Chart: Add global.image.registry
. (#12028)
This commit is contained in:
parent
3f6e6aef78
commit
45fc8860cf
10 changed files with 49 additions and 14 deletions
|
@ -255,7 +255,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
|
||||||
| controller.admissionWebhooks.patch.image.digest | string | `"sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3"` | |
|
| controller.admissionWebhooks.patch.image.digest | string | `"sha256:a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3"` | |
|
||||||
| controller.admissionWebhooks.patch.image.image | string | `"ingress-nginx/kube-webhook-certgen"` | |
|
| controller.admissionWebhooks.patch.image.image | string | `"ingress-nginx/kube-webhook-certgen"` | |
|
||||||
| controller.admissionWebhooks.patch.image.pullPolicy | string | `"IfNotPresent"` | |
|
| controller.admissionWebhooks.patch.image.pullPolicy | string | `"IfNotPresent"` | |
|
||||||
| controller.admissionWebhooks.patch.image.registry | string | `"registry.k8s.io"` | |
|
|
||||||
| controller.admissionWebhooks.patch.image.tag | string | `"v1.4.3"` | |
|
| controller.admissionWebhooks.patch.image.tag | string | `"v1.4.3"` | |
|
||||||
| controller.admissionWebhooks.patch.labels | object | `{}` | Labels to be added to patch job resources |
|
| controller.admissionWebhooks.patch.labels | object | `{}` | Labels to be added to patch job resources |
|
||||||
| controller.admissionWebhooks.patch.networkPolicy.enabled | bool | `false` | Enable 'networkPolicy' or not |
|
| controller.admissionWebhooks.patch.networkPolicy.enabled | bool | `false` | Enable 'networkPolicy' or not |
|
||||||
|
@ -328,7 +327,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
|
||||||
| controller.image.image | string | `"ingress-nginx/controller"` | |
|
| controller.image.image | string | `"ingress-nginx/controller"` | |
|
||||||
| controller.image.pullPolicy | string | `"IfNotPresent"` | |
|
| controller.image.pullPolicy | string | `"IfNotPresent"` | |
|
||||||
| controller.image.readOnlyRootFilesystem | bool | `false` | |
|
| controller.image.readOnlyRootFilesystem | bool | `false` | |
|
||||||
| controller.image.registry | string | `"registry.k8s.io"` | |
|
|
||||||
| controller.image.runAsGroup | int | `82` | This value must not be changed using the official image. uid=101(www-data) gid=82(www-data) groups=82(www-data) |
|
| controller.image.runAsGroup | int | `82` | This value must not be changed using the official image. uid=101(www-data) gid=82(www-data) groups=82(www-data) |
|
||||||
| controller.image.runAsNonRoot | bool | `true` | |
|
| controller.image.runAsNonRoot | bool | `true` | |
|
||||||
| controller.image.runAsUser | int | `101` | This value must not be changed using the official image. uid=101(www-data) gid=82(www-data) groups=82(www-data) |
|
| controller.image.runAsUser | int | `101` | This value must not be changed using the official image. uid=101(www-data) gid=82(www-data) groups=82(www-data) |
|
||||||
|
@ -491,7 +489,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
|
||||||
| defaultBackend.image.image | string | `"defaultbackend-amd64"` | |
|
| defaultBackend.image.image | string | `"defaultbackend-amd64"` | |
|
||||||
| defaultBackend.image.pullPolicy | string | `"IfNotPresent"` | |
|
| defaultBackend.image.pullPolicy | string | `"IfNotPresent"` | |
|
||||||
| defaultBackend.image.readOnlyRootFilesystem | bool | `true` | |
|
| defaultBackend.image.readOnlyRootFilesystem | bool | `true` | |
|
||||||
| defaultBackend.image.registry | string | `"registry.k8s.io"` | |
|
|
||||||
| defaultBackend.image.runAsGroup | int | `65534` | |
|
| defaultBackend.image.runAsGroup | int | `65534` | |
|
||||||
| defaultBackend.image.runAsNonRoot | bool | `true` | |
|
| defaultBackend.image.runAsNonRoot | bool | `true` | |
|
||||||
| defaultBackend.image.runAsUser | int | `65534` | |
|
| defaultBackend.image.runAsUser | int | `65534` | |
|
||||||
|
@ -533,6 +530,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
|
||||||
| defaultBackend.unhealthyPodEvictionPolicy | string | `""` | Eviction policy for unhealthy pods guarded by PodDisruptionBudget. Ref: https://kubernetes.io/blog/2023/01/06/unhealthy-pod-eviction-policy-for-pdbs/ |
|
| defaultBackend.unhealthyPodEvictionPolicy | string | `""` | Eviction policy for unhealthy pods guarded by PodDisruptionBudget. Ref: https://kubernetes.io/blog/2023/01/06/unhealthy-pod-eviction-policy-for-pdbs/ |
|
||||||
| defaultBackend.updateStrategy | object | `{}` | The update strategy to apply to the Deployment or DaemonSet # |
|
| defaultBackend.updateStrategy | object | `{}` | The update strategy to apply to the Deployment or DaemonSet # |
|
||||||
| dhParam | string | `""` | A base64-encoded Diffie-Hellman parameter. This can be generated with: `openssl dhparam 4096 2> /dev/null | base64` # Ref: https://github.com/kubernetes/ingress-nginx/tree/main/docs/examples/customization/ssl-dh-param |
|
| dhParam | string | `""` | A base64-encoded Diffie-Hellman parameter. This can be generated with: `openssl dhparam 4096 2> /dev/null | base64` # Ref: https://github.com/kubernetes/ingress-nginx/tree/main/docs/examples/customization/ssl-dh-param |
|
||||||
|
| global.image.registry | string | `"registry.k8s.io"` | Registry host to pull images from. |
|
||||||
| imagePullSecrets | list | `[]` | Optional array of imagePullSecrets containing private registry credentials # Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ |
|
| imagePullSecrets | list | `[]` | Optional array of imagePullSecrets containing private registry credentials # Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ |
|
||||||
| namespaceOverride | string | `""` | Override the deployment namespace; defaults to .Release.Namespace |
|
| namespaceOverride | string | `""` | Override the deployment namespace; defaults to .Release.Namespace |
|
||||||
| portNamePrefix | string | `""` | Prefix for TCP and UDP ports names in ingress controller service # Some cloud providers, like Yandex Cloud may have a requirements for a port name regex to support cloud load balancer integration |
|
| portNamePrefix | string | `""` | Prefix for TCP and UDP ports names in ingress controller service # Some cloud providers, like Yandex Cloud may have a requirements for a port name regex to support cloud load balancer integration |
|
||||||
|
|
|
@ -42,7 +42,7 @@ spec:
|
||||||
{{- end }}
|
{{- end }}
|
||||||
containers:
|
containers:
|
||||||
- name: create
|
- name: create
|
||||||
{{- with .Values.controller.admissionWebhooks.patch.image }}
|
{{- with (merge .Values.controller.admissionWebhooks.patch.image .Values.global.image) }}
|
||||||
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ .image }}{{ end }}:{{ .tag }}{{ if .digest }}@{{ .digest }}{{ end }}
|
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ .image }}{{ end }}:{{ .tag }}{{ if .digest }}@{{ .digest }}{{ end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
imagePullPolicy: {{ .Values.controller.admissionWebhooks.patch.image.pullPolicy }}
|
imagePullPolicy: {{ .Values.controller.admissionWebhooks.patch.image.pullPolicy }}
|
||||||
|
|
|
@ -42,7 +42,7 @@ spec:
|
||||||
{{- end }}
|
{{- end }}
|
||||||
containers:
|
containers:
|
||||||
- name: patch
|
- name: patch
|
||||||
{{- with .Values.controller.admissionWebhooks.patch.image }}
|
{{- with (merge .Values.controller.admissionWebhooks.patch.image .Values.global.image) }}
|
||||||
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ .image }}{{ end }}:{{ .tag }}{{ if .digest }}@{{ .digest }}{{ end }}
|
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ .image }}{{ end }}:{{ .tag }}{{ if .digest }}@{{ .digest }}{{ end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
imagePullPolicy: {{ .Values.controller.admissionWebhooks.patch.image.pullPolicy }}
|
imagePullPolicy: {{ .Values.controller.admissionWebhooks.patch.image.pullPolicy }}
|
||||||
|
|
|
@ -75,7 +75,7 @@ spec:
|
||||||
{{- end }}
|
{{- end }}
|
||||||
containers:
|
containers:
|
||||||
- name: {{ .Values.controller.containerName }}
|
- name: {{ .Values.controller.containerName }}
|
||||||
{{- with .Values.controller.image }}
|
{{- with (merge .Values.controller.image .Values.global.image) }}
|
||||||
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ include "ingress-nginx.image" . }}{{ end }}:{{ .tag }}{{ include "ingress-nginx.imageDigest" . }}
|
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ include "ingress-nginx.image" . }}{{ end }}:{{ .tag }}{{ include "ingress-nginx.imageDigest" . }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
imagePullPolicy: {{ .Values.controller.image.pullPolicy }}
|
imagePullPolicy: {{ .Values.controller.image.pullPolicy }}
|
||||||
|
@ -182,7 +182,7 @@ spec:
|
||||||
{{- if .Values.controller.extraModules }}
|
{{- if .Values.controller.extraModules }}
|
||||||
{{- range .Values.controller.extraModules }}
|
{{- range .Values.controller.extraModules }}
|
||||||
{{- $containerSecurityContext := .containerSecurityContext | default $.Values.controller.containerSecurityContext }}
|
{{- $containerSecurityContext := .containerSecurityContext | default $.Values.controller.containerSecurityContext }}
|
||||||
{{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
|
{{- include "extraModules" (dict "name" .name "image" (merge .image $.Values.global.image) "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -81,7 +81,7 @@ spec:
|
||||||
{{- end }}
|
{{- end }}
|
||||||
containers:
|
containers:
|
||||||
- name: {{ .Values.controller.containerName }}
|
- name: {{ .Values.controller.containerName }}
|
||||||
{{- with .Values.controller.image }}
|
{{- with (merge .Values.controller.image .Values.global.image) }}
|
||||||
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ include "ingress-nginx.image" . }}{{ end }}:{{ .tag }}{{ include "ingress-nginx.imageDigest" . }}
|
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ include "ingress-nginx.image" . }}{{ end }}:{{ .tag }}{{ include "ingress-nginx.imageDigest" . }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
imagePullPolicy: {{ .Values.controller.image.pullPolicy }}
|
imagePullPolicy: {{ .Values.controller.image.pullPolicy }}
|
||||||
|
@ -188,7 +188,7 @@ spec:
|
||||||
{{- if .Values.controller.extraModules }}
|
{{- if .Values.controller.extraModules }}
|
||||||
{{- range .Values.controller.extraModules }}
|
{{- range .Values.controller.extraModules }}
|
||||||
{{- $containerSecurityContext := .containerSecurityContext | default $.Values.controller.containerSecurityContext }}
|
{{- $containerSecurityContext := .containerSecurityContext | default $.Values.controller.containerSecurityContext }}
|
||||||
{{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
|
{{- include "extraModules" (dict "name" .name "image" (merge .image $.Values.global.image) "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -50,7 +50,7 @@ spec:
|
||||||
{{- end }}
|
{{- end }}
|
||||||
containers:
|
containers:
|
||||||
- name: {{ template "ingress-nginx.name" . }}-default-backend
|
- name: {{ template "ingress-nginx.name" . }}-default-backend
|
||||||
{{- with .Values.defaultBackend.image }}
|
{{- with (merge .Values.defaultBackend.image .Values.global.image) }}
|
||||||
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ .image }}{{ end }}:{{ .tag }}{{ if .digest }}@{{ .digest }}{{ end }}
|
image: {{ if .repository }}{{ .repository }}{{ else }}{{ .registry }}/{{ .image }}{{ end }}:{{ .tag }}{{ if .digest }}@{{ .digest }}{{ end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
imagePullPolicy: {{ .Values.defaultBackend.image.pullPolicy }}
|
imagePullPolicy: {{ .Values.defaultBackend.image.pullPolicy }}
|
||||||
|
|
|
@ -148,6 +148,17 @@ tests:
|
||||||
path: spec.template.spec.containers[0].securityContext.runAsGroup
|
path: spec.template.spec.containers[0].securityContext.runAsGroup
|
||||||
value: 1000
|
value: 1000
|
||||||
|
|
||||||
|
- it: should create a DaemonSet with a custom registry if `global.image.registry` is set
|
||||||
|
set:
|
||||||
|
global.image.registry: custom.registry.io
|
||||||
|
controller.kind: DaemonSet
|
||||||
|
controller.image.tag: v1.0.0-dev
|
||||||
|
controller.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
|
||||||
|
asserts:
|
||||||
|
- equal:
|
||||||
|
path: spec.template.spec.containers[0].image
|
||||||
|
value: custom.registry.io/ingress-nginx/controller:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
|
||||||
|
|
||||||
- it: should create a DaemonSet with a custom registry if `controller.image.registry` is set
|
- it: should create a DaemonSet with a custom registry if `controller.image.registry` is set
|
||||||
set:
|
set:
|
||||||
controller.kind: DaemonSet
|
controller.kind: DaemonSet
|
||||||
|
|
|
@ -169,6 +169,16 @@ tests:
|
||||||
path: spec.template.spec.containers[0].securityContext.runAsGroup
|
path: spec.template.spec.containers[0].securityContext.runAsGroup
|
||||||
value: 1000
|
value: 1000
|
||||||
|
|
||||||
|
- it: should create a Deployment with a custom registry if `global.image.registry` is set
|
||||||
|
set:
|
||||||
|
global.image.registry: custom.registry.io
|
||||||
|
controller.image.tag: v1.0.0-dev
|
||||||
|
controller.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
|
||||||
|
asserts:
|
||||||
|
- equal:
|
||||||
|
path: spec.template.spec.containers[0].image
|
||||||
|
value: custom.registry.io/ingress-nginx/controller:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
|
||||||
|
|
||||||
- it: should create a Deployment with a custom registry if `controller.image.registry` is set
|
- it: should create a Deployment with a custom registry if `controller.image.registry` is set
|
||||||
set:
|
set:
|
||||||
controller.image.registry: custom.registry.io
|
controller.image.registry: custom.registry.io
|
||||||
|
|
|
@ -145,6 +145,17 @@ tests:
|
||||||
path: spec.template.spec.containers[0].securityContext.runAsGroup
|
path: spec.template.spec.containers[0].securityContext.runAsGroup
|
||||||
value: 1000
|
value: 1000
|
||||||
|
|
||||||
|
- it: should create a Deployment with a custom registry if `global.image.registry` is set
|
||||||
|
set:
|
||||||
|
global.image.registry: custom.registry.io
|
||||||
|
defaultBackend.enabled: true
|
||||||
|
defaultBackend.image.tag: v1.0.0-dev
|
||||||
|
defaultBackend.image.digest: sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
|
||||||
|
asserts:
|
||||||
|
- equal:
|
||||||
|
path: spec.template.spec.containers[0].image
|
||||||
|
value: custom.registry.io/defaultbackend-amd64:v1.0.0-dev@sha256:faa2d18687f734994b6bd9e309e7a73852a81c30e1b8f63165fcd4f0a087e3cd
|
||||||
|
|
||||||
- it: should create a Deployment with a custom registry if `defaultBackend.image.registry` is set
|
- it: should create a Deployment with a custom registry if `defaultBackend.image.registry` is set
|
||||||
set:
|
set:
|
||||||
defaultBackend.enabled: true
|
defaultBackend.enabled: true
|
||||||
|
|
|
@ -2,6 +2,11 @@
|
||||||
## Ref: https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/index.md
|
## Ref: https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/index.md
|
||||||
##
|
##
|
||||||
|
|
||||||
|
global:
|
||||||
|
image:
|
||||||
|
# -- Registry host to pull images from.
|
||||||
|
registry: registry.k8s.io
|
||||||
|
|
||||||
## Overrides for generated resource names
|
## Overrides for generated resource names
|
||||||
# See templates/_helpers.tpl
|
# See templates/_helpers.tpl
|
||||||
# nameOverride:
|
# nameOverride:
|
||||||
|
@ -21,7 +26,7 @@ controller:
|
||||||
image:
|
image:
|
||||||
## Keep false as default for now!
|
## Keep false as default for now!
|
||||||
chroot: false
|
chroot: false
|
||||||
registry: registry.k8s.io
|
# registry: registry.k8s.io
|
||||||
image: ingress-nginx/controller
|
image: ingress-nginx/controller
|
||||||
## for backwards compatibility consider setting the full image url via the repository value below
|
## for backwards compatibility consider setting the full image url via the repository value below
|
||||||
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
|
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
|
||||||
|
@ -686,7 +691,7 @@ controller:
|
||||||
extraModules: []
|
extraModules: []
|
||||||
# - name: mytestmodule
|
# - name: mytestmodule
|
||||||
# image:
|
# image:
|
||||||
# registry: registry.k8s.io
|
# # registry: registry.k8s.io
|
||||||
# image: ingress-nginx/mytestmodule
|
# image: ingress-nginx/mytestmodule
|
||||||
# ## for backwards compatibility consider setting the full image url via the repository value below
|
# ## for backwards compatibility consider setting the full image url via the repository value below
|
||||||
# ## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
|
# ## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
|
||||||
|
@ -785,7 +790,7 @@ controller:
|
||||||
patch:
|
patch:
|
||||||
enabled: true
|
enabled: true
|
||||||
image:
|
image:
|
||||||
registry: registry.k8s.io
|
# registry: registry.k8s.io
|
||||||
image: ingress-nginx/kube-webhook-certgen
|
image: ingress-nginx/kube-webhook-certgen
|
||||||
## for backwards compatibility consider setting the full image url via the repository value below
|
## for backwards compatibility consider setting the full image url via the repository value below
|
||||||
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
|
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
|
||||||
|
@ -942,7 +947,7 @@ defaultBackend:
|
||||||
enabled: false
|
enabled: false
|
||||||
name: defaultbackend
|
name: defaultbackend
|
||||||
image:
|
image:
|
||||||
registry: registry.k8s.io
|
# registry: registry.k8s.io
|
||||||
image: defaultbackend-amd64
|
image: defaultbackend-amd64
|
||||||
## for backwards compatibility consider setting the full image url via the repository value below
|
## for backwards compatibility consider setting the full image url via the repository value below
|
||||||
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
|
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
|
||||||
|
|
Loading…
Reference in a new issue