Skip to content

Commit 97c26c0

Browse files
fix: update dashboard, etc, ingresss versions, fix broken features af… (#752)
* fix: update dashboard, etc, ingresss versions, fix broken features after merge of v2 * chore: fix indentation for apisix dpeloyment annotations * fix: disable default security context for embedded etcd * chore: increase chart version to 2.8.0 * chore: fix new line absence in _helpers.tpl --------- Co-authored-by: Katlinsky, Ilya <[email protected]>
1 parent 693acfa commit 97c26c0

12 files changed

+49
-17
lines changed

charts/apisix/Chart.lock

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
dependencies:
22
- name: etcd
33
repository: https://charts.bitnami.com/bitnami
4-
version: 8.7.7
4+
version: 9.7.3
55
- name: apisix-dashboard
66
repository: https://charts.apiseven.com
7-
version: 0.8.1
7+
version: 0.8.2
88
- name: apisix-ingress-controller
99
repository: https://charts.apiseven.com
10-
version: 0.13.0
11-
digest: sha256:6ca1fc0eb06fef4d4502a3153ed77c9cd5a382ebe65e676791afe4272ac7c796
12-
generated: "2023-12-14T20:21:52.603033345+02:00"
10+
version: 0.14.0
11+
digest: sha256:8d727979670a2b62af7672c36ebb2a4d294bc967b16fb5d1e144ed77c948062d
12+
generated: "2024-04-29T09:07:03.535941+02:00"

charts/apisix/Chart.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ type: application
3131
# This is the chart version. This version number should be incremented each time you make changes
3232
# to the chart and its templates, including the app version.
3333
# Versions are expected to follow Semantic Versioning (https://semver.org/)
34-
version: 2.7.0
34+
version: 2.8.0
3535

3636
# This is the version number of the application being deployed. This version number should be
3737
# incremented each time you make changes to the application. Versions are not expected to
@@ -42,16 +42,16 @@ sources:
4242

4343
dependencies:
4444
- name: etcd
45-
version: 8.7.7
45+
version: 9.7.3
4646
repository: https://charts.bitnami.com/bitnami
4747
condition: etcd.enabled
4848
- name: apisix-dashboard
49-
version: 0.8.1
49+
version: 0.8.2
5050
repository: https://charts.apiseven.com
5151
condition: dashboard.enabled
5252
alias: dashboard
5353
- name: apisix-ingress-controller
54-
version: 0.13.0
54+
version: 0.14.0
5555
repository: https://charts.apiseven.com
5656
condition: ingress-controller.enabled
5757
alias: ingress-controller

charts/apisix/README.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,11 @@ The command removes all the Kubernetes components associated with the chart and
4343
| affinity | object | `{}` | Set affinity for Apache APISIX deploy |
4444
| apisix.admin.allow.ipList | list | `["127.0.0.1/24"]` | The client IP CIDR allowed to access Apache APISIX Admin API service. |
4545
| apisix.admin.cors | bool | `true` | Admin API support CORS response headers |
46-
| apisix.admin.credentials | object | `{"admin":"edd1c9f034335f136f87ad84b625c8f1","secretName":"","viewer":"4054f7cf07e344346cd3f287985e76a2"}` | Admin API credentials |
46+
| apisix.admin.credentials | object | `{"admin":"edd1c9f034335f136f87ad84b625c8f1","secretAdminKey":"","secretName":"","secretViewerKey":"","viewer":"4054f7cf07e344346cd3f287985e76a2"}` | Admin API credentials |
4747
| apisix.admin.credentials.admin | string | `"edd1c9f034335f136f87ad84b625c8f1"` | Apache APISIX admin API admin role credentials |
48+
| apisix.admin.credentials.secretAdminKey | string | `""` | Name of the admin role key in the secret, overrides the default key name "admin" |
4849
| apisix.admin.credentials.secretName | string | `""` | The APISIX Helm chart supports storing user credentials in a secret. The secret needs to contain two keys, admin and viewer, with their respective values set. |
50+
| apisix.admin.credentials.secretViewerKey | string | `""` | Name of the viewer role key in the secret, overrides the default key name "viewer" |
4951
| apisix.admin.credentials.viewer | string | `"4054f7cf07e344346cd3f287985e76a2"` | Apache APISIX admin API viewer role credentials |
5052
| apisix.admin.enabled | bool | `true` | Enable Admin API |
5153
| apisix.admin.externalIPs | list | `[]` | IPs for which nodes in the cluster will also accept traffic for the servic |
@@ -138,7 +140,7 @@ The command removes all the Kubernetes components associated with the chart and
138140
| dashboard.config.conf.etcd.prefix | string | `"/apisix"` | apisix configurations prefix |
139141
| dashboard.config.conf.etcd.username | string | `nil` | Specifies etcd basic auth username if enable etcd auth |
140142
| dashboard.enabled | bool | `false` | |
141-
| etcd | object | `{"auth":{"rbac":{"create":false,"rootPassword":""},"tls":{"certFilename":"","certKeyFilename":"","enabled":false,"existingSecret":"","sni":"","verify":true}},"enabled":true,"prefix":"/apisix","replicaCount":3,"service":{"port":2379},"timeout":30}` | etcd configuration use the FQDN address or the IP of the etcd |
143+
| etcd | object | `{"auth":{"rbac":{"create":false,"rootPassword":""},"tls":{"certFilename":"","certKeyFilename":"","enabled":false,"existingSecret":"","sni":"","verify":true}},"containerSecurityContext":{"enabled":false},"enabled":true,"prefix":"/apisix","replicaCount":3,"service":{"port":2379},"timeout":30}` | etcd configuration use the FQDN address or the IP of the etcd |
142144
| etcd.auth | object | `{"rbac":{"create":false,"rootPassword":""},"tls":{"certFilename":"","certKeyFilename":"","enabled":false,"existingSecret":"","sni":"","verify":true}}` | if etcd.enabled is true, set more values of bitnami/etcd helm chart |
143145
| etcd.auth.rbac.create | bool | `false` | No authentication by default. Switch to enable RBAC authentication |
144146
| etcd.auth.rbac.rootPassword | string | `""` | root password for etcd. Requires etcd.auth.rbac.create to be true. |
@@ -148,6 +150,7 @@ The command removes all the Kubernetes components associated with the chart and
148150
| etcd.auth.tls.existingSecret | string | `""` | name of the secret contains etcd client cert |
149151
| etcd.auth.tls.sni | string | `""` | specify the TLS Server Name Indication extension, the ETCD endpoint hostname will be used when this setting is unset. |
150152
| etcd.auth.tls.verify | bool | `true` | whether to verify the etcd endpoint certificate when setup a TLS connection to etcd |
153+
| etcd.containerSecurityContext | object | `{"enabled":false}` | added for backward compatibility with old kubernetes versions, as seccompProfile is not supported in kubernetes < 1.19 |
151154
| etcd.enabled | bool | `true` | install etcd(v3) by default, set false if do not want to install etcd(v3) together |
152155
| etcd.prefix | string | `"/apisix"` | apisix configurations prefix |
153156
| etcd.timeout | int | `30` | Set the timeout value in seconds for subsequent socket operations from apisix to etcd cluster |
-6.98 KB
Binary file not shown.
7.83 KB
Binary file not shown.
Binary file not shown.
Binary file not shown.

charts/apisix/charts/etcd-8.7.7.tgz

-42.6 KB
Binary file not shown.

charts/apisix/charts/etcd-9.7.3.tgz

43.9 KB
Binary file not shown.

charts/apisix/templates/_helpers.tpl

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -135,3 +135,25 @@ Return the password key name of etcd secret
135135
{{- print .Values.externalEtcd.secretPasswordKey }}
136136
{{- end }}
137137
{{- end -}}
138+
139+
{{/*
140+
Key to use to fetch admin token from secret
141+
*/}}
142+
{{- define "apisix.admin.credentials.secretAdminKey" -}}
143+
{{- if .Values.admin.credentials.secretAdminKey }}
144+
{{- .Values.admin.credentials.secretAdminKey }}
145+
{{- else }}
146+
{{- "admin" }}
147+
{{- end }}
148+
{{- end }}
149+
150+
{{/*
151+
Key to use to fetch viewer token from secret
152+
*/}}
153+
{{- define "apisix.admin.credentials.secretViewerKey" -}}
154+
{{- if .Values.admin.credentials.secretViewerKey }}
155+
{{- .Values.admin.credentials.secretViewerKey }}
156+
{{- else }}
157+
{{- "viewer" }}
158+
{{- end }}
159+
{{- end }}

charts/apisix/templates/deployment.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,8 @@ spec:
3838
metadata:
3939
annotations:
4040
checksum/config: {{ include (print $.Template.BasePath "/configmap.yaml") . | sha256sum }}
41-
{{- if .Values.podAnnotations }}
42-
{{- range $key, $value := $.Values.podAnnotations }}
43-
{{ $key }}: {{ $value | quote }}
44-
{{- end }}
41+
{{- with .Values.podAnnotations }}
42+
{{ tpl (toYaml .) $ | nindent 8 }}
4543
{{- end }}
4644
labels:
4745
{{- include "apisix.selectorLabels" . | nindent 8 }}
@@ -85,12 +83,12 @@ spec:
8583
valueFrom:
8684
secretKeyRef:
8785
name: {{ .Values.apisix.admin.credentials.secretName }}
88-
key: admin
86+
key: {{ include "apisix.admin.credentials.secretAdminKey" . }}
8987
- name: APISIX_VIEWER_KEY
9088
valueFrom:
9189
secretKeyRef:
9290
name: {{ .Values.apisix.admin.credentials.secretName }}
93-
key: viewer
91+
key: {{ include "apisix.admin.credentials.secretViewerKey" . }}
9492
{{- end }}
9593

9694
{{- if or (and .Values.etcd.enabled .Values.etcd.auth.rbac.create) (and (not .Values.etcd.enabled) .Values.externalEtcd.user) }}

charts/apisix/values.yaml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -333,6 +333,10 @@ apisix:
333333
# -- The APISIX Helm chart supports storing user credentials in a secret.
334334
# The secret needs to contain two keys, admin and viewer, with their respective values set.
335335
secretName: ""
336+
# -- Name of the admin role key in the secret, overrides the default key name "admin"
337+
secretAdminKey: ""
338+
# -- Name of the viewer role key in the secret, overrides the default key name "viewer"
339+
secretViewerKey: ""
336340

337341
allow:
338342
# -- The client IP CIDR allowed to access Apache APISIX Admin API service.
@@ -566,6 +570,11 @@ etcd:
566570
# -- specify the TLS Server Name Indication extension, the ETCD endpoint hostname will be used when this setting is unset.
567571
sni: ""
568572

573+
# -- ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
574+
# -- added for backward compatibility with old kubernetes versions, as seccompProfile is not supported in kubernetes < 1.19
575+
containerSecurityContext:
576+
enabled: false
577+
569578
service:
570579
port: 2379
571580

0 commit comments

Comments
 (0)