext": { + "properties": { + "allowPrivilegeEscalation": { + "type": "boolean" + }, + "capabilities": { + "properties": { + "add": { + "items": { + "type": "string" + }, + "type": "array" + }, + "drop": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "privileged": { + "type": "boolean" + }, + "procMount": { + "type": "string" + }, + "readOnlyRootFilesystem": { + "type": "boolean" + }, + "runAsGroup": { + "type": "integer" + }, + "runAsNonRoot": { + "type": "boolean" + }, + "runAsUser": { + "type": "integer" + }, + "seLinuxOptions": { + "properties": { + "level": { + "type": "string" + }, + "role": { + "type": "string" + }, + "type": { + "type": "string" + }, + "user": { + "type": "string" + } + }, + "type": "object" + }, + "seccompProfile": { + "properties": { + "localhostProfile": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "type": "object" + }, + "windowsOptions": { + "properties": { + "gmsaCredentialSpec": { + "type": "string" + }, + "gmsaCredentialSpecName": { + "type": "string" + }, + "hostProcess": { + "type": "boolean" + }, + "runAsUserName": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "startupProbe": { + "properties": { + "exec": { + "properties": { + "command": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "failureThreshold": { + "type": "integer" + }, + "grpc": { + "properties": { + "port": { + "type": "integer" + }, + "service": { + "type": "string" + } + }, + "type": "object" + }, + "httpGet": { + "properties": { + "host": { + "type": "string" + }, + "httpHeaders": { + "items": { + "properties": { + "name": { + "type": "string" + }, + "value": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "path": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + }, + "scheme": { + "type": "string" + } + }, + "type": "object" + }, + "initialDelaySeconds": { + "type": "integer" + }, + "periodSeconds": { + "type": "integer" + }, + "successThreshold": { + "type": "integer" + }, + "tcpSocket": { + "properties": { + "host": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + } + }, + "type": "object" + }, + "terminationGracePeriodSeconds": { + "type": "integer" + }, + "timeoutSeconds": { + "type": "integer" + } + }, + "type": "object" + }, + "stdin": { + "type": "boolean" + }, + "stdinOnce": { + "type": "boolean" + }, + "terminationMessagePath": { + "type": "string" + }, + "terminationMessagePolicy": { + "type": "string" + }, + "tty": { + "type": "boolean" + }, + "volumeDevices": { + "items": { + "properties": { + "devicePath": { + "type": "string" + }, + "name": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "volumeMounts": { + "items": { + "properties": { + "mountPath": { + "type": "string" + }, + "mountPropagation": { + "type": "string" + }, + "name": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + }, + "subPath": { + "type": "string" + }, + "subPathExpr": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "workingDir": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "extraEnv": { + "oneOf": [ + { + "items": { + "properties": { + "name": { + "type": "string" + }, + "value": { + "type": "string" + }, + "valueFrom": { + "properties": { + "configMapKeyRef": { + "properties": { + "key": { + "type": "string" + }, + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + }, + "fieldRef": { + "properties": { + "apiVersion": { + "type": "string" + }, + "fieldPath": { + "type": "string" + } + }, + "type": "object" + }, + "resourceFieldRef": { + "properties": { + "containerName": { + "type": "string" + }, + "divisor": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + }, + "resource": { + "type": "string" + } + }, + "type": "object" + }, + "secretKeyRef": { + "properties": { + "key": { + "type": "string" + }, + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "extraEnvFrom": { + "oneOf": [ + { + "items": { + "properties": { + "configMapRef": { + "properties": { + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + }, + "prefix": { + "type": "string" + }, + "secretRef": { + "properties": { + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "extraVolumeMounts": { + "oneOf": [ + { + "items": { + "properties": { + "mountPath": { + "type": "string" + }, + "mountPropagation": { + "type": "string" + }, + "name": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + }, + "subPath": { + "type": "string" + }, + "subPathExpr": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "extraVolumes": { + "oneOf": [ + { + "items": { + "properties": { + "awsElasticBlockStore": { + "properties": { + "fsType": { + "type": "string" + }, + "partition": { + "type": "integer" + }, + "readOnly": { + "type": "boolean" + }, + "volumeID": { + "type": "string" + } + }, + "type": "object" + }, + "azureDisk": { + "properties": { + "cachingMode": { + "type": "string" + }, + "diskName": { + "type": "string" + }, + "diskURI": { + "type": "string" + }, + "fsType": { + "type": "string" + }, + "kind": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + } + }, + "type": "object" + }, + "azureFile": { + "properties": { + "readOnly": { + "type": "boolean" + }, + "secretName": { + "type": "string" + }, + "shareName": { + "type": "string" + } + }, + "type": "object" + }, + "cephfs": { + "properties": { + "monitors": { + "items": { + "type": "string" + }, + "type": "array" + }, + "path": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + }, + "secretFile": { + "type": "string" + }, + "secretRef": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + }, + "user": { + "type": "string" + } + }, + "type": "object" + }, + "cinder": { + "properties": { + "fsType": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + }, + "secretRef": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + }, + "volumeID": { + "type": "string" + } + }, + "type": "object" + }, + "configMap": { + "properties": { + "defaultMode": { + "type": "integer" + }, + "items": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "mode": { + "type": "integer" + }, + "path": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + }, + "csi": { + "properties": { + "driver": { + "type": "string" + }, + "fsType": { + "type": "string" + }, + "nodePublishSecretRef": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + }, + "readOnly": { + "type": "boolean" + }, + "volumeAttributes": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "downwardAPI": { + "properties": { + "defaultMode": { + "type": "integer" + }, + "items": { + "items": { + "properties": { + "fieldRef": { + "properties": { + "apiVersion": { + "type": "string" + }, + "fieldPath": { + "type": "string" + } + }, + "type": "object" + }, + "mode": { + "type": "integer" + }, + "path": { + "type": "string" + }, + "resourceFieldRef": { + "properties": { + "containerName": { + "type": "string" + }, + "divisor": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + }, + "resource": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "emptyDir": { + "properties": { + "medium": { + "type": "string" + }, + "sizeLimit": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + } + }, + "type": "object" + }, + "ephemeral": { + "properties": { + "volumeClaimTemplate": { + "properties": { + "metadata": { + "properties": { + "annotations": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "creationTimestamp": { + "properties": {}, + "type": "object" + }, + "deletionGracePeriodSeconds": { + "type": "integer" + }, + "deletionTimestamp": { + "properties": {}, + "type": "object" + }, + "finalizers": { + "items": { + "type": "string" + }, + "type": "array" + }, + "generateName": { + "type": "string" + }, + "generation": { + "type": "integer" + }, + "labels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "managedFields": { + "items": { + "properties": { + "apiVersion": { + "type": "string" + }, + "fieldsType": { + "type": "string" + }, + "fieldsV1": { + "properties": {}, + "type": "object" + }, + "manager": { + "type": "string" + }, + "operation": { + "type": "string" + }, + "subresource": { + "type": "string" + }, + "time": { + "properties": {}, + "type": "object" + } + }, + "type": "object" + }, + "type": "array" + }, + "name": { + "type": "string" + }, + "namespace": { + "type": "string" + }, + "ownerReferences": { + "items": { + "properties": { + "apiVersion": { + "type": "string" + }, + "blockOwnerDeletion": { + "type": "boolean" + }, + "controller": { + "type": "boolean" + }, + "kind": { + "type": "string" + }, + "name": { + "type": "string" + }, + "uid": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "resourceVersion": { + "type": "string" + }, + "selfLink": { + "type": "string" + }, + "uid": { + "type": "string" + } + }, + "type": "object" + }, + "spec": { + "properties": { + "accessModes": { + "items": { + "type": "string" + }, + "type": "array" + }, + "dataSource": { + "properties": { + "apiGroup": { + "type": "string" + }, + "kind": { + "type": "string" + }, + "name": { + "type": "string" + } + }, + "type": "object" + }, + "dataSourceRef": { + "properties": { + "apiGroup": { + "type": "string" + }, + "kind": { + "type": "string" + }, + "name": { + "type": "string" + }, + "namespace": { + "type": "string" + } + }, + "type": "object" + }, + "resources": { + "properties": { + "limits": { + "additionalProperties": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + }, + "type": "object" + }, + "requests": { + "additionalProperties": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + }, + "type": "object" + } + }, + "type": "object" + }, + "selector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "storageClassName": { + "type": "string" + }, + "volumeAttributesClassName": { + "type": "string" + }, + "volumeMode": { + "type": "string" + }, + "volumeName": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "fc": { + "properties": { + "fsType": { + "type": "string" + }, + "lun": { + "type": "integer" + }, + "readOnly": { + "type": "boolean" + }, + "targetWWNs": { + "items": { + "type": "string" + }, + "type": "array" + }, + "wwids": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "flexVolume": { + "properties": { + "driver": { + "type": "string" + }, + "fsType": { + "type": "string" + }, + "options": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "readOnly": { + "type": "boolean" + }, + "secretRef": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "flocker": { + "properties": { + "datasetName": { + "type": "string" + }, + "datasetUUID": { + "type": "string" + } + }, + "type": "object" + }, + "gcePersistentDisk": { + "properties": { + "fsType": { + "type": "string" + }, + "partition": { + "type": "integer" + }, + "pdName": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + } + }, + "type": "object" + }, + "gitRepo": { + "properties": { + "directory": { + "type": "string" + }, + "repository": { + "type": "string" + }, + "revision": { + "type": "string" + } + }, + "type": "object" + }, + "glusterfs": { + "properties": { + "endpoints": { + "type": "string" + }, + "path": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + } + }, + "type": "object" + }, + "hostPath": { + "properties": { + "path": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "type": "object" + }, + "iscsi": { + "properties": { + "chapAuthDiscovery": { + "type": "boolean" + }, + "chapAuthSession": { + "type": "boolean" + }, + "fsType": { + "type": "string" + }, + "initiatorName": { + "type": "string" + }, + "iqn": { + "type": "string" + }, + "iscsiInterface": { + "type": "string" + }, + "lun": { + "type": "integer" + }, + "portals": { + "items": { + "type": "string" + }, + "type": "array" + }, + "readOnly": { + "type": "boolean" + }, + "secretRef": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + }, + "targetPortal": { + "type": "string" + } + }, + "type": "object" + }, + "name": { + "type": "string" + }, + "nfs": { + "properties": { + "path": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + }, + "server": { + "type": "string" + } + }, + "type": "object" + }, + "persistentVolumeClaim": { + "properties": { + "claimName": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + } + }, + "type": "object" + }, + "photonPersistentDisk": { + "properties": { + "fsType": { + "type": "string" + }, + "pdID": { + "type": "string" + } + }, + "type": "object" + }, + "portworxVolume": { + "properties": { + "fsType": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + }, + "volumeID": { + "type": "string" + } + }, + "type": "object" + }, + "projected": { + "properties": { + "defaultMode": { + "type": "integer" + }, + "sources": { + "items": { + "properties": { + "clusterTrustBundle": { + "properties": { + "labelSelector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + }, + "path": { + "type": "string" + }, + "signerName": { + "type": "string" + } + }, + "type": "object" + }, + "configMap": { + "properties": { + "items": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "mode": { + "type": "integer" + }, + "path": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + }, + "downwardAPI": { + "properties": { + "items": { + "items": { + "properties": { + "fieldRef": { + "properties": { + "apiVersion": { + "type": "string" + }, + "fieldPath": { + "type": "string" + } + }, + "type": "object" + }, + "mode": { + "type": "integer" + }, + "path": { + "type": "string" + }, + "resourceFieldRef": { + "properties": { + "containerName": { + "type": "string" + }, + "divisor": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + }, + "resource": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "secret": { + "properties": { + "items": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "mode": { + "type": "integer" + }, + "path": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "name": { + "type": "string" + }, + "optional": { + "type": "boolean" + } + }, + "type": "object" + }, + "serviceAccountToken": { + "properties": { + "audience": { + "type": "string" + }, + "expirationSeconds": { + "type": "integer" + }, + "path": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "quobyte": { + "properties": { + "group": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + }, + "registry": { + "type": "string" + }, + "tenant": { + "type": "string" + }, + "user": { + "type": "string" + }, + "volume": { + "type": "string" + } + }, + "type": "object" + }, + "rbd": { + "properties": { + "fsType": { + "type": "string" + }, + "image": { + "type": "string" + }, + "keyring": { + "type": "string" + }, + "monitors": { + "items": { + "type": "string" + }, + "type": "array" + }, + "pool": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + }, + "secretRef": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + }, + "user": { + "type": "string" + } + }, + "type": "object" + }, + "scaleIO": { + "properties": { + "fsType": { + "type": "string" + }, + "gateway": { + "type": "string" + }, + "protectionDomain": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + }, + "secretRef": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + }, + "sslEnabled": { + "type": "boolean" + }, + "storageMode": { + "type": "string" + }, + "storagePool": { + "type": "string" + }, + "system": { + "type": "string" + }, + "volumeName": { + "type": "string" + } + }, + "type": "object" + }, + "secret": { + "properties": { + "defaultMode": { + "type": "integer" + }, + "items": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "mode": { + "type": "integer" + }, + "path": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + "optional": { + "type": "boolean" + }, + "secretName": { + "type": "string" + } + }, + "type": "object" + }, + "storageos": { + "properties": { + "fsType": { + "type": "string" + }, + "readOnly": { + "type": "boolean" + }, + "secretRef": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + }, + "volumeName": { + "type": "string" + }, + "volumeNamespace": { + "type": "string" + } + }, + "type": "object" + }, + "vsphereVolume": { + "properties": { + "fsType": { + "type": "string" + }, + "storagePolicyID": { + "type": "string" + }, + "storagePolicyName": { + "type": "string" + }, + "volumePath": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "fullnameOverride": { + "type": "string" + }, + "image": { + "properties": { + "pullPolicy": { + "type": "string" + }, + "registry": { + "type": "string" + }, + "repository": { + "type": "string" + }, + "tag": { + "type": "string" + } + }, + "type": "object" + }, + "imagePullSecrets": { + "oneOf": [ + { + "items": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "ingress": { + "properties": { + "annotations": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "className": { + "type": "string" + }, + "enabled": { + "type": "boolean" + }, + "hosts": { + "oneOf": [ + { + "items": { + "properties": { + "host": { + "type": "string" + }, + "paths": { + "items": { + "properties": { + "path": { + "type": "string" + }, + "pathType": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "tls": { + "oneOf": [ + { + "items": { + "properties": { + "hosts": { + "items": { + "type": "string" + }, + "type": "array" + }, + "secretName": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + } + }, + "type": "object" + }, + "initContainers": { + "properties": { + "extraInitContainers": { + "type": "string" + } + }, + "type": "object" + }, + "livenessProbe": { + "properties": { + "exec": { + "properties": { + "command": { + "oneOf": [ + { + "items": { + "type": "string" + }, + "type": "array" + }, + { + "type": "null" + } + ] + } + }, + "type": "object" + }, + "failureThreshold": { + "type": "integer" + }, + "grpc": { + "properties": { + "port": { + "type": "integer" + }, + "service": { + "type": "string" + } + }, + "type": "object" + }, + "httpGet": { + "properties": { + "host": { + "type": "string" + }, + "httpHeaders": { + "oneOf": [ + { + "items": { + "properties": { + "name": { + "type": "string" + }, + "value": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "path": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + }, + "scheme": { + "type": "string" + } + }, + "type": "object" + }, + "initialDelaySeconds": { + "type": "integer" + }, + "periodSeconds": { + "type": "integer" + }, + "successThreshold": { + "type": "integer" + }, + "tcpSocket": { + "properties": { + "host": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + } + }, + "type": "object" + }, + "terminationGracePeriodSeconds": { + "type": "integer" + }, + "timeoutSeconds": { + "type": "integer" + } + }, + "type": "object" + }, + "nameOverride": { + "type": "string" + }, + "nodeSelector": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "podAnnotations": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "podLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "podSecurityContext": { + "properties": { + "fsGroup": { + "type": "integer" + }, + "fsGroupChangePolicy": { + "enum": [ + "OnRootMismatch", + "Always" + ], + "type": "string" + }, + "runAsGroup": { + "type": "integer" + }, + "runAsNonRoot": { + "type": "boolean" + }, + "runAsUser": { + "type": "integer" + }, + "seLinuxOptions": { + "properties": { + "level": { + "type": "string" + }, + "role": { + "type": "string" + }, + "type": { + "type": "string" + }, + "user": { + "type": "string" + } + }, + "type": "object" + }, + "seccompProfile": { + "properties": { + "localhostProfile": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "type": "object" + }, + "supplementalGroups": { + "oneOf": [ + { + "items": { + "type": "integer" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "sysctls": { + "oneOf": [ + { + "items": { + "properties": { + "name": { + "type": "string" + }, + "value": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "windowsOptions": { + "properties": { + "gmsaCredentialSpec": { + "type": "string" + }, + "gmsaCredentialSpecName": { + "type": "string" + }, + "hostProcess": { + "type": "boolean" + }, + "runAsUserName": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "priorityClassName": { + "type": "string" + }, + "readinessProbe": { + "properties": { + "exec": { + "properties": { + "command": { + "oneOf": [ + { + "items": { + "type": "string" + }, + "type": "array" + }, + { + "type": "null" + } + ] + } + }, + "type": "object" + }, + "failureThreshold": { + "type": "integer" + }, + "grpc": { + "properties": { + "port": { + "type": "integer" + }, + "service": { + "type": "string" + } + }, + "type": "object" + }, + "httpGet": { + "properties": { + "host": { + "type": "string" + }, + "httpHeaders": { + "oneOf": [ + { + "items": { + "properties": { + "name": { + "type": "string" + }, + "value": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "path": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + }, + "scheme": { + "type": "string" + } + }, + "type": "object" + }, + "initialDelaySeconds": { + "type": "integer" + }, + "periodSeconds": { + "type": "integer" + }, + "successThreshold": { + "type": "integer" + }, + "tcpSocket": { + "properties": { + "host": { + "type": "string" + }, + "port": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + } + }, + "type": "object" + }, + "terminationGracePeriodSeconds": { + "type": "integer" + }, + "timeoutSeconds": { + "type": "integer" + } + }, + "type": "object" + }, + "replicaCount": { + "type": "integer" + }, + "resources": { + "properties": { + "claims": { + "oneOf": [ + { + "items": { + "properties": { + "name": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "limits": { + "additionalProperties": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + }, + "type": "object" + }, + "requests": { + "additionalProperties": { + "oneOf": [ + { + "type": "integer" + }, + { + "pattern": "^[0-9]+(\\.[0-9]){0,1}(m|k|M|G|T|P|Ki|Mi|Gi|Ti|Pi)?$", + "type": "string" + } + ] + }, + "type": "object" + } + }, + "type": "object" + }, + "secret": { + "properties": { + "create": { + "type": "boolean" + }, + "enterprise": { + "properties": { + "license": { + "type": "string" + } + }, + "type": "object" + }, + "kafka": { + "properties": { + "awsMskIamSecretKey": { + "type": "string" + }, + "protobufGitBasicAuthPassword": { + "type": "string" + }, + "saslPassword": { + "type": "string" + }, + "schemaRegistryPassword": { + "type": "string" + }, + "schemaRegistryTlsCa": { + "type": "string" + }, + "schemaRegistryTlsCert": { + "type": "string" + }, + "schemaRegistryTlsKey": { + "type": "string" + }, + "tlsCa": { + "type": "string" + }, + "tlsCert": { + "type": "string" + }, + "tlsKey": { + "type": "string" + }, + "tlsPassphrase": { + "type": "string" + } + }, + "type": "object" + }, + "login": { + "properties": { + "github": { + "properties": { + "clientSecret": { + "type": "string" + }, + "personalAccessToken": { + "type": "string" + } + }, + "type": "object" + }, + "google": { + "properties": { + "clientSecret": { + "type": "string" + }, + "groupsServiceAccount": { + "type": "string" + } + }, + "type": "object" + }, + "jwtSecret": { + "type": "string" + }, + "oidc": { + "properties": { + "clientSecret": { + "type": "string" + } + }, + "type": "object" + }, + "okta": { + "properties": { + "clientSecret": { + "type": "string" + }, + "directoryApiToken": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "redpanda": { + "properties": { + "adminApi": { + "properties": { + "password": { + "type": "string" + }, + "tlsCa": { + "type": "string" + }, + "tlsCert": { + "type": "string" + }, + "tlsKey": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "object" + } + }, + "type": "object" + }, + "secretMounts": { + "oneOf": [ + { + "items": { + "properties": { + "defaultMode": { + "type": "integer" + }, + "name": { + "type": "string" + }, + "path": { + "type": "string" + }, + "secretName": { + "type": "string" + }, + "subPath": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "securityContext": { + "properties": { + "allowPrivilegeEscalation": { + "type": "boolean" + }, + "capabilities": { + "properties": { + "add": { + "oneOf": [ + { + "items": { + "type": "string" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "drop": { + "oneOf": [ + { + "items": { + "type": "string" + }, + "type": "array" + }, + { + "type": "null" + } + ] + } + }, + "type": "object" + }, + "privileged": { + "type": "boolean" + }, + "procMount": { + "type": "string" + }, + "readOnlyRootFilesystem": { + "type": "boolean" + }, + "runAsGroup": { + "type": "integer" + }, + "runAsNonRoot": { + "type": "boolean" + }, + "runAsUser": { + "type": "integer" + }, + "seLinuxOptions": { + "properties": { + "level": { + "type": "string" + }, + "role": { + "type": "string" + }, + "type": { + "type": "string" + }, + "user": { + "type": "string" + } + }, + "type": "object" + }, + "seccompProfile": { + "properties": { + "localhostProfile": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "type": "object" + }, + "windowsOptions": { + "properties": { + "gmsaCredentialSpec": { + "type": "string" + }, + "gmsaCredentialSpecName": { + "type": "string" + }, + "hostProcess": { + "type": "boolean" + }, + "runAsUserName": { + "type": "string" + } + }, "type": "object" } }, "type": "object" }, - "enabled": { - "type": "boolean" + "service": { + "properties": { + "annotations": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "nodePort": { + "type": "integer" + }, + "port": { + "type": "integer" + }, + "targetPort": { + "type": "integer" + }, + "type": { + "type": "string" + } + }, + "type": "object" + }, + "serviceAccount": { + "properties": { + "annotations": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + }, + "automountServiceAccountToken": { + "type": "boolean" + }, + "create": { + "type": "boolean" + }, + "name": { + "type": "string" + } + }, + "type": "object" + }, + "strategy": { + "properties": { + "rollingUpdate": { + "properties": { + "maxSurge": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + }, + "maxUnavailable": { + "oneOf": [ + { + "type": "string" + }, + { + "type": "number" + } + ] + } + }, + "type": "object" + }, + "type": { + "type": "string" + } + }, + "type": "object" + }, + "tests": { + "properties": { + "enabled": { + "type": "boolean" + } + }, + "type": "object" + }, + "tolerations": { + "oneOf": [ + { + "items": { + "properties": { + "effect": { + "type": "string" + }, + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "tolerationSeconds": { + "type": "integer" + }, + "value": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] + }, + "topologySpreadConstraints": { + "oneOf": [ + { + "items": { + "properties": { + "labelSelector": { + "properties": { + "matchExpressions": { + "items": { + "properties": { + "key": { + "type": "string" + }, + "operator": { + "type": "string" + }, + "values": { + "items": { + "type": "string" + }, + "type": "array" + } + }, + "type": "object" + }, + "type": "array" + }, + "matchLabels": { + "additionalProperties": { + "type": "string" + }, + "type": "object" + } + }, + "type": "object" + }, + "matchLabelKeys": { + "items": { + "type": "string" + }, + "type": "array" + }, + "maxSkew": { + "type": "integer" + }, + "minDomains": { + "type": "integer" + }, + "nodeAffinityPolicy": { + "type": "string" + }, + "nodeTaintsPolicy": { + "type": "string" + }, + "topologyKey": { + "type": "string" + }, + "whenUnsatisfiable": { + "type": "string" + } + }, + "type": "object" + }, + "type": "array" + }, + { + "type": "null" + } + ] } }, "type": "object" diff --git a/charts/redpanda/values_partial.gen.go b/charts/redpanda/values_partial.gen.go index c319b8f108..9beb66609e 100644 --- a/charts/redpanda/values_partial.gen.go +++ b/charts/redpanda/values_partial.gen.go @@ -8,6 +8,7 @@ package redpanda import ( cmmeta "github.com/cert-manager/cert-manager/pkg/apis/meta/v1" monitoringv1 "github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring/v1" + "github.com/redpanda-data/helm-charts/charts/console" corev1 "k8s.io/api/core/v1" "k8s.io/apimachinery/pkg/api/resource" ) @@ -28,7 +29,7 @@ type PartialValues struct { AuditLogging *PartialAuditLogging "json:\"auditLogging,omitempty\"" Enterprise *PartialEnterprise "json:\"enterprise,omitempty\"" RackAwareness *PartialRackAwareness "json:\"rackAwareness,omitempty\"" - Console *PartialConsole "json:\"console,omitempty\"" + Console *console.PartialValues "json:\"console,omitempty\"" Connectors *PartialConnectors "json:\"connectors,omitempty\"" Auth *PartialAuth "json:\"auth,omitempty\"" TLS *PartialTLS "json:\"tls,omitempty\"" @@ -83,13 +84,6 @@ type PartialRackAwareness struct { NodeAnnotation *string "json:\"nodeAnnotation,omitempty\" jsonschema:\"required\"" } -type PartialConsole struct { - Enabled *bool "json:\"enabled,omitempty\"" - Console *struct { - Config map[string]any "json:\"config,omitempty\"" - } "json:\"console,omitempty\"" -} - type PartialConnectors struct { Enabled *bool "json:\"enabled,omitempty\"" Connectors *PartialConnectorsChartValues "json:\"connectors,omitempty\"" diff --git a/cmd/genpartial/main.go b/cmd/genpartial/main.go index 43047195b8..10f31e7fec 100644 --- a/cmd/genpartial/main.go +++ b/cmd/genpartial/main.go @@ -50,9 +50,8 @@ func main() { } pkgs := Must(packages.Load(&packages.Config{ - Dir: cwd, - Mode: mode, - BuildFlags: []string{"-tags=generate"}, + Dir: cwd, + Mode: mode, }, flag.Arg(0))) var buf bytes.Buffer