mirror of
https://github.com/twuni/docker-registry.helm.git
synced 2026-02-20 07:09:50 +00:00
Compare commits
30 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
524a0a9375 | ||
|
|
91124414a5 | ||
|
|
808510d274 | ||
|
|
c7d3bc3b42 | ||
|
|
baae5c6986 | ||
|
|
a03420f765 | ||
|
|
7d16b3c57b | ||
|
|
c112edabe5 | ||
|
|
456d4f0308 | ||
|
|
419a289a0e | ||
|
|
ed0a778281 | ||
|
|
9193ce0ae8 | ||
|
|
ebc2372fb4 | ||
|
|
38acafc680 | ||
|
|
a1b77cb212 | ||
|
|
05d75cad63 | ||
|
|
d74c33abd9 | ||
|
|
fc2ab7e7ac | ||
|
|
405346f80e | ||
|
|
b152f62233 | ||
|
|
55647356c5 | ||
|
|
294d61f9d3 | ||
|
|
836f46131f | ||
|
|
c7b3257baa | ||
|
|
1315fc281e | ||
|
|
635fd0fa0c | ||
|
|
91dd5f2928 | ||
|
|
8ce5a40b47 | ||
|
|
96ad7c0eb4 | ||
|
|
a1cd36f55e |
12
.github/workflows/pr_diff.yaml
vendored
12
.github/workflows/pr_diff.yaml
vendored
@@ -1,8 +1,8 @@
|
||||
name: PR Diff for Helm chart
|
||||
|
||||
on:
|
||||
pull_request:
|
||||
pull_request_target:
|
||||
|
||||
|
||||
permissions:
|
||||
pull-requests: write
|
||||
|
||||
@@ -16,14 +16,20 @@ jobs:
|
||||
id: diff
|
||||
run: |
|
||||
OPTIONS=(
|
||||
--namespace meta-namespace
|
||||
--set serviceAccount.create=true
|
||||
--set priorityClassName=high
|
||||
--set podAnnotations.test=annotation
|
||||
--set extraEnvVars[0].name=TEST_NAME
|
||||
--set extraEnvVars[0].value=TEST_VALUE
|
||||
--set extraVolumes[0].name=test
|
||||
--set extraVolumes[0].emptyDir.medium=Memory
|
||||
--set extraVolumeMounts[0].name=test
|
||||
--set extraVolumeMounts[0].mountPath=/test
|
||||
--set secrets.htpasswd=abc
|
||||
--set tlsSecretName=abc
|
||||
--set garbageCollect.enabled=true
|
||||
--set namespace=target-namespace
|
||||
--set proxy.enabled=true
|
||||
--set storage=s3
|
||||
--set secrets.s3.secretKey=abc
|
||||
@@ -32,7 +38,7 @@ jobs:
|
||||
--set s3.bucket=abc
|
||||
--set s3.encrypt=abc
|
||||
)
|
||||
helm template --debug ${OPTIONS[@]} --output-dir before ${{ github.server_url }}/${{ github.repository }}/archive/refs/heads/${{ github.base_ref }}.tar.gz
|
||||
helm template --debug ${OPTIONS[@]} --output-dir before https://github.com/twuni/docker-registry.helm/archive/refs/heads/main.tar.gz
|
||||
helm template --debug ${OPTIONS[@]} --output-dir after .
|
||||
# https://docs.github.com/en/actions/using-workflows/workflow-commands-for-github-actions#multiline-strings
|
||||
echo 'HELM_DIFF<<EOF' >> $GITHUB_ENV
|
||||
|
||||
@@ -1,8 +1,8 @@
|
||||
apiVersion: v1
|
||||
description: A Helm chart for Docker Registry
|
||||
name: docker-registry
|
||||
version: 2.2.1
|
||||
appVersion: 2.7.1
|
||||
version: 2.2.3
|
||||
appVersion: 2.8.1
|
||||
home: https://hub.docker.com/_/registry/
|
||||
icon: https://helm.twun.io/docker-registry.png
|
||||
maintainers:
|
||||
|
||||
@@ -35,7 +35,7 @@ their default values.
|
||||
|:----------------------------|:-------------------------------------------------------------------------------------------|:----------------|
|
||||
| `image.pullPolicy` | Container pull policy | `IfNotPresent` |
|
||||
| `image.repository` | Container image to use | `registry` |
|
||||
| `image.tag` | Container image tag to deploy | `2.7.1` |
|
||||
| `image.tag` | Container image tag to deploy | `2.8.1` |
|
||||
| `imagePullSecrets` | Specify image pull secrets | `nil` (does not add image pull secrets to deployed pods) |
|
||||
| `persistence.accessMode` | Access mode to use for PVC | `ReadWriteOnce` |
|
||||
| `persistence.enabled` | Whether to use a PVC for the Docker storage | `false` |
|
||||
@@ -46,6 +46,7 @@ their default values.
|
||||
| `serviceAccount.create` | Create ServiceAccount | `false` |
|
||||
| `serviceAccount.name` | ServiceAccount name | `nil` |
|
||||
| `serviceAccount.annotations` | Annotations to add to the ServiceAccount | `{}` |
|
||||
| `deployment.annotations` | Annotations to add to the Deployment | `{}` |
|
||||
| `service.port` | TCP port on which the service is exposed | `5000` |
|
||||
| `service.type` | service type | `ClusterIP` |
|
||||
| `service.clusterIP` | if `service.type` is `ClusterIP` and this is non-empty, sets the cluster IP of the service | `nil` |
|
||||
|
||||
@@ -168,7 +168,7 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
|
||||
{{- end }}
|
||||
|
||||
{{- with .Values.extraVolumeMounts }}
|
||||
{{- toYaml . }}
|
||||
{{ toYaml . }}
|
||||
{{- end }}
|
||||
|
||||
{{- end -}}
|
||||
@@ -204,6 +204,6 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
|
||||
{{- end }}
|
||||
|
||||
{{- with .Values.extraVolumes }}
|
||||
{{- toYaml . }}
|
||||
{{ toYaml . }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
|
||||
@@ -38,9 +38,7 @@ spec:
|
||||
priorityClassName: "{{ .Values.priorityClassName }}"
|
||||
{{- end }}
|
||||
{{- if .Values.securityContext.enabled }}
|
||||
securityContext:
|
||||
fsGroup: {{ .Values.securityContext.fsGroup }}
|
||||
runAsUser: {{ .Values.securityContext.runAsUser }}
|
||||
securityContext: {{ omit .Values.securityContext "enabled" | toYaml | nindent 12 }}
|
||||
{{- end }}
|
||||
containers:
|
||||
- name: {{ .Chart.Name }}
|
||||
@@ -52,6 +50,9 @@ spec:
|
||||
- --delete-untagged={{ .Values.garbageCollect.deleteUntagged }}
|
||||
- /etc/docker/registry/config.yml
|
||||
env: {{ include "docker-registry.envs" . | nindent 16 }}
|
||||
{{- if .Values.containerSecurityContext.enabled }}
|
||||
securityContext: {{ omit .Values.containerSecurityContext "enabled" | toYaml | nindent 16 }}
|
||||
{{- end }}
|
||||
volumeMounts: {{ include "docker-registry.volumeMounts" . | nindent 16 }}
|
||||
restartPolicy: OnFailure
|
||||
{{- if .Values.nodeSelector }}
|
||||
|
||||
@@ -8,6 +8,10 @@ metadata:
|
||||
chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}
|
||||
release: {{ .Release.Name }}
|
||||
heritage: {{ .Release.Service }}
|
||||
{{- if .Values.deployment.annotations }}
|
||||
annotations:
|
||||
{{ toYaml .Values.deployment.annotations | indent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
@@ -43,9 +47,7 @@ spec:
|
||||
priorityClassName: "{{ .Values.priorityClassName }}"
|
||||
{{- end }}
|
||||
{{- if .Values.securityContext.enabled }}
|
||||
securityContext:
|
||||
fsGroup: {{ .Values.securityContext.fsGroup }}
|
||||
runAsUser: {{ .Values.securityContext.runAsUser }}
|
||||
securityContext: {{ omit .Values.securityContext "enabled" | toYaml | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- with .Values.initContainers }}
|
||||
initContainers:
|
||||
@@ -82,6 +84,9 @@ spec:
|
||||
port: 5000
|
||||
resources: {{ toYaml .Values.resources | nindent 12 }}
|
||||
env: {{ include "docker-registry.envs" . | nindent 12 }}
|
||||
{{- if .Values.containerSecurityContext.enabled }}
|
||||
securityContext: {{ omit .Values.containerSecurityContext "enabled" | toYaml | nindent 12 }}
|
||||
{{- end }}
|
||||
volumeMounts: {{ include "docker-registry.volumeMounts" . | nindent 12 }}
|
||||
{{- if .Values.nodeSelector }}
|
||||
nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
|
||||
|
||||
@@ -1,5 +1,9 @@
|
||||
{{- if .Values.podDisruptionBudget -}}
|
||||
{{- if .Capabilities.APIVersions.Has "policy/v1" -}}
|
||||
apiVersion: policy/v1
|
||||
{{- else}}
|
||||
apiVersion: policy/v1beta1
|
||||
{{- end }}
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ template "docker-registry.fullname" . }}
|
||||
|
||||
@@ -7,6 +7,7 @@ metadata:
|
||||
chart: {{ .Chart.Name }}-{{ .Chart.Version }}
|
||||
heritage: {{ .Release.Service }}
|
||||
release: {{ .Release.Name }}
|
||||
namespace: {{ .Values.namespace | default .Release.Namespace }}
|
||||
{{- if .Values.serviceAccount.name }}
|
||||
name: {{ .Values.serviceAccount.name }}
|
||||
{{- else }}
|
||||
|
||||
@@ -19,10 +19,12 @@ serviceAccount:
|
||||
|
||||
image:
|
||||
repository: registry
|
||||
tag: 2.7.1
|
||||
tag: 2.8.1
|
||||
pullPolicy: IfNotPresent
|
||||
# imagePullSecrets:
|
||||
# - name: docker
|
||||
deployment: {}
|
||||
# annotations:
|
||||
service:
|
||||
name: registry
|
||||
type: ClusterIP
|
||||
@@ -152,6 +154,9 @@ configData:
|
||||
interval: 10s
|
||||
threshold: 3
|
||||
|
||||
containerSecurityContext:
|
||||
enabled: false
|
||||
|
||||
securityContext:
|
||||
enabled: true
|
||||
runAsUser: 1000
|
||||
|
||||
Reference in New Issue
Block a user