From a2fc85fc714288807e5f04cd1f70316b514f609c Mon Sep 17 00:00:00 2001 From: Matt Butcher Date: Wed, 1 Apr 2020 13:09:24 -0600 Subject: [PATCH] fix: fixed bug in Dependency.List() A bug in Dependency.List() caused all compressed charts to flag their dependencies as "missing". Closes #4431 Signed-off-by: Matt Butcher --- .../output/dependency-list-archive.txt | 8 +- pkg/action/dependency.go | 51 ++-- pkg/action/dependency_test.go | 58 ++++ .../charts/chart-missing-deps/.helmignore | 5 + .../charts/chart-missing-deps/Chart.yaml | 20 ++ .../charts/chart-missing-deps/README.md | 232 ++++++++++++++++ .../chart-missing-deps/requirements.lock | 6 + .../chart-missing-deps/requirements.yaml | 7 + .../chart-missing-deps/templates/NOTES.txt | 38 +++ .../chart-missing-deps/templates/_helpers.tpl | 24 ++ .../templates/deployment.yaml | 155 +++++++++++ .../templates/externaldb-secrets.yaml | 14 + .../chart-missing-deps/templates/ingress.yaml | 36 +++ .../chart-missing-deps/templates/pvc.yaml | 24 ++ .../chart-missing-deps/templates/secrets.yaml | 17 ++ .../chart-missing-deps/templates/svc.yaml | 29 ++ .../tests/test-mariadb-connection.yaml | 29 ++ .../templates/tls-secrets.yaml | 18 ++ .../charts/chart-missing-deps/values.yaml | 254 ++++++++++++++++++ ...art-with-compressed-dependencies-2.1.8.tgz | Bin 0 -> 18123 bytes .../.helmignore | 5 + .../Chart.yaml | 20 ++ .../README.md | 232 ++++++++++++++++ .../charts/mariadb-4.3.1.tgz | Bin 0 -> 8401 bytes .../requirements.lock | 6 + .../requirements.yaml | 7 + .../templates/NOTES.txt | 38 +++ .../templates/_helpers.tpl | 24 ++ .../templates/deployment.yaml | 155 +++++++++++ .../templates/externaldb-secrets.yaml | 14 + .../templates/ingress.yaml | 36 +++ .../templates/pvc.yaml | 24 ++ .../templates/secrets.yaml | 17 ++ .../templates/svc.yaml | 29 ++ .../tests/test-mariadb-connection.yaml | 29 ++ .../templates/tls-secrets.yaml | 18 ++ .../values.yaml | 254 ++++++++++++++++++ ...t-with-uncompressed-dependencies-2.1.8.tgz | Bin 0 -> 18127 bytes .../.helmignore | 5 + .../Chart.yaml | 20 ++ .../README.md | 232 ++++++++++++++++ .../charts/mariadb/.helmignore | 1 + .../charts/mariadb/Chart.yaml | 21 ++ .../charts/mariadb/README.md | 143 ++++++++++ .../docker-entrypoint-initdb.d/README.md | 3 + .../charts/mariadb/templates/NOTES.txt | 35 +++ .../charts/mariadb/templates/_helpers.tpl | 53 ++++ .../templates/initialization-configmap.yaml | 12 + .../mariadb/templates/master-configmap.yaml | 15 ++ .../mariadb/templates/master-statefulset.yaml | 187 +++++++++++++ .../charts/mariadb/templates/master-svc.yaml | 29 ++ .../charts/mariadb/templates/secrets.yaml | 38 +++ .../mariadb/templates/slave-configmap.yaml | 15 ++ .../mariadb/templates/slave-statefulset.yaml | 193 +++++++++++++ .../charts/mariadb/templates/slave-svc.yaml | 31 +++ .../charts/mariadb/templates/test-runner.yaml | 44 +++ .../charts/mariadb/templates/tests.yaml | 9 + .../charts/mariadb/values.yaml | 233 ++++++++++++++++ .../requirements.lock | 6 + .../requirements.yaml | 7 + .../templates/NOTES.txt | 38 +++ .../templates/_helpers.tpl | 24 ++ .../templates/deployment.yaml | 155 +++++++++++ .../templates/externaldb-secrets.yaml | 14 + .../templates/ingress.yaml | 36 +++ .../templates/pvc.yaml | 24 ++ .../templates/secrets.yaml | 17 ++ .../templates/svc.yaml | 29 ++ .../tests/test-mariadb-connection.yaml | 29 ++ .../templates/tls-secrets.yaml | 18 ++ .../values.yaml | 254 ++++++++++++++++++ .../testdata/output/compressed-deps-tgz.txt | 3 + .../testdata/output/compressed-deps.txt | 3 + pkg/action/testdata/output/missing-deps.txt | 3 + .../testdata/output/uncompressed-deps-tgz.txt | 3 + .../testdata/output/uncompressed-deps.txt | 3 + 76 files changed, 3889 insertions(+), 29 deletions(-) create mode 100644 pkg/action/dependency_test.go create mode 100755 pkg/action/testdata/charts/chart-missing-deps/.helmignore create mode 100755 pkg/action/testdata/charts/chart-missing-deps/Chart.yaml create mode 100755 pkg/action/testdata/charts/chart-missing-deps/README.md create mode 100755 pkg/action/testdata/charts/chart-missing-deps/requirements.lock create mode 100755 pkg/action/testdata/charts/chart-missing-deps/requirements.yaml create mode 100755 pkg/action/testdata/charts/chart-missing-deps/templates/NOTES.txt create mode 100755 pkg/action/testdata/charts/chart-missing-deps/templates/_helpers.tpl create mode 100755 pkg/action/testdata/charts/chart-missing-deps/templates/deployment.yaml create mode 100755 pkg/action/testdata/charts/chart-missing-deps/templates/externaldb-secrets.yaml create mode 100755 pkg/action/testdata/charts/chart-missing-deps/templates/ingress.yaml create mode 100755 pkg/action/testdata/charts/chart-missing-deps/templates/pvc.yaml create mode 100755 pkg/action/testdata/charts/chart-missing-deps/templates/secrets.yaml create mode 100755 pkg/action/testdata/charts/chart-missing-deps/templates/svc.yaml create mode 100755 pkg/action/testdata/charts/chart-missing-deps/templates/tests/test-mariadb-connection.yaml create mode 100755 pkg/action/testdata/charts/chart-missing-deps/templates/tls-secrets.yaml create mode 100755 pkg/action/testdata/charts/chart-missing-deps/values.yaml create mode 100644 pkg/action/testdata/charts/chart-with-compressed-dependencies-2.1.8.tgz create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/.helmignore create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/Chart.yaml create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/README.md create mode 100644 pkg/action/testdata/charts/chart-with-compressed-dependencies/charts/mariadb-4.3.1.tgz create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/requirements.lock create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/requirements.yaml create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/NOTES.txt create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/_helpers.tpl create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/deployment.yaml create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/externaldb-secrets.yaml create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/ingress.yaml create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/pvc.yaml create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/secrets.yaml create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/svc.yaml create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/tests/test-mariadb-connection.yaml create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/tls-secrets.yaml create mode 100755 pkg/action/testdata/charts/chart-with-compressed-dependencies/values.yaml create mode 100644 pkg/action/testdata/charts/chart-with-uncompressed-dependencies-2.1.8.tgz create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/.helmignore create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/Chart.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/README.md create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/.helmignore create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/Chart.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/README.md create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/files/docker-entrypoint-initdb.d/README.md create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/NOTES.txt create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/_helpers.tpl create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/initialization-configmap.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-configmap.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-statefulset.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-svc.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/secrets.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-configmap.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-statefulset.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-svc.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/test-runner.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/tests.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/values.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/requirements.lock create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/requirements.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/NOTES.txt create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/_helpers.tpl create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/deployment.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/externaldb-secrets.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/ingress.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/pvc.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/secrets.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/svc.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/tests/test-mariadb-connection.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/tls-secrets.yaml create mode 100755 pkg/action/testdata/charts/chart-with-uncompressed-dependencies/values.yaml create mode 100644 pkg/action/testdata/output/compressed-deps-tgz.txt create mode 100644 pkg/action/testdata/output/compressed-deps.txt create mode 100644 pkg/action/testdata/output/missing-deps.txt create mode 100644 pkg/action/testdata/output/uncompressed-deps-tgz.txt create mode 100644 pkg/action/testdata/output/uncompressed-deps.txt diff --git a/cmd/helm/testdata/output/dependency-list-archive.txt b/cmd/helm/testdata/output/dependency-list-archive.txt index a0fc13cd0..ffd4542b0 100644 --- a/cmd/helm/testdata/output/dependency-list-archive.txt +++ b/cmd/helm/testdata/output/dependency-list-archive.txt @@ -1,5 +1,5 @@ -NAME VERSION REPOSITORY STATUS -reqsubchart 0.1.0 https://example.com/charts missing -reqsubchart2 0.2.0 https://example.com/charts missing -reqsubchart3 >=0.1.0 https://example.com/charts missing +NAME VERSION REPOSITORY STATUS +reqsubchart 0.1.0 https://example.com/charts unpacked +reqsubchart2 0.2.0 https://example.com/charts unpacked +reqsubchart3 >=0.1.0 https://example.com/charts unpacked diff --git a/pkg/action/dependency.go b/pkg/action/dependency.go index 5781cc913..4a4b8ebad 100644 --- a/pkg/action/dependency.go +++ b/pkg/action/dependency.go @@ -55,15 +55,22 @@ func (d *Dependency) List(chartpath string, out io.Writer) error { return nil } - d.printDependencies(chartpath, out, c.Metadata.Dependencies) + d.printDependencies(chartpath, out, c) fmt.Fprintln(out) d.printMissing(chartpath, out, c.Metadata.Dependencies) return nil } -func (d *Dependency) dependencyStatus(chartpath string, dep *chart.Dependency) string { +func (d *Dependency) dependencyStatus(chartpath string, dep *chart.Dependency, parent *chart.Chart) string { filename := fmt.Sprintf("%s-%s.tgz", dep.Name, "*") + // If a chart is unpacked, this will check the unpacked chart's `charts/` directory for tarballs. + // Technically, this is COMPLETELY unnecessary, and should be removed in Helm 4. It is here + // to preserved backward compatibility. In Helm 2/3, there is a "difference" between + // the tgz version (which outputs "ok" if it unpacks) and the loaded version (which outouts + // "unpacked"). Early in Helm 2's history, this would have made a difference. But it no + // longer does. However, since this code shipped with Helm 3, the output must remain stable + // until Helm 4. switch archives, err := filepath.Glob(filepath.Join(chartpath, "charts", filename)); { case err != nil: return "bad pattern" @@ -91,58 +98,52 @@ func (d *Dependency) dependencyStatus(chartpath string, dep *chart.Dependency) s return "invalid version" } - if constraint.Check(v) { - return "ok" + if !constraint.Check(v) { + return "wrong version" } - return "wrong version" } return "ok" } } + // End unnecessary code. - folder := filepath.Join(chartpath, "charts", dep.Name) - if fi, err := os.Stat(folder); err != nil { - return "missing" - } else if !fi.IsDir() { - return "mispackaged" - } - - c, err := loader.Load(folder) - if err != nil { - return "corrupt" + var depChart *chart.Chart + for _, item := range parent.Dependencies() { + if item.Name() == dep.Name { + depChart = item + } } - if c.Name() != dep.Name { - return "misnamed" + if depChart == nil { + return "missing" } - if c.Metadata.Version != dep.Version { + if depChart.Metadata.Version != dep.Version { constraint, err := semver.NewConstraint(dep.Version) if err != nil { return "invalid version" } - v, err := semver.NewVersion(c.Metadata.Version) + v, err := semver.NewVersion(depChart.Metadata.Version) if err != nil { return "invalid version" } - if constraint.Check(v) { - return "unpacked" + if !constraint.Check(v) { + return "wrong version" } - return "wrong version" } return "unpacked" } // printDependencies prints all of the dependencies in the yaml file. -func (d *Dependency) printDependencies(chartpath string, out io.Writer, reqs []*chart.Dependency) { +func (d *Dependency) printDependencies(chartpath string, out io.Writer, c *chart.Chart) { table := uitable.New() table.MaxColWidth = 80 table.AddRow("NAME", "VERSION", "REPOSITORY", "STATUS") - for _, row := range reqs { - table.AddRow(row.Name, row.Version, row.Repository, d.dependencyStatus(chartpath, row)) + for _, row := range c.Metadata.Dependencies { + table.AddRow(row.Name, row.Version, row.Repository, d.dependencyStatus(chartpath, row, c)) } fmt.Fprintln(out, table) } diff --git a/pkg/action/dependency_test.go b/pkg/action/dependency_test.go new file mode 100644 index 000000000..158acbfb9 --- /dev/null +++ b/pkg/action/dependency_test.go @@ -0,0 +1,58 @@ +/* +Copyright The Helm Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package action + +import ( + "bytes" + "testing" + + "helm.sh/helm/v3/internal/test" +) + +func TestList(t *testing.T) { + for _, tcase := range []struct { + chart string + golden string + }{ + { + chart: "testdata/charts/chart-with-compressed-dependencies", + golden: "output/compressed-deps.txt", + }, + { + chart: "testdata/charts/chart-with-compressed-dependencies-2.1.8.tgz", + golden: "output/compressed-deps-tgz.txt", + }, + { + chart: "testdata/charts/chart-with-uncompressed-dependencies", + golden: "output/uncompressed-deps.txt", + }, + { + chart: "testdata/charts/chart-with-uncompressed-dependencies-2.1.8.tgz", + golden: "output/uncompressed-deps-tgz.txt", + }, + { + chart: "testdata/charts/chart-missing-deps", + golden: "output/missing-deps.txt", + }, + } { + buf := bytes.Buffer{} + if err := NewDependency().List(tcase.chart, &buf); err != nil { + t.Fatal(err) + } + test.AssertGoldenBytes(t, buf.Bytes(), tcase.golden) + } +} diff --git a/pkg/action/testdata/charts/chart-missing-deps/.helmignore b/pkg/action/testdata/charts/chart-missing-deps/.helmignore new file mode 100755 index 000000000..e2cf7941f --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/.helmignore @@ -0,0 +1,5 @@ +.git +# OWNERS file for Kubernetes +OWNERS +# example production yaml +values-production.yaml \ No newline at end of file diff --git a/pkg/action/testdata/charts/chart-missing-deps/Chart.yaml b/pkg/action/testdata/charts/chart-missing-deps/Chart.yaml new file mode 100755 index 000000000..8304984fd --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/Chart.yaml @@ -0,0 +1,20 @@ +appVersion: 4.9.8 +description: Web publishing platform for building blogs and websites. +engine: gotpl +home: http://www.wordpress.com/ +icon: https://bitnami.com/assets/stacks/wordpress/img/wordpress-stack-220x234.png +keywords: +- wordpress +- cms +- blog +- http +- web +- application +- php +maintainers: +- email: containers@bitnami.com + name: bitnami-bot +name: chart-with-missing-deps +sources: +- https://github.com/bitnami/bitnami-docker-wordpress +version: 2.1.8 diff --git a/pkg/action/testdata/charts/chart-missing-deps/README.md b/pkg/action/testdata/charts/chart-missing-deps/README.md new file mode 100755 index 000000000..5859a17fa --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/README.md @@ -0,0 +1,232 @@ +# WordPress + +[WordPress](https://wordpress.org/) is one of the most versatile open source content management systems on the market. A publishing platform for building blogs and websites. + +## TL;DR; + +```console +$ helm install stable/wordpress +``` + +## Introduction + +This chart bootstraps a [WordPress](https://github.com/bitnami/bitnami-docker-wordpress) deployment on a [Kubernetes](http://kubernetes.io) cluster using the [Helm](https://helm.sh) package manager. + +It also packages the [Bitnami MariaDB chart](https://github.com/kubernetes/charts/tree/master/stable/mariadb) which is required for bootstrapping a MariaDB deployment for the database requirements of the WordPress application. + +## Prerequisites + +- Kubernetes 1.4+ with Beta APIs enabled +- PV provisioner support in the underlying infrastructure + +## Installing the Chart + +To install the chart with the release name `my-release`: + +```console +$ helm install --name my-release stable/wordpress +``` + +The command deploys WordPress on the Kubernetes cluster in the default configuration. The [configuration](#configuration) section lists the parameters that can be configured during installation. + +> **Tip**: List all releases using `helm list` + +## Uninstalling the Chart + +To uninstall/delete the `my-release` deployment: + +```console +$ helm delete my-release +``` + +The command removes all the Kubernetes components associated with the chart and deletes the release. + +## Configuration + +The following table lists the configurable parameters of the WordPress chart and their default values. + +| Parameter | Description | Default | +|----------------------------------|--------------------------------------------|---------------------------------------------------------| +| `image.registry` | WordPress image registry | `docker.io` | +| `image.repository` | WordPress image name | `bitnami/wordpress` | +| `image.tag` | WordPress image tag | `{VERSION}` | +| `image.pullPolicy` | Image pull policy | `Always` if `imageTag` is `latest`, else `IfNotPresent` | +| `image.pullSecrets` | Specify image pull secrets | `nil` | +| `wordpressUsername` | User of the application | `user` | +| `wordpressPassword` | Application password | _random 10 character long alphanumeric string_ | +| `wordpressEmail` | Admin email | `user@example.com` | +| `wordpressFirstName` | First name | `FirstName` | +| `wordpressLastName` | Last name | `LastName` | +| `wordpressBlogName` | Blog name | `User's Blog!` | +| `wordpressTablePrefix` | Table prefix | `wp_` | +| `allowEmptyPassword` | Allow DB blank passwords | `yes` | +| `smtpHost` | SMTP host | `nil` | +| `smtpPort` | SMTP port | `nil` | +| `smtpUser` | SMTP user | `nil` | +| `smtpPassword` | SMTP password | `nil` | +| `smtpUsername` | User name for SMTP emails | `nil` | +| `smtpProtocol` | SMTP protocol [`tls`, `ssl`] | `nil` | +| `replicaCount` | Number of WordPress Pods to run | `1` | +| `mariadb.enabled` | Deploy MariaDB container(s) | `true` | +| `mariadb.rootUser.password` | MariaDB admin password | `nil` | +| `mariadb.db.name` | Database name to create | `bitnami_wordpress` | +| `mariadb.db.user` | Database user to create | `bn_wordpress` | +| `mariadb.db.password` | Password for the database | _random 10 character long alphanumeric string_ | +| `externalDatabase.host` | Host of the external database | `localhost` | +| `externalDatabase.user` | Existing username in the external db | `bn_wordpress` | +| `externalDatabase.password` | Password for the above username | `nil` | +| `externalDatabase.database` | Name of the existing database | `bitnami_wordpress` | +| `externalDatabase.port` | Database port number | `3306` | +| `serviceType` | Kubernetes Service type | `LoadBalancer` | +| `serviceExternalTrafficPolicy` | Enable client source IP preservation | `Cluster` | +| `nodePorts.http` | Kubernetes http node port | `""` | +| `nodePorts.https` | Kubernetes https node port | `""` | +| `healthcheckHttps` | Use https for liveliness and readiness | `false` | +| `ingress.enabled` | Enable ingress controller resource | `false` | +| `ingress.hosts[0].name` | Hostname to your WordPress installation | `wordpress.local` | +| `ingress.hosts[0].path` | Path within the url structure | `/` | +| `ingress.hosts[0].tls` | Utilize TLS backend in ingress | `false` | +| `ingress.hosts[0].tlsSecret` | TLS Secret (certificates) | `wordpress.local-tls-secret` | +| `ingress.hosts[0].annotations` | Annotations for this host's ingress record | `[]` | +| `ingress.secrets[0].name` | TLS Secret Name | `nil` | +| `ingress.secrets[0].certificate` | TLS Secret Certificate | `nil` | +| `ingress.secrets[0].key` | TLS Secret Key | `nil` | +| `persistence.enabled` | Enable persistence using PVC | `true` | +| `persistence.existingClaim` | Enable persistence using an existing PVC | `nil` | +| `persistence.storageClass` | PVC Storage Class | `nil` (uses alpha storage class annotation) | +| `persistence.accessMode` | PVC Access Mode | `ReadWriteOnce` | +| `persistence.size` | PVC Storage Request | `10Gi` | +| `nodeSelector` | Node labels for pod assignment | `{}` | +| `tolerations` | List of node taints to tolerate | `[]` | +| `affinity` | Map of node/pod affinities | `{}` | + +The above parameters map to the env variables defined in [bitnami/wordpress](http://github.com/bitnami/bitnami-docker-wordpress). For more information please refer to the [bitnami/wordpress](http://github.com/bitnami/bitnami-docker-wordpress) image documentation. + +Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. For example, + +```console +$ helm install --name my-release \ + --set wordpressUsername=admin,wordpressPassword=password,mariadb.mariadbRootPassword=secretpassword \ + stable/wordpress +``` + +The above command sets the WordPress administrator account username and password to `admin` and `password` respectively. Additionally, it sets the MariaDB `root` user password to `secretpassword`. + +Alternatively, a YAML file that specifies the values for the above parameters can be provided while installing the chart. For example, + +```console +$ helm install --name my-release -f values.yaml stable/wordpress +``` + +> **Tip**: You can use the default [values.yaml](values.yaml) + +## Production and horizontal scaling + +The following repo contains the recommended production settings for wordpress capture in an alternative [values file](values-production.yaml). Please read carefully the comments in the values-production.yaml file to set up your environment appropriately. + +To horizontally scale this chart, first download the [values-production.yaml](values-production.yaml) file to your local folder, then: + +```console +$ helm install --name my-release -f ./values-production.yaml stable/wordpress +``` + +Note that [values-production.yaml](values-production.yaml) includes a replicaCount of 3, so there will be 3 WordPress pods. As a result, to use the /admin portal and to ensure you can scale wordpress you need to provide a ReadWriteMany PVC, if you don't have a provisioner for this type of storage, we recommend that you install the nfs provisioner and map it to a RWO volume. + +```console +$ helm install stable/nfs-server-provisioner --set persistence.enabled=true,persistence.size=10Gi +$ helm install --name my-release -f values-production.yaml --set persistence.storageClass=nfs stable/wordpress +``` + +## Persistence + +The [Bitnami WordPress](https://github.com/bitnami/bitnami-docker-wordpress) image stores the WordPress data and configurations at the `/bitnami` path of the container. + +Persistent Volume Claims are used to keep the data across deployments. This is known to work in GCE, AWS, and minikube. +See the [Configuration](#configuration) section to configure the PVC or to disable persistence. + +## Using an external database + +Sometimes you may want to have Wordpress connect to an external database rather than installing one inside your cluster, e.g. to use a managed database service, or use run a single database server for all your applications. To do this, the chart allows you to specify credentials for an external database under the [`externalDatabase` parameter](#configuration). You should also disable the MariaDB installation with the `mariadb.enabled` option. For example: + +```console +$ helm install stable/wordpress \ + --set mariadb.enabled=false,externalDatabase.host=myexternalhost,externalDatabase.user=myuser,externalDatabase.password=mypassword,externalDatabase.database=mydatabase,externalDatabase.port=3306 +``` + +Note also if you disable MariaDB per above you MUST supply values for the `externalDatabase` connection. + +## Ingress + +This chart provides support for ingress resources. If you have an +ingress controller installed on your cluster, such as [nginx-ingress](https://kubeapps.com/charts/stable/nginx-ingress) +or [traefik](https://kubeapps.com/charts/stable/traefik) you can utilize +the ingress controller to serve your WordPress application. + +To enable ingress integration, please set `ingress.enabled` to `true` + +### Hosts + +Most likely you will only want to have one hostname that maps to this +WordPress installation, however, it is possible to have more than one +host. To facilitate this, the `ingress.hosts` object is an array. + +For each item, please indicate a `name`, `tls`, `tlsSecret`, and any +`annotations` that you may want the ingress controller to know about. + +Indicating TLS will cause WordPress to generate HTTPS URLs, and +WordPress will be connected to at port 443. The actual secret that +`tlsSecret` references do not have to be generated by this chart. +However, please note that if TLS is enabled, the ingress record will not +work until this secret exists. + +For annotations, please see [this document](https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md). +Not all annotations are supported by all ingress controllers, but this +document does a good job of indicating which annotation is supported by +many popular ingress controllers. + +### TLS Secrets + +This chart will facilitate the creation of TLS secrets for use with the +ingress controller, however, this is not required. There are three +common use cases: + +* helm generates/manages certificate secrets +* user generates/manages certificates separately +* an additional tool (like [kube-lego](https://kubeapps.com/charts/stable/kube-lego)) +manages the secrets for the application + +In the first two cases, one will need a certificate and a key. We would +expect them to look like this: + +* certificate files should look like (and there can be more than one +certificate if there is a certificate chain) + +``` +-----BEGIN CERTIFICATE----- +MIID6TCCAtGgAwIBAgIJAIaCwivkeB5EMA0GCSqGSIb3DQEBCwUAMFYxCzAJBgNV +... +jScrvkiBO65F46KioCL9h5tDvomdU1aqpI/CBzhvZn1c0ZTf87tGQR8NK7v7 +-----END CERTIFICATE----- +``` +* keys should look like: +``` +-----BEGIN RSA PRIVATE KEY----- +MIIEogIBAAKCAQEAvLYcyu8f3skuRyUgeeNpeDvYBCDcgq+LsWap6zbX5f8oLqp4 +... +wrj2wDbCDCFmfqnSJ+dKI3vFLlEz44sAV8jX/kd4Y6ZTQhlLbYc= +-----END RSA PRIVATE KEY----- +```` + +If you are going to use Helm to manage the certificates, please copy +these values into the `certificate` and `key` values for a given +`ingress.secrets` entry. + +If you are going are going to manage TLS secrets outside of Helm, please +know that you can create a TLS secret by doing the following: + +``` +kubectl create secret tls wordpress.local-tls --key /path/to/key.key --cert /path/to/cert.crt +``` + +Please see [this example](https://github.com/kubernetes/contrib/tree/master/ingress/controllers/nginx/examples/tls) +for more information. diff --git a/pkg/action/testdata/charts/chart-missing-deps/requirements.lock b/pkg/action/testdata/charts/chart-missing-deps/requirements.lock new file mode 100755 index 000000000..cb3439862 --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/requirements.lock @@ -0,0 +1,6 @@ +dependencies: +- name: mariadb + repository: https://kubernetes-charts.storage.googleapis.com/ + version: 4.3.1 +digest: sha256:82a0e5374376169d2ecf7d452c18a2ed93507f5d17c3393a1457f9ffad7e9b26 +generated: 2018-08-02T22:07:51.905271776Z diff --git a/pkg/action/testdata/charts/chart-missing-deps/requirements.yaml b/pkg/action/testdata/charts/chart-missing-deps/requirements.yaml new file mode 100755 index 000000000..a894b8b3b --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/requirements.yaml @@ -0,0 +1,7 @@ +dependencies: +- name: mariadb + version: 4.x.x + repository: https://kubernetes-charts.storage.googleapis.com/ + condition: mariadb.enabled + tags: + - wordpress-database diff --git a/pkg/action/testdata/charts/chart-missing-deps/templates/NOTES.txt b/pkg/action/testdata/charts/chart-missing-deps/templates/NOTES.txt new file mode 100755 index 000000000..55626e4d1 --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/templates/NOTES.txt @@ -0,0 +1,38 @@ +1. Get the WordPress URL: + +{{- if .Values.ingress.enabled }} + + You should be able to access your new WordPress installation through + + {{- range .Values.ingress.hosts }} + {{ if .tls }}https{{ else }}http{{ end }}://{{ .name }}/admin + {{- end }} + +{{- else if contains "LoadBalancer" .Values.serviceType }} + + NOTE: It may take a few minutes for the LoadBalancer IP to be available. + Watch the status with: 'kubectl get svc --namespace {{ .Release.Namespace }} -w {{ template "fullname" . }}' + + export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ template "fullname" . }} -o jsonpath='{.status.loadBalancer.ingress[0].ip}') + echo "WordPress URL: http://$SERVICE_IP/" + echo "WordPress Admin URL: http://$SERVICE_IP/admin" + +{{- else if contains "ClusterIP" .Values.serviceType }} + + echo "WordPress URL: http://127.0.0.1:8080/" + echo "WordPress Admin URL: http://127.0.0.1:8080/admin" + kubectl port-forward --namespace {{ .Release.Namespace }} svc/{{ template "fullname" . }} 8080:80 + +{{- else if contains "NodePort" .Values.serviceType }} + + export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ template "fullname" . }}) + export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}") + echo "WordPress URL: http://$NODE_IP:$NODE_PORT/" + echo "WordPress Admin URL: http://$NODE_IP:$NODE_PORT/admin" + +{{- end }} + +2. Login with the following credentials to see your blog + + echo Username: {{ .Values.wordpressUsername }} + echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "fullname" . }} -o jsonpath="{.data.wordpress-password}" | base64 --decode) diff --git a/pkg/action/testdata/charts/chart-missing-deps/templates/_helpers.tpl b/pkg/action/testdata/charts/chart-missing-deps/templates/_helpers.tpl new file mode 100755 index 000000000..1e52d321c --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/templates/_helpers.tpl @@ -0,0 +1,24 @@ +{{/* vim: set filetype=mustache: */}} +{{/* +Expand the name of the chart. +*/}} +{{- define "name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +*/}} +{{- define "fullname" -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +*/}} +{{- define "mariadb.fullname" -}} +{{- printf "%s-%s" .Release.Name "mariadb" | trunc 63 | trimSuffix "-" -}} +{{- end -}} diff --git a/pkg/action/testdata/charts/chart-missing-deps/templates/deployment.yaml b/pkg/action/testdata/charts/chart-missing-deps/templates/deployment.yaml new file mode 100755 index 000000000..c5ab3d3ec --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/templates/deployment.yaml @@ -0,0 +1,155 @@ +apiVersion: extensions/v1beta1 +kind: Deployment +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +spec: + replicas: {{ .Values.replicaCount }} + template: + metadata: + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + spec: + {{- if .Values.image.pullSecrets }} + imagePullSecrets: + {{- range .Values.image.pullSecrets }} + - name: {{ . }} + {{- end}} + {{- end }} + containers: + - name: {{ template "fullname" . }} + image: "{{ .Values.image.registry }}/{{ .Values.image.repository }}:{{ .Values.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy | quote }} + env: + - name: ALLOW_EMPTY_PASSWORD + value: {{ .Values.allowEmptyPassword | quote }} + - name: MARIADB_HOST + {{- if .Values.mariadb.enabled }} + value: {{ template "mariadb.fullname" . }} + {{- else }} + value: {{ .Values.externalDatabase.host | quote }} + {{- end }} + - name: MARIADB_PORT_NUMBER + {{- if .Values.mariadb.enabled }} + value: "3306" + {{- else }} + value: {{ .Values.externalDatabase.port | quote }} + {{- end }} + - name: WORDPRESS_DATABASE_NAME + {{- if .Values.mariadb.enabled }} + value: {{ .Values.mariadb.db.name | quote }} + {{- else }} + value: {{ .Values.externalDatabase.database | quote }} + {{- end }} + - name: WORDPRESS_DATABASE_USER + {{- if .Values.mariadb.enabled }} + value: {{ .Values.mariadb.db.user | quote }} + {{- else }} + value: {{ .Values.externalDatabase.user | quote }} + {{- end }} + - name: WORDPRESS_DATABASE_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.mariadb.enabled }} + name: {{ template "mariadb.fullname" . }} + key: mariadb-password + {{- else }} + name: {{ printf "%s-%s" .Release.Name "externaldb" }} + key: db-password + {{- end }} + - name: WORDPRESS_USERNAME + value: {{ .Values.wordpressUsername | quote }} + - name: WORDPRESS_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "fullname" . }} + key: wordpress-password + - name: WORDPRESS_EMAIL + value: {{ .Values.wordpressEmail | quote }} + - name: WORDPRESS_FIRST_NAME + value: {{ .Values.wordpressFirstName | quote }} + - name: WORDPRESS_LAST_NAME + value: {{ .Values.wordpressLastName | quote }} + - name: WORDPRESS_BLOG_NAME + value: {{ .Values.wordpressBlogName | quote }} + - name: WORDPRESS_TABLE_PREFIX + value: {{ .Values.wordpressTablePrefix | quote }} + - name: SMTP_HOST + value: {{ .Values.smtpHost | quote }} + - name: SMTP_PORT + value: {{ .Values.smtpPort | quote }} + - name: SMTP_USER + value: {{ .Values.smtpUser | quote }} + - name: SMTP_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "fullname" . }} + key: smtp-password + - name: SMTP_USERNAME + value: {{ .Values.smtpUsername | quote }} + - name: SMTP_PROTOCOL + value: {{ .Values.smtpProtocol | quote }} + ports: + - name: http + containerPort: 80 + - name: https + containerPort: 443 + livenessProbe: + httpGet: + path: /wp-login.php + {{- if not .Values.healthcheckHttps }} + port: http + {{- else }} + port: https + scheme: HTTPS + {{- end }} +{{ toYaml .Values.livenessProbe | indent 10 }} + readinessProbe: + httpGet: + path: /wp-login.php + {{- if not .Values.healthcheckHttps }} + port: http + {{- else }} + port: https + scheme: HTTPS + {{- end }} +{{ toYaml .Values.readinessProbe | indent 10 }} + volumeMounts: + - mountPath: /bitnami/apache + name: wordpress-data + subPath: apache + - mountPath: /bitnami/wordpress + name: wordpress-data + subPath: wordpress + - mountPath: /bitnami/php + name: wordpress-data + subPath: php + resources: +{{ toYaml .Values.resources | indent 10 }} + volumes: + - name: wordpress-data + {{- if .Values.persistence.enabled }} + persistentVolumeClaim: + claimName: {{ .Values.persistence.existingClaim | default (include "fullname" .) }} + {{- else }} + emptyDir: {} + {{ end }} + {{- if .Values.nodeSelector }} + nodeSelector: +{{ toYaml .Values.nodeSelector | indent 8 }} + {{- end -}} + {{- with .Values.affinity }} + affinity: +{{ toYaml . | indent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} + {{- end }} + diff --git a/pkg/action/testdata/charts/chart-missing-deps/templates/externaldb-secrets.yaml b/pkg/action/testdata/charts/chart-missing-deps/templates/externaldb-secrets.yaml new file mode 100755 index 000000000..39399ae54 --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/templates/externaldb-secrets.yaml @@ -0,0 +1,14 @@ +{{- if not .Values.mariadb.enabled }} +apiVersion: v1 +kind: Secret +metadata: + name: {{ printf "%s-%s" .Release.Name "externaldb" }} + labels: + app: {{ printf "%s-%s" .Release.Name "externaldb" }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +type: Opaque +data: + db-password: {{ .Values.externalDatabase.password | b64enc | quote }} +{{- end }} diff --git a/pkg/action/testdata/charts/chart-missing-deps/templates/ingress.yaml b/pkg/action/testdata/charts/chart-missing-deps/templates/ingress.yaml new file mode 100755 index 000000000..7870146ff --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/templates/ingress.yaml @@ -0,0 +1,36 @@ +{{- if .Values.ingress.enabled }} +{{- range .Values.ingress.hosts }} +apiVersion: extensions/v1beta1 +kind: Ingress +metadata: + name: "{{- printf "%s-%s" .name $.Release.Name | trunc 63 | trimSuffix "-" -}}" + labels: + app: {{ template "fullname" $ }} + chart: "{{ $.Chart.Name }}-{{ $.Chart.Version }}" + release: "{{ $.Release.Name }}" + heritage: "{{ $.Release.Service }}" + annotations: + {{- if .tls }} + ingress.kubernetes.io/secure-backends: "true" + {{- end }} + {{- range $key, $value := .annotations }} + {{ $key }}: {{ $value | quote }} + {{- end }} +spec: + rules: + - host: {{ .name }} + http: + paths: + - path: {{ default "/" .path }} + backend: + serviceName: {{ template "fullname" $ }} + servicePort: 80 +{{- if .tls }} + tls: + - hosts: + - {{ .name }} + secretName: {{ .tlsSecret }} +{{- end }} +--- +{{- end }} +{{- end }} diff --git a/pkg/action/testdata/charts/chart-missing-deps/templates/pvc.yaml b/pkg/action/testdata/charts/chart-missing-deps/templates/pvc.yaml new file mode 100755 index 000000000..b3f912480 --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/templates/pvc.yaml @@ -0,0 +1,24 @@ +{{- if and .Values.persistence.enabled (not .Values.persistence.existingClaim) }} +kind: PersistentVolumeClaim +apiVersion: v1 +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +spec: + accessModes: + - {{ .Values.persistence.accessMode | quote }} + resources: + requests: + storage: {{ .Values.persistence.size | quote }} +{{- if .Values.persistence.storageClass }} +{{- if (eq "-" .Values.persistence.storageClass) }} + storageClassName: "" +{{- else }} + storageClassName: "{{ .Values.persistence.storageClass }}" +{{- end }} +{{- end }} +{{- end -}} diff --git a/pkg/action/testdata/charts/chart-missing-deps/templates/secrets.yaml b/pkg/action/testdata/charts/chart-missing-deps/templates/secrets.yaml new file mode 100755 index 000000000..80a28d724 --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/templates/secrets.yaml @@ -0,0 +1,17 @@ +apiVersion: v1 +kind: Secret +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +type: Opaque +data: + {{ if .Values.wordpressPassword }} + wordpress-password: {{ default "" .Values.wordpressPassword | b64enc | quote }} + {{ else }} + wordpress-password: {{ randAlphaNum 10 | b64enc | quote }} + {{ end }} + smtp-password: {{ default "" .Values.smtpPassword | b64enc | quote }} diff --git a/pkg/action/testdata/charts/chart-missing-deps/templates/svc.yaml b/pkg/action/testdata/charts/chart-missing-deps/templates/svc.yaml new file mode 100755 index 000000000..f6c399313 --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/templates/svc.yaml @@ -0,0 +1,29 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +spec: + type: {{ .Values.serviceType }} + {{- if (or (eq .Values.serviceType "LoadBalancer") (eq .Values.serviceType "NodePort")) }} + externalTrafficPolicy: {{ .Values.serviceExternalTrafficPolicy | quote }} + {{- end }} + ports: + - name: http + port: 80 + targetPort: http + {{- if (and (eq .Values.serviceType "NodePort") (not (empty .Values.nodePorts.http)))}} + nodePort: {{ .Values.nodePorts.http }} + {{- end }} + - name: https + port: 443 + targetPort: https + {{- if (and (eq .Values.serviceType "NodePort") (not (empty .Values.nodePorts.https)))}} + nodePort: {{ .Values.nodePorts.https }} + {{- end }} + selector: + app: {{ template "fullname" . }} diff --git a/pkg/action/testdata/charts/chart-missing-deps/templates/tests/test-mariadb-connection.yaml b/pkg/action/testdata/charts/chart-missing-deps/templates/tests/test-mariadb-connection.yaml new file mode 100755 index 000000000..95ccb38ad --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/templates/tests/test-mariadb-connection.yaml @@ -0,0 +1,29 @@ +{{- if .Values.mariadb.enabled }} +apiVersion: v1 +kind: Pod +metadata: + name: "{{ .Release.Name }}-credentials-test" + annotations: + "helm.sh/hook": test-success +spec: + containers: + - name: {{ .Release.Name }}-credentials-test + image: "{{ .Values.image.registry }}/{{ .Values.image.repository }}:{{ .Values.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy | quote }} + env: + - name: MARIADB_HOST + value: {{ template "mariadb.fullname" . }} + - name: MARIADB_PORT + value: "3306" + - name: WORDPRESS_DATABASE_NAME + value: {{ default "" .Values.mariadb.db.name | quote }} + - name: WORDPRESS_DATABASE_USER + value: {{ default "" .Values.mariadb.db.user | quote }} + - name: WORDPRESS_DATABASE_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-password + command: ["sh", "-c", "mysql --host=$MARIADB_HOST --port=$MARIADB_PORT --user=$WORDPRESS_DATABASE_USER --password=$WORDPRESS_DATABASE_PASSWORD"] + restartPolicy: Never +{{- end }} diff --git a/pkg/action/testdata/charts/chart-missing-deps/templates/tls-secrets.yaml b/pkg/action/testdata/charts/chart-missing-deps/templates/tls-secrets.yaml new file mode 100755 index 000000000..ca75d33ef --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/templates/tls-secrets.yaml @@ -0,0 +1,18 @@ +{{- if .Values.ingress.enabled }} +{{- range .Values.ingress.secrets }} +apiVersion: v1 +kind: Secret +metadata: + name: {{ .name }} + labels: + app: {{ template "fullname" $ }} + chart: "{{ $.Chart.Name }}-{{ $.Chart.Version }}" + release: "{{ $.Release.Name }}" + heritage: "{{ $.Release.Service }}" +type: kubernetes.io/tls +data: + tls.crt: {{ .certificate | b64enc }} + tls.key: {{ .key | b64enc }} +--- +{{- end }} +{{- end }} \ No newline at end of file diff --git a/pkg/action/testdata/charts/chart-missing-deps/values.yaml b/pkg/action/testdata/charts/chart-missing-deps/values.yaml new file mode 100755 index 000000000..3cb66dafd --- /dev/null +++ b/pkg/action/testdata/charts/chart-missing-deps/values.yaml @@ -0,0 +1,254 @@ +## Bitnami WordPress image version +## ref: https://hub.docker.com/r/bitnami/wordpress/tags/ +## +image: + registry: docker.io + repository: bitnami/wordpress + tag: 4.9.8-debian-9 + ## Specify a imagePullPolicy + ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' + ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images + ## + pullPolicy: IfNotPresent + ## Optionally specify an array of imagePullSecrets. + ## Secrets must be manually created in the namespace. + ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ + ## + # pullSecrets: + # - myRegistrKeySecretName + +## User of the application +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressUsername: user + +## Application password +## Defaults to a random 10-character alphanumeric string if not set +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +# wordpressPassword: + +## Admin email +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressEmail: user@example.com + +## First name +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressFirstName: FirstName + +## Last name +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressLastName: LastName + +## Blog name +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressBlogName: User's Blog! + +## Table prefix +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressTablePrefix: wp_ + +## Set to `yes` to allow the container to be started with blank passwords +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +allowEmptyPassword: yes + +## SMTP mail delivery configuration +## ref: https://github.com/bitnami/bitnami-docker-wordpress/#smtp-configuration +## +# smtpHost: +# smtpPort: +# smtpUser: +# smtpPassword: +# smtpUsername: +# smtpProtocol: + +replicaCount: 1 + +externalDatabase: +## All of these values are only used when mariadb.enabled is set to false + ## Database host + host: localhost + + ## non-root Username for Wordpress Database + user: bn_wordpress + + ## Database password + password: "" + + ## Database name + database: bitnami_wordpress + + ## Database port number + port: 3306 + +## +## MariaDB chart configuration +## +mariadb: + ## Whether to deploy a mariadb server to satisfy the applications database requirements. To use an external database set this to false and configure the externalDatabase parameters + enabled: true + ## Disable MariaDB replication + replication: + enabled: false + + ## Create a database and a database user + ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run + ## + db: + name: bitnami_wordpress + user: bn_wordpress + ## If the password is not specified, mariadb will generates a random password + ## + # password: + + ## MariaDB admin password + ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#setting-the-root-password-on-first-run + ## + # rootUser: + # password: + + ## Enable persistence using Persistent Volume Claims + ## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ + ## + master: + persistence: + enabled: true + ## mariadb data Persistent Volume Storage Class + ## If defined, storageClassName: + ## If set to "-", storageClassName: "", which disables dynamic provisioning + ## If undefined (the default) or set to null, no storageClassName spec is + ## set, choosing the default provisioner. (gp2 on AWS, standard on + ## GKE, AWS & OpenStack) + ## + # storageClass: "-" + accessMode: ReadWriteOnce + size: 8Gi + +## Kubernetes configuration +## For minikube, set this to NodePort, elsewhere use LoadBalancer or ClusterIP +## +serviceType: LoadBalancer +## +## serviceType: NodePort +## nodePorts: +## http: +## https: +nodePorts: + http: "" + https: "" +## Enable client source IP preservation +## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip +## +serviceExternalTrafficPolicy: Cluster + +## Allow health checks to be pointed at the https port +healthcheckHttps: false + +## Configure extra options for liveness and readiness probes +## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes) +livenessProbe: + initialDelaySeconds: 120 + periodSeconds: 10 + timeoutSeconds: 5 + failureThreshold: 6 + successThreshold: 1 +readinessProbe: + initialDelaySeconds: 30 + periodSeconds: 10 + timeoutSeconds: 5 + failureThreshold: 6 + successThreshold: 1 + +## Configure the ingress resource that allows you to access the +## Wordpress installation. Set up the URL +## ref: http://kubernetes.io/docs/user-guide/ingress/ +## +ingress: + ## Set to true to enable ingress record generation + enabled: false + + ## The list of hostnames to be covered with this ingress record. + ## Most likely this will be just one host, but in the event more hosts are needed, this is an array + hosts: + - name: wordpress.local + + ## Set this to true in order to enable TLS on the ingress record + ## A side effect of this will be that the backend wordpress service will be connected at port 443 + tls: false + + ## If TLS is set to true, you must declare what secret will store the key/certificate for TLS + tlsSecret: wordpress.local-tls + + ## Ingress annotations done as key:value pairs + ## If you're using kube-lego, you will want to add: + ## kubernetes.io/tls-acme: true + ## + ## For a full list of possible ingress annotations, please see + ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md + ## + ## If tls is set to true, annotation ingress.kubernetes.io/secure-backends: "true" will automatically be set + annotations: + # kubernetes.io/ingress.class: nginx + # kubernetes.io/tls-acme: true + + secrets: + ## If you're providing your own certificates, please use this to add the certificates as secrets + ## key and certificate should start with -----BEGIN CERTIFICATE----- or + ## -----BEGIN RSA PRIVATE KEY----- + ## + ## name should line up with a tlsSecret set further up + ## If you're using kube-lego, this is unneeded, as it will create the secret for you if it is not set + ## + ## It is also possible to create and manage the certificates outside of this helm chart + ## Please see README.md for more information + # - name: wordpress.local-tls + # key: + # certificate: + +## Enable persistence using Persistent Volume Claims +## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ +## +persistence: + enabled: true + ## wordpress data Persistent Volume Storage Class + ## If defined, storageClassName: + ## If set to "-", storageClassName: "", which disables dynamic provisioning + ## If undefined (the default) or set to null, no storageClassName spec is + ## set, choosing the default provisioner. (gp2 on AWS, standard on + ## GKE, AWS & OpenStack) + ## + # storageClass: "-" + ## + ## If you want to reuse an existing claim, you can pass the name of the PVC using + ## the existingClaim variable + # existingClaim: your-claim + accessMode: ReadWriteOnce + size: 10Gi + +## Configure resource requests and limits +## ref: http://kubernetes.io/docs/user-guide/compute-resources/ +## +resources: + requests: + memory: 512Mi + cpu: 300m + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} + +## Tolerations for pod assignment +## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ +## +tolerations: [] + +## Affinity for pod assignment +## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity +## +affinity: {} diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies-2.1.8.tgz b/pkg/action/testdata/charts/chart-with-compressed-dependencies-2.1.8.tgz new file mode 100644 index 0000000000000000000000000000000000000000..ac715433894acd0bf630385b93c22977f6a38341 GIT binary patch literal 18123 zcmYhCQ*tAAThB}U z8wLa9zW~yL&>Ksuu$W5AbIN(~aG0=Zu$ZZGSnH_ra4KqOaLQ}i*%&*Rd8sKo3P_vV z*@Ikmf4FRLH*j|aJkY*VTLwfnQc-I6n7JvmtT<;!&km(E=Zt40B{h(sCDxb1go9jJ znP~de-F0ujP#Eq>24ip8jgDWYt8)C2&Y!np$J>f==p!x&?bHm7)60uJfM5#;=jvmP z1tWNaXgsc^*_WT={+ztZ)u>utU;i5qY|*K?@2$Cdn(l4l)5Wj3y3(lX{z_Z%u4?}C zjcv8n&|Q+7?40~r;(pRHk@FG4PeawaABu|SzSnS-&pqSs;3?$AoDISzM9P|0C%7v( zWGzHtCtgT8M7j^28Eq_#ep*I>Ftp(>{R=?}qYv|%ZGiP58LC7A`f2;~=^H*3oI11_fkFS|4)$4Muhm-U{tISue7Ly1T3g6^sNLo=#8%uiGzefTEs#~xDf|U@z4Sa1$#%plf$z?%WmDMyF}5S zF~)>FqKimTpcKW1SPv9eL4F~C59(p<5EG~{od%MBs|8JV?AUWMF9<4-F%;t!Ob5PK zX8^L>29qJ$Xz`7vQ@HybvcpLu!)v{%NqIn=!)>rHOVwnhROSj<{++3QGzcYZCJ5nS zj=->gFwX-!#}YG6S+p4OAdW;u=pHqWGXY3sU|c{Ne`YnqiEgW)FyyF+YzoWk5gr(;Z68A9AfLfx*br z%D&aqF>|*xlsJ0s4hqmlfk?acHVzbAJF)kG0wPq|6GyT-Xz1 zXI@vHhEMgMFdGC)6*^JLh-L4BzTLa zjac_0oPYfUOL%_(*#$2<4v&eIcpS8uIgX$tcyYbdAO2w|i5x@j@`Io4D!TsXSG|-29 z8iaXBFnICh}N&j z2boaDjL;T3a?w-QIGzQ_&shi+e;wnn#wHz)Z_iwW2sjc{OAkxaSdMYXx2wbyCGeqK zgl82eD4Q(xrCfHp>MGV8$=`XKLq4Z4nZ7DdVOGFOKgI4EG2(yFqlL2!p(=!$WYS|} zY1&2?o1`#5G!U{ONHe`^%EqOT|xj$tF-J*@T#LcEs)hF1-HoKFZv`X_TXDarZQIwb~_3C~tA*37S;4vuj z$cN_q!6%!B3P%OwCrQ9@DUBLKvuXcU{8-+BZ*H=(Z;R=OiW$Mvi-`~l7M7QW>KBhL zMRpctj;!C4W@iwVBaeaQNAJR=N%@IsWrFv6fkiJQLIW>38h+>;JA&7CH;yJ{&_ZO2 zwJ#F-)()o*JjUo`u;LUp3M?6dWLN^~;)>bFwh-jgkUPrRZ6YDyPbMZy0LI)o+`=jI z*bA#EG<%;ucR$T*JW6aF*-kVOdG7&Jm#6IE`M2x{*RuK-qP&qD8JVYT4T%V{b>MJR zHNt2WszPygum=WYol*puVLA)!Wq8GI?U(5v2$+5aUtiA1FdM6sC3@+-PV4>z_~Q4h zaY#Ij$-#gqOfc6z!_ag}{_IoKIa_t&2l{C8(t*(Xf(tce!)>4u|l3`hq1X!PMhHZxA+C{jA_1u?iAOj|oG@RAZ~LDx>lchta4Mo9pCz87<2Z}S zmdsp)fuLl@nY)e3!D|uWBG@eiAgL3qt=la*2!m_W9zF6G!>H(ka)kwI3h32qS#c3P0@+Ds6pppB9{C0Yi9n8*2 zP!yS?1JFwh7Z*+vuGq+ww7gLmhEpdn6VmK4g2sVm+3g4U&|8zysG}f`nD9F^+@%?F zW(5Tj5UU&^7vZ1HgbB<2DOt*hWGaW*ul(Y-h@`9p zcbAa4?0(r!0F*?v4DElr$p4-|)FjQF6iYQNpbajJa50UEU=^1Oypah(H4#VC{m7Yn zv^H_$?Vopu_@ze5?A#@qaET5VTw9@e=t~5^elxLSlbAZ~w<(Zhksf3*T}cN>+NHL# z7=&;SP0#@1OV3Anuq+zd=i|i<;WGbZr)q$2bJG~p$OXo$OETA)-abZcS^UKYXgwrq z8A%L>7vjnA5RxnSo}FFEk}Gmr6%>xcQo3ZW_?8HaGcBhvpc=qPPo~)-*DXCBe(!{q z!p>E}FgQ$BFkw)#!78KB0OQn^ZWA5EIGls1Cv=)U(_*afpe7WHDdOpKHGLdkkc~ZV z4())`-`6v1xxVmfy73wrNsENsf@?tc6FX%8wGVm!afVb(S}8el(#U$0`3Br%MNFR5 z5cY&pU%a$4Wn&NW_Jy%Az);|+b!9T{4+H_9;YSR%Py}&OQ+5*v<96nqqWJmjJsysF zi0KiUM0_H1yv1Z$T8p7om|vzxol5a>jksVLThy$HDjDMcioxlLKLGh_nfU@aK~jRp zJS?IKk?yWH56c5b^I=+CACBu7Jr`!HV@AjQtvWA{ywWYd40kqp-YepAwj%%*ak;r@ z9SZD>o?fVPPztk_Xbq*HibI@T)ubIcA+V!LOQv6KhDqJf1p`O3UcBtKg1#h!Uf0<| zH*KQ9uC>WJgFZSVF@1NIHWf~uVrU}$meOmj?0`FE!;aTLxWVOF_NuXxGx?DC;LoP+ zmR%h&%G*esY5{fYQcH9_8>zS-0o?|9DJaRvm{P}>L}U`rNO)Kd3zB}g*d_cpi86Yf z!V!L^+ulXY`mg+g6+Xv}az%3DQGPBLil)+fr?%gPeMj2pXfdDE7Xzb;6UF!lp@^*Q zh8P$q)-I7fT$=F?l7(Sp3VIKcBo^PPO>ayeK=`2mC;r$Y4X=mWQ@fj`1H)Gr`>9Ca zxf}0A$!py6vE&Eq_W@~c3$)`OfcE`s+za(hN9@B>6@3%(jV310G+DCo#MPC2sei}H z2BSm}s#qPx{zFEdWkB<%RiybB7%?R~VJrl}yjE}_X>C)PU0)Wywlo=q+gTPq4^OYZ zdO!Yo*()aORLAu3YTfR*#O`q^t^R%os(K%2{8v)Sc;BTk!0K;pyJUFuQO+VEwrc^s zT0Ltfh!nQgUy@h25ek{GD9WLze4BpSwt(syOSedAn(`y-UWz{Gp|6Am5T1S7Bsfd# zT)4f12b6Hpqprt(_eK^Z5tJJUS@UVWsqO8}Kp)DUj0|{0W5P%q#M|BDWK-B< zCos^9NJqvA=MH7c)!`9gJ0G(e!zG#){pK?zp%46Xhk==XNO1-?ImE;{*(q(7tW3>q zMR&{S=VjFSG8Qa7$64XdIrZArEjj}g1G8X6otOrp2YM= z@=09)&PZ`%gg1^Jn2QFToCaLQDDZp-_!T|i06$1(SL>!voM;jB&t}L-kCSkE3E&%E z$v4AJrnB&+l3kvAh6bD%bypKZ_@&ZZo53OQZ16hYbkBHh)i@*FxNu;}Wr+0mDM&%X zZFhg*z11%#1SH;B^Wwxa&pEjoiS9=BVj6fML^_DUB*6MADARy5fDHc``s*ra1gW2T zQivEN5F+@jJi)@kJMvswA0@plSGl#6=Emj`80B!5++E0wZb_lQd9+ji0eXl}`2 zZ!AW}&Cpf0K;;030ysxW)QCjcnLdz!~b3FA%#?P&=*O>wRq~gHhA8J8aSr*e$ zNhuIqTw4>CvEh&tX@Gb*yQCy>zfjxPY?WAh3TL;qnt1DztGRw75G{xkQE=Cqkus0I5)#Cvpvz~C; zK)KE%VY4&P>I=Cr?aD9omixE8j}T2CYL7FEqD5QWp4zrb8?_N$a`-;K9~}lYclMI^4h{JD(RT-OayU13 zDBL!i4KkIY4Q~%2kfRJ!3s8lxWCSe%RVQGI9aMPhjG+~?R2Bu(Yf+sA4Rc!;8+mJw z{0;CcbW>#=3AG)477;51&wkN|COR5nRO-}g2>dTdKc9CPB|$O{TD5L=F7vW;bC?x2 z81x-kZ*P9420J9)VS#_2Z_RH|24)p^4hQC4b$PdX`1>}zSO9ymLmW#Mr)~BhcQ4!8 z3Rguq+Ra@_Bb!~BiVtY%bwE`_{1rnU{i7Zk_8-4Wlc$!mc(WS(XO8gr6dnBo6k}&% zf5utND)24VA(_~bJ^w}=8)SBA%P3_`Lfn(6Y5~hK7!0k8Dnny(AObyLJRU}kL?w1F z@WSjQB}^RqEyZc#&H9^W)>|*Oh8a0SW{%$7XycV^bYTGTn+8v&94Bs&KP|AO7&39!7`$WE4mhdHc7PqCFvoc1x`-DosU- z27-BxO@@>~W#A7?CCf?VyZ!pE9j!nen8nT+y~SDS!(Y})$s1Lat)h`>f9hil(J_Bn zM6JP@RCxTn)Ilmknb#1z60M2eWu_xSJ~QO(J@U7=7|ZHws+Pf`v}n}??<&64Akj5; z;&I~RbZ~wRfLeXc+t;1|=53hNBF!6G5gTp4IqGH|eeJ|dUtLK7fnxj|>tZpj`ED}V z>zGOk+wX)y!}jlI8xWHNuem6uMgkp%3tgNGq={|NJy7=7p_Ke$!9Xm#! zX_-JO3fJ+X-Q(c^yXML}V*I!Vph)hUNDsXDF;i1yc@nhkp+u3xhe773VidZ|%(kCt zIY|8(-FWFu&< zr*4z9d%)y2(T~MJ?bsY@^GOZOiBCeziHEuKSjm-|$0&2?zZFC$xWN)M zdWMhMGT)yroNOWp<1@@N$&&NpXM*@0V=QD=$ylJpjq%Wc@cH=pxacz=!ZPYJE%AQG3zX%(T?gjUD9WVN_BhT< z61@U;HHDrkrcQx5jdG>d#vFGwPe5z9>^Xj*;jz_MP-99;zDr6E;ck}(*Ti2h7LG*# zdt?txUqy1Ct$kMKFLDaCq&L{@`MHfTwK|9OQ;Swthi#?dl0@-P2}!a`*;Ox*@u zJDFasmb$Jvh>o2O3OF0W|3DsQ zs~KU6x5Rf(kG9qfnAPv+ZC1D$`ByK;#blDpFyraR^Ow%b7j5k#=)tZ{7*J57}nAbQry-9;@tcxMfA(HU! zjDI@=eGnv!OGwut#kA00 zElhN1Ziz0CIY_$acS&{{oc{HSMlCefGJN2wIO}o|FqR7UIY0aPn%4lVYy3_Jez45y zKLfRMkJ_8?=hsEPLhRS*fB$ijb2yebBz^EL0&e_TvH0d_Y`q*`7RKo8OBy(-&>eme z{3oUcD4trF;mkwq)W&!{^ln+F-2~{}*a^%4e|dJ1?#;jv_;GLY@uZyejwM~(5AqQ_ zjcbGYmEjM;BC1&52WdeNxXUMJ_4Z8a_s7i+3jPykFCk7hT3CI)JzCbUR6Y%TIvc;Z zfy9T}P(-dAS*ljt^qp)&RR&Fys3bD8JXmbN~}`l!RUc65hes<||pXyH`R8 ze~2%`O>hQF?C6wUJ&WWx~+<%BI@`&4#eBklQ-cN?-05%Gjq?~*lP4lxx)ZZfZlruQ4-AWy0@&vvv zxMxq2IE0Dj>CTcM))k_u(G1h%&@i8LgJvqao=}%SY4vfQlIe?hN zOT;7?ZC1>(@xc#JjbyH4k*as?nw@&Pj)foXT`x-mmo@dG3F+~nhylwEMfWnbWtT=d z_;LQg-k)hsp_rkZ;9YuW#$il_9|?Fng(6%Wivijh830hhnR^{c->2_Ij}~W#C5LXySstZqw*JoX^!TzXNJm zDxv2@oG_F~IKHye=?dS8;N<4^^9?sLPv~ZVZ{U!FH{3>UHYk@O)=Fl2>jgD~6Qkm7 z3Bf7iDF=>oi;=UM5KN!3PPxP_c=QpCjYZ6$P125FQQC#oB>ElV?lX~Kkie!%RJ(s4 zwa&?j9}qk)IHC#&l6bIFI>dx~15vY3+GZg(PBbI0WA^aKw%w3-wIHZuVZ~c zC%dVo3#i0uv8gC66Ih*T=6li3A7g~aw&h)&qxX*V;m~I^%*pjiw)KYYzJz+DE7w*8 z#Xd-83Mt zfh&WV90lhgp?aS$yb{F+h5J!;{J?o!s<{*Jv-O?r8SK^^k;n^KrVrs-T}>jOK9H;E zrzG2R!T58k!qZV4Jedr?S~f>%&fN|PkkFGGQ-)0I;9D&d34OS{b|1SjK(0{Ysl=|& zQyi4YwNl|KtNFcn@~kjF-1Fosf`{om9xHs7(s#02Hv0>vo7O0GaF`%n1-Iyu>(jyn3l^%zpA$pLx_+ zvvUTy(+zSOt!x4m^Xk97JtH$P1~{gCh~4H-j;9KL^XQzI#{H^pg%TJU*e?4R9u_og zB1#kU`smWCaIHB{hq~tmQpCu#H93Yvj+9_Ps06vyAcszG!BVjt;Of?3UEfjYYkX@u zv8F{>wl4^P_k3?Zct?2P7pW+T5$Z?tiQPN;V;c%ErDPqZ&2`HbAU8TC04$i8<{PY* z_R&@&GcGQ3BPw^wpwjrx+?#*>dbYd0zhtYq$y`vqZ4b}w8h2th4ayQpTL&kDZ@bK} zy;N}}NpA<|606QTa7km$^gb5mjH5FReSbtdNyj{MN%LZVDxO0~6T9#ax~%N2Fm+4w zQuF!u*+n;aQ9Ol9|Jb8NDOf#gYH^^ysD@e6L0N4n8n^rL@Ppr8VMBR*@_w?q{vdaM z3$oU0)_Go&o>3MrQkK=bWk#d%lT{I6WabmEcpr63%#fG2|`-S|m^{%5r-#6YuO zqP!9E_J#*`{N^0X%{7E)+@Xx=z@^SKIVW>&aTgNlogmEe`DhpuvC$!VlV8oAD)^~Q zYj0d;*MjhiD6OoZHH9H-^h>d z>Z-zwf#x+f5*xkT61nT9VREw>L=Z2>?iBHQUi`FAGsrAM2qwPsTotd=f$D9MI;V|? zeT>S5uup>ugW}0Z-d$rTrmGcQ7hV59vt`-)mg!#9Zn$Z6vJNYM+q9$<73MvT{8 zGW4}(rraM)Qogm;CMUt9nSXAk*am z(Vxl+@bq-0Cmjf`ZGA~;F8Ch@I?pF%MEPbk{jg>}Kb<5LpOhR|su{7v?|P8}ZCV-{ zpH;l`SLizRm}4rsEeI&zchF_LG^82rGCs}&mgiMeLj*B?r3XTUyYmNP0?6Y@qp2en zA>wZ)vwj0?4VEVG&@mE^eD3|2Ul1wMhyR`oIHh~mqeF-zAi)iegL59;e>_R2F45!056Pk!Qy5 zSPv<~Oi2}T9o5G}jI#IkYKA4lZ1*MPhhf%FvS43ylbMBcz0#zvK%pXnO-PLx(Txrp z=^#DnKkfdNhQ+8P#>A9=;ny61al^zsD5$GGw48&%{9XLYj zvsE|?5TGYiskIzjD8E2&z$KyC)R%;w(*~!4^bFpM3N1+ICX{s>VmBhXEU#ohe9O!a z+S@Dr*|aFmQXEZF7)Va_YFYTEA0s(qxbGLb924gq1r{t<#w$E8ekyD$4Ao#KTvSFN zd8&fZIQRrOknQL`?JEzpbuz!}BFg|VgFco3*9fFk!oHwOkc9|NLY8`GcXJF1T(BZR zm^wtGu0>ROHuDn6HU_c#NO#RK)pUR433{EgmiJ6EMM z2T9e|#RM5a{^MPgpA>v(InyEk`7kJcjk3|=*SKr;rxnk?-Y|&Wb7{GdR#oq3kaPAG zJIFmc-TDj}FdZ7OpT^P_ajH&HsW*QpDqYdq>0?{}u;(W43==sfu|AsX8nq1Z+SaLM zMp5QK@g@LXzBitJVIB#vcPLmi+^-hsV>4XFFR)_gT1M9Rk}KPH`IkK zR261ccI8lt)`0^On~YTh)rNsMwCI zgT7ImHH-hrO?wf@VQP~jSpeR$oH6**v)3R%3+tV6_eg=??{6XW2b@4NjD$kWj!qm7 zQlMlB?Vw5kL`46nm2@F|wBoK2TZxj>+&UUbcg&}RwO+aQ+1K6Yqmqe0+_=z({2K9kE?jo2- zup=~yxg`Hh4i*uL_CZ}ncA8A??%)%iMH3foA$NpfI;v9n34zfy%^J7@|L1G91dXk! zoWVOx8H|^N#$B<9OnhOS~m6)diIv~c5V>Mp*+VA7#TPkk*%griadxz zWTT;>apf9U+?e@@SfFFNebf9;*?H4AHae0S06C}zLyE}@EqWzMpMA<})T3Cvzl#w` zO8u)=GAGoFVwR}eCYA`q=71lu>R;MEZhi9>Mt_(KNC+$U>A$;hnT$FGZjwa+i zES+d9`6#MFVfVSUe}l7Hiy#qXFgna{(h|_m-_K#s;w}bCYrI~%!GS+zXS7cDSYsAZ zDBb0~ZJU6QLo8~@^+ErA&8BI~0? z+{=i!xmB(Y!`~;>m$tJk(bObdtjy1ouTu$aNk6&IX>fbPRPQ!O5><8Xt#4N7LRx~Y!YMl-OSeuEsy-F%pPc4b+9-==*TpJ9Ya2oW zuCD?!59SmQD&0hfNg-8g)V1!@835DiLv8ut`0U{^^L(g#ViW*;T3NfkMhf8DY+ny( zX4?eT<@h!ENH8(qR!w(@YxS(sj6i+b#Qv9BN2F`sdJ?nvexd>vm`?MS5o(VM?kfZ2!!b`PyU zelO?O$>*b%0f(DgcTBFJ4_A=`x|EKi*qrR^zPs`7IzCIE+sSQ5?UUzIC*bnT409(R zaC4*G_a#f{ham#*C7D1*7qN*i&cSM0Z}+<26|xZUitrtH*v;c9vf~%aWp+}V z7*J!_eSOoj?Z-ys8>;}kaO`LP$eHB28R*{O;`}>P$Nc@YGyU7>ptT0b^KnAsy9%5R z$ndDds>@Z|YqFp?-invm$!tLM$6||7wI?kerxcMw3cj&rH2@2AO0 zaLJlg`9eV$r;N?MPc=ez8bberp?OPhRQabd3{}3J-RD&Jxu4{GOoBr<3{v$1hu2IU zn~XPqWH|lpFgf-n!t3f`PK}-3Y%Jem6i@F3OfjF9VTYg`jeihSfeCM}eZk|(# zGI5$Fy}kL=^bJO0>LWaCZf2>x>?wU%Q$^5(n2|<~$TU{aizmq(@r^bKa7SSpv&;LB z9sa`%@YF7K7HH+zLNpuT7e7jLR%<#VyXXMr1(iO|zEoy~wXm#TGK7;?#8vEuV}gNR zvd>L23l(1mX75Q@cLiY@uuf?FP=Be@N$-%a> zbM4vR#=h3E^nGY}{CDI`XwZDD%--JL8gVE8Q9gCTyUcT?uMTeJCLU-sLM!AeCFnvdH}2`A~`4P3Q3If;d$RR1pR1r zcOK+BHwp8@XI>>ESz-1hz)fTwHxxEhPlz=8l}0ZFRWc1-)8S&{58}BSDKrRc+ki36 zHzvq!TU>~64nG;9FsbUH1_@H&JZP^d?DMWAfFKNAI4vSHj1cx}`6U~58j0|Rb2{|a z3g8yO9AVmX$|y&Bk7BCT?)CZG7cJp#?(=Fw@%r8SV$$1k@OM#xYY;U+UlYcRJW4-a zs-M?EK?Hm0H+O;QloYr5KM?OT+DwyD;b%=q641CHm2lMR+4&=xPvR|ai~nd~|D%s* zgu~rMFRMYQpXZy5Fg{XM1+({M>eZEhax#Ek$GV@>ViNc~@+|rG`J&+SargNG?WLiS z@5`Nzu1!rcI!!L%zuU^*5zg*VJ!r+0I zxBjb*UwyY>CT-SIRhNf$Fp^L1M_^V1=!#w>`sGMPbcxe4AM7}2L=D^C)qf1#pU8@- z0sN_+!p%O`oMm06+|ux8{aDqJk~+eF@LU0ZOi*MiI#|x|*r-8;VRerw!5{cDplT4k zgB&=Qu25znb)~CAcD(G+A6vzy2t8E z9t(4B3$Er<{(&#k(al#abNMqrD?LiC+pGzM=Z_IzQt(WXUxh`rCfs znTt6%Y^&J!SZa_}{R9(IwLAx)%&m}|UQ~CTqjKA+tIUHaEnQeVaxze8c?qK%QeFZ0 z44};G`MHyH%S+fkawqH?*omlU`Vvi7_%kyvsgZ4}6w(KizO3_H7W+-wHaUWj!+>zl}UF-l@&Dm<-SoQo!YdV=h zCqyzGYlQ}?_-ZKDk5wbbMQ2Q+X>Xdp2z(vAVjq?5M+do&~S zv{K*0mGbW?V7&Sw@n_&9&`YsD8c5Y^9V#J>DK)U@G#v+-C^QtH$Hs0TrT0Cs4Z0|g zOEMulwfp`FijR3WYM!WILgv}A#{74mRwM_SHsZODQswgZ{^(NY9;LAGsMI?&re6Ga zMIx>eH&LB#yI3X>Th)k1_eAl=*tPnRmr_Tsuf^}qA||-kH&p5Kw<_*v0jMU)x31GD zm%hSDuDGAm^IBW8)TvK_6wF!d$L6MTSYzOh=3=5Y59OZLD=Z-%qr5qm=w@>A=BcK zVyMUA&saK%#dGlv0aNaYBa<(djs~Z{Q{9rw-xBZpf4fq447%oV+r%%mQ{`PN{16Cr z0HqI$wSac_d=X%8#&DiQm$VgFGbT7L^s0#bWhVE!Kp&$x>O6sID=THvGIyA^KB(yh zjnF=XYH`V3;Me_6uEWZph=rl1q3E>?UOZjvSz6-m=<7Sh2}x%=ci~h&;y_AZ5wgap zXKGs2r5rnUGMPkDM`D&R%0|IETvoTAhm!aD)``jK=)Sf~HsUNaHrhr;fn9{qz2QqF zd1pz@z$m{NI!2y{{uOqr^5K_UStGN0&VyWQC8rIft6B@GQ%banyI4BleQHyf)+(ED zm72~RZ9aFd>DbcY7~v=F!MMXco)G1F89L`XIRD8K<%8oaI+|&?Wyh>q7#XhLX6JP! zS1PvyMf0F#u0Qc25BUHP68Xbo1lf$w0hw&ub*I|dJfGg4)baUk=uddKH@~)BG1_~} z<0I#~FSNq7s$25a8xu47TKCIK?$MK2EV_+U%97G;VU zI3^>=Y(w9on|ocXcXL{s*8ikF893V_MXHIP?l^fu;tq36zSkR*0?R1CW25tLRG^ zuG#Ts70;6qIz1_u*JefcyYu7)%J!*mlqeyK__KW(T2ZwfPZ6(Tvg5#-t(xC=EqmEd zW)Ut~nhZM_z~WnQT;%jJhEe!wXCD z%IP>5%G@Xsy3P6Pp$(k<59jC_J;*2!c3lC^c-vMreLMbKk9#9VzW4oF_eDxG+f4bu z9-uk+|9B4h@!jc@ne8+!OV7%KtLb?LI$hl~*C$SSrXNemt`Bu8JFPeNoNO}5{2fC- zM8ObN2NENE|DKNtjlZ%JB8*{Mwehg9p6F4kWX|U3CuLc#EB#XP`$u%VAcOuRIyV1@ z=$MBuI4NiMvX0fJitLCD-epmGTU!`X8@~k{Tx%N={(O4BRZC70A!2>jw2Y@rlPu*@ zG^5{2`@J}}6pfB{2g?3EvDw=o`9ny>D2<{lrVb-i-R&geHq41_$w{3)W_S)^Em)sx z7dsRmQe6eZO4&dv^`fY{n}Du4o1A*{am2oqc01IcQJ~Qz#rCrXH0Ghi*;>#;fkhD= zQ@gZfqDJ?)l&w?46`;WN^QqwY_0#5UK;7pjq^VOD-4WigkHN1Zb)^aF}!q5*04f?HKeLuc^r&+f}=HFYUj-rJ^lWM?a)* zE^&sB{@!}M1?bkOd^?skH_v-50g3i$kAQmdG^aK~AD~e=tjE$g^IHt%^=6Ez$>7$| z@I6lIGbpaYd6YG+tNWf&id1!V9zu@-9r}whmJIYU zw|kSnHCtT5+k!0s+#dt-l;~LKAmTs-55P~!=&A6%YEh*=16<#>6S@ZSkD1OoVvJUM ztzDbOPRR)^oBBk(bx%KyWRLfJR_9XTUI(-^;(Qd+uS3@iMw~1bD8v4iIRJ6?oj@PD zb1EDwQpr{*pCa{PhUbnC(lEbNj(4WU@=Bw)V_3i(TPw`bw~O_Y34l#kk@)F*bLMwe+tf!`ou`7!!mjp1)1X zo5e^h3#oo>TF{_{ppenjCSd`)Oh#!e*n+;{QTP6 z-OSn9ucD;YmHKhdQZ86V*6ejbAf%$gZT=Kd^Q7(8h+V~Yn9V#c36T+1`&DPaEF`qg6>8jhMeC zmNs;lQY9FjJjezGo~SB3+pa|ACU0cbHp!>_R!4Xep3A2TUbhn*cAgwv+Ot~2D4V=9 zmGBE+#@ba&Ih_w0u)8_wRS*}oo9bX59?x{3dWpUFW2REl`tSI7zm~DwGB!h&9oB@^ zi0(k;i+FkHrqrtxO_eWk?v$}@9z-rH=}1evij<(OJ6^g8YLxDrHSkglOPf^F{*chI zr-0Y@A^53F1^kIH9FcZx(kOLqL8}03eA?buxF7I#bWVHOF#t}R6Y`rEmD%1dJq-iH zf<64bAHU5!Za$q(jBd=umTp!i+XDELf`SGZF5x(gn%7Xe2vTO*ec2OO5YRYki znsxCXp2AR1?sTVqhel&gYGkoko~ZRsO{^;^Y8yE))gSt*URsc@8Ys=2@vx}RsY8?r z@)YPg>M=8$_%@cP6wjmiYoyzcO{Erl*!94)d{ZWvLFtZ@+qX<@>f|J0~_fae3WffGzwNURoM_UrpW|rUDlU&d38hTVejYD$EvO`xO)J<> zadCr4*pib-k0+*-)UnU(a*oijngyW~+ zj0LH+eaV(Q6&saYv*cYav*DDIxjMJA-j`6<={Rb<6lbspGO^swNKFIxbHFncX_2)_ zclnt?%oGj>bU6FZ+TZaRLV<#0?3oYtux~|Eq7t~@Bh@t*=dIp}tEwAJJv2FxG>W{qkAR zD{q|-rGskT3iutLvn7YXoE0F7{{Gt@@ZkW+HSq$pv-co+2p~F~f54IGpW?~WMg@RB z_bh;)&zQHxU4o=oe}JFDG$w(=4Q1OP`)}O!ethQPe+zN_gGU?rfvtQwHUHZQXL9lN zWe&^0d(>;67)VLdBO5DBh#5r-hRK?+Wk@pr2HFVCkjbfAKBMpd#c!lmxJ#GT#h<3Rj`~7C>V;e|PzX^TzAc`a8ZZ#O>nsmDk84 zBDN0PqjeMBG~&yr*kI}Tct+2iITE`$|9VXGCGDp&{Ec8ElN>m5iktG}aoic||Ktvt zfQdD1qo?-(1`wb&SW5r;iBC5fb+n#jFWyK)0!6Ov+~IeCL{!PY-z- zETiJLp!GdCA$krt2?Nf?0C&nq0vsHgiC+SU_qF|j9%~FiLjAEfrcr%ynPf^_mruHe zt{Z0LF^>D9r3@u}D`)Bf6vAzPhMoG>bx zA@zxTlc^gBFWx(;r{tMtgh3#&H`Gz$j;qm-&FcW^KP=J6La7Hn#MrC}fG?q)RUSaR zA=sDA=3fu<@V@T&o}K;9A_n%(GwlF7)@+1EfI?%gs}En6a#pH}KlU$m-U1@(=C}s| z%`CF9q;h<4KZJ%5Un@(-0Ig~>8$^)UgQ}c`nrq$pmqNJ{Kfk-SOO8%@soglp$Z4_d zOt(KBn>l44dKV1>mj01Ocj2Kx>kQys`|zjG+J={3{Ygwn*hablkT2(H`u?l#;zIX7 zxR5j#vk`=EM(S&|%#wV@bj3cC^u-FGhY8Of)1YfOn(Q25ogGfoYoS}(wHpem{6cIn zPl3Sy_XM~Dd;kJ)ia(mdzCa8ydy9|qa`ZiDpVaiAe;`tc7B1WT~d)^%lmkv1-m@ZDnKWfs(Oh^saSo6? zSs1+=Y&_Ww~`hHeASGm@caonIfxE+gm|za2Dijig^`u6zUuEky+0 z4K?#xD|K}sZBIZRuhvj@xr>unW4Y&~+2ai>s@6|Av%>5mm#b~)XsNZ14raLtPH3zZ z=jn#VdWFRhOfd>b6)@am(HT@7aQ4!9Vr>ogH=a4ap+pz@>8DUH32xZt3~Wck4h)w) zqk{Tj>)BHsoTkUEF?K1kVX~$F4-xfSdHyhEi3?{^SM$j4(L$@iCsF-lzwD<}RaKbJ zL1dNTV}~lVralU?*V_6XmaoNigeG_&fU2mH3riWH+g)gSd2k|A5xp6m!t2F!Z>!9b zK5VC|uilIq2KGQsKOpL#%~4NI$!n)4j_mXRffI=&K7+e7q>^>?jgLRTUvmFsw(~ZY z1*!0+V^oe!QV~s(y#(jePrNin#72+Gb+ZYD2hVE%P`t=|V;)u1q>7=yuNWi3nQn;zfl_5Lit{6?n=Vz52j zU_N0zYrbleEOiyivS)RzDKHmpjHrMuaJI-Yw(Raq0W$TVJx|}UOBjESUg8&1Tum6Y z)S%bXq^AqJUNPdS- z6v10&#Z^S5- zi}W3+N8X&36?^3-lp2CAcE8<5Hrr5ddQD~Jc53(AvxwY(KY2O7iWCF?7&bjD+yQFT z0;@svOrLh&$07P-u9BVLZp%;q@ z9n4-t<~=r^HDT_(a*KPBG9mJ!+U`QoJ2o%*uX$X2?|wLR8lG0bNYBPI#|0EJAhEFn zOsZ`_@9V8~x;c2-(bBz{c%G_~paQFF+koC3v7ABAJhFZcJ$GbDP(k?9@cej!QSc!l z93MqK{&Y)~e#%7vRcN*JB)`uwKdzzo;w`xc0b01+V-~z?ZN0;Qgg9F~jjYnLK)Fnd zc%Bz6a^sxQ_W1;jLkaSHy6Cp>%<>;*2>RXQ_ss)5rpY8rm&j5injskz&LsW{Bt$g8 z_dbtmQ?+|VJkQc3lCH!k06G|C`CbrTu zPhD~vn$qOFPdw}M=nIaC%6!l2%wW*_p6~NBuJ6~F$wQN)blk@Y&;iKG*|~`IweE?Y z)nn+UfW3xOiPchO-2K^cQ?r%Jpue*nSCi0NYsP(VJ8pK;>m2*&0qwY%3DWcE`G9s@ zea3XHr}n$rarP+$b6oVZ?6}h@66)UUxYBVj(@|aAj#E-qnsN6%kLH_k3)pcI)M~kR z_bQj>n{lv=9hYN#Z+6_=W4d}7W#;L1Q|Ng=dfog(z%qMtx?Wd@VUFiLuJ7~BxMlS^ zjrupmv(AiLQm-=-js zGDs~GbOq(Ot81sy_}nGIP-HYWjOIn%*sm?$5{Z2gaA|H!qsq_z-5MY+^{iabvzgH zeVRr*51tSmETYi!U?&KON{R?4K)4RFVSw_`8_~U>7+~W$&Q8d25+Sj8g_AWv@Y~M8 zJ7rtTFmV;HMRYW@Hl4G@EoW67POh^s0=OCp5T!V98S8xO@o)zPW4(^7RSjwKUy$8J+pqS>g)ljijv?t3k+mk1P znppnqSP$K4MNxT@gG}YAc-B5WE8a^IP@gr0AaRE&32-y>*Kt>$^Uz$?Cq5{Y2vZ}O zC4}gYgz2dtXvrB&1lqp&o@LdLXt)ObiJ2B2>_lL0n1xzzv>9)`_IQtps`vgZpZ_^; zwpJ5F=jDHQwo3V*oz~{#{f`gxm^DitSv0~)aY69dXbpsv1e$=BmTILo5?M%Ay#!?G zTtYq#NWxTlp^;chYj>Ojqx2bf_{VzDc?)T~lC4@K8oJ1h@Re&;Et#RHjWO?gQ~mLI Zd>)_2=lehZe*gdg|NqPUwATQn0RTXpnjZiF literal 0 HcmV?d00001 diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/.helmignore b/pkg/action/testdata/charts/chart-with-compressed-dependencies/.helmignore new file mode 100755 index 000000000..e2cf7941f --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/.helmignore @@ -0,0 +1,5 @@ +.git +# OWNERS file for Kubernetes +OWNERS +# example production yaml +values-production.yaml \ No newline at end of file diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/Chart.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/Chart.yaml new file mode 100755 index 000000000..602644caa --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/Chart.yaml @@ -0,0 +1,20 @@ +appVersion: 4.9.8 +description: Web publishing platform for building blogs and websites. +engine: gotpl +home: http://www.wordpress.com/ +icon: https://bitnami.com/assets/stacks/wordpress/img/wordpress-stack-220x234.png +keywords: +- wordpress +- cms +- blog +- http +- web +- application +- php +maintainers: +- email: containers@bitnami.com + name: bitnami-bot +name: chart-with-compressed-dependencies +sources: +- https://github.com/bitnami/bitnami-docker-wordpress +version: 2.1.8 diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/README.md b/pkg/action/testdata/charts/chart-with-compressed-dependencies/README.md new file mode 100755 index 000000000..5859a17fa --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/README.md @@ -0,0 +1,232 @@ +# WordPress + +[WordPress](https://wordpress.org/) is one of the most versatile open source content management systems on the market. A publishing platform for building blogs and websites. + +## TL;DR; + +```console +$ helm install stable/wordpress +``` + +## Introduction + +This chart bootstraps a [WordPress](https://github.com/bitnami/bitnami-docker-wordpress) deployment on a [Kubernetes](http://kubernetes.io) cluster using the [Helm](https://helm.sh) package manager. + +It also packages the [Bitnami MariaDB chart](https://github.com/kubernetes/charts/tree/master/stable/mariadb) which is required for bootstrapping a MariaDB deployment for the database requirements of the WordPress application. + +## Prerequisites + +- Kubernetes 1.4+ with Beta APIs enabled +- PV provisioner support in the underlying infrastructure + +## Installing the Chart + +To install the chart with the release name `my-release`: + +```console +$ helm install --name my-release stable/wordpress +``` + +The command deploys WordPress on the Kubernetes cluster in the default configuration. The [configuration](#configuration) section lists the parameters that can be configured during installation. + +> **Tip**: List all releases using `helm list` + +## Uninstalling the Chart + +To uninstall/delete the `my-release` deployment: + +```console +$ helm delete my-release +``` + +The command removes all the Kubernetes components associated with the chart and deletes the release. + +## Configuration + +The following table lists the configurable parameters of the WordPress chart and their default values. + +| Parameter | Description | Default | +|----------------------------------|--------------------------------------------|---------------------------------------------------------| +| `image.registry` | WordPress image registry | `docker.io` | +| `image.repository` | WordPress image name | `bitnami/wordpress` | +| `image.tag` | WordPress image tag | `{VERSION}` | +| `image.pullPolicy` | Image pull policy | `Always` if `imageTag` is `latest`, else `IfNotPresent` | +| `image.pullSecrets` | Specify image pull secrets | `nil` | +| `wordpressUsername` | User of the application | `user` | +| `wordpressPassword` | Application password | _random 10 character long alphanumeric string_ | +| `wordpressEmail` | Admin email | `user@example.com` | +| `wordpressFirstName` | First name | `FirstName` | +| `wordpressLastName` | Last name | `LastName` | +| `wordpressBlogName` | Blog name | `User's Blog!` | +| `wordpressTablePrefix` | Table prefix | `wp_` | +| `allowEmptyPassword` | Allow DB blank passwords | `yes` | +| `smtpHost` | SMTP host | `nil` | +| `smtpPort` | SMTP port | `nil` | +| `smtpUser` | SMTP user | `nil` | +| `smtpPassword` | SMTP password | `nil` | +| `smtpUsername` | User name for SMTP emails | `nil` | +| `smtpProtocol` | SMTP protocol [`tls`, `ssl`] | `nil` | +| `replicaCount` | Number of WordPress Pods to run | `1` | +| `mariadb.enabled` | Deploy MariaDB container(s) | `true` | +| `mariadb.rootUser.password` | MariaDB admin password | `nil` | +| `mariadb.db.name` | Database name to create | `bitnami_wordpress` | +| `mariadb.db.user` | Database user to create | `bn_wordpress` | +| `mariadb.db.password` | Password for the database | _random 10 character long alphanumeric string_ | +| `externalDatabase.host` | Host of the external database | `localhost` | +| `externalDatabase.user` | Existing username in the external db | `bn_wordpress` | +| `externalDatabase.password` | Password for the above username | `nil` | +| `externalDatabase.database` | Name of the existing database | `bitnami_wordpress` | +| `externalDatabase.port` | Database port number | `3306` | +| `serviceType` | Kubernetes Service type | `LoadBalancer` | +| `serviceExternalTrafficPolicy` | Enable client source IP preservation | `Cluster` | +| `nodePorts.http` | Kubernetes http node port | `""` | +| `nodePorts.https` | Kubernetes https node port | `""` | +| `healthcheckHttps` | Use https for liveliness and readiness | `false` | +| `ingress.enabled` | Enable ingress controller resource | `false` | +| `ingress.hosts[0].name` | Hostname to your WordPress installation | `wordpress.local` | +| `ingress.hosts[0].path` | Path within the url structure | `/` | +| `ingress.hosts[0].tls` | Utilize TLS backend in ingress | `false` | +| `ingress.hosts[0].tlsSecret` | TLS Secret (certificates) | `wordpress.local-tls-secret` | +| `ingress.hosts[0].annotations` | Annotations for this host's ingress record | `[]` | +| `ingress.secrets[0].name` | TLS Secret Name | `nil` | +| `ingress.secrets[0].certificate` | TLS Secret Certificate | `nil` | +| `ingress.secrets[0].key` | TLS Secret Key | `nil` | +| `persistence.enabled` | Enable persistence using PVC | `true` | +| `persistence.existingClaim` | Enable persistence using an existing PVC | `nil` | +| `persistence.storageClass` | PVC Storage Class | `nil` (uses alpha storage class annotation) | +| `persistence.accessMode` | PVC Access Mode | `ReadWriteOnce` | +| `persistence.size` | PVC Storage Request | `10Gi` | +| `nodeSelector` | Node labels for pod assignment | `{}` | +| `tolerations` | List of node taints to tolerate | `[]` | +| `affinity` | Map of node/pod affinities | `{}` | + +The above parameters map to the env variables defined in [bitnami/wordpress](http://github.com/bitnami/bitnami-docker-wordpress). For more information please refer to the [bitnami/wordpress](http://github.com/bitnami/bitnami-docker-wordpress) image documentation. + +Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. For example, + +```console +$ helm install --name my-release \ + --set wordpressUsername=admin,wordpressPassword=password,mariadb.mariadbRootPassword=secretpassword \ + stable/wordpress +``` + +The above command sets the WordPress administrator account username and password to `admin` and `password` respectively. Additionally, it sets the MariaDB `root` user password to `secretpassword`. + +Alternatively, a YAML file that specifies the values for the above parameters can be provided while installing the chart. For example, + +```console +$ helm install --name my-release -f values.yaml stable/wordpress +``` + +> **Tip**: You can use the default [values.yaml](values.yaml) + +## Production and horizontal scaling + +The following repo contains the recommended production settings for wordpress capture in an alternative [values file](values-production.yaml). Please read carefully the comments in the values-production.yaml file to set up your environment appropriately. + +To horizontally scale this chart, first download the [values-production.yaml](values-production.yaml) file to your local folder, then: + +```console +$ helm install --name my-release -f ./values-production.yaml stable/wordpress +``` + +Note that [values-production.yaml](values-production.yaml) includes a replicaCount of 3, so there will be 3 WordPress pods. As a result, to use the /admin portal and to ensure you can scale wordpress you need to provide a ReadWriteMany PVC, if you don't have a provisioner for this type of storage, we recommend that you install the nfs provisioner and map it to a RWO volume. + +```console +$ helm install stable/nfs-server-provisioner --set persistence.enabled=true,persistence.size=10Gi +$ helm install --name my-release -f values-production.yaml --set persistence.storageClass=nfs stable/wordpress +``` + +## Persistence + +The [Bitnami WordPress](https://github.com/bitnami/bitnami-docker-wordpress) image stores the WordPress data and configurations at the `/bitnami` path of the container. + +Persistent Volume Claims are used to keep the data across deployments. This is known to work in GCE, AWS, and minikube. +See the [Configuration](#configuration) section to configure the PVC or to disable persistence. + +## Using an external database + +Sometimes you may want to have Wordpress connect to an external database rather than installing one inside your cluster, e.g. to use a managed database service, or use run a single database server for all your applications. To do this, the chart allows you to specify credentials for an external database under the [`externalDatabase` parameter](#configuration). You should also disable the MariaDB installation with the `mariadb.enabled` option. For example: + +```console +$ helm install stable/wordpress \ + --set mariadb.enabled=false,externalDatabase.host=myexternalhost,externalDatabase.user=myuser,externalDatabase.password=mypassword,externalDatabase.database=mydatabase,externalDatabase.port=3306 +``` + +Note also if you disable MariaDB per above you MUST supply values for the `externalDatabase` connection. + +## Ingress + +This chart provides support for ingress resources. If you have an +ingress controller installed on your cluster, such as [nginx-ingress](https://kubeapps.com/charts/stable/nginx-ingress) +or [traefik](https://kubeapps.com/charts/stable/traefik) you can utilize +the ingress controller to serve your WordPress application. + +To enable ingress integration, please set `ingress.enabled` to `true` + +### Hosts + +Most likely you will only want to have one hostname that maps to this +WordPress installation, however, it is possible to have more than one +host. To facilitate this, the `ingress.hosts` object is an array. + +For each item, please indicate a `name`, `tls`, `tlsSecret`, and any +`annotations` that you may want the ingress controller to know about. + +Indicating TLS will cause WordPress to generate HTTPS URLs, and +WordPress will be connected to at port 443. The actual secret that +`tlsSecret` references do not have to be generated by this chart. +However, please note that if TLS is enabled, the ingress record will not +work until this secret exists. + +For annotations, please see [this document](https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md). +Not all annotations are supported by all ingress controllers, but this +document does a good job of indicating which annotation is supported by +many popular ingress controllers. + +### TLS Secrets + +This chart will facilitate the creation of TLS secrets for use with the +ingress controller, however, this is not required. There are three +common use cases: + +* helm generates/manages certificate secrets +* user generates/manages certificates separately +* an additional tool (like [kube-lego](https://kubeapps.com/charts/stable/kube-lego)) +manages the secrets for the application + +In the first two cases, one will need a certificate and a key. We would +expect them to look like this: + +* certificate files should look like (and there can be more than one +certificate if there is a certificate chain) + +``` +-----BEGIN CERTIFICATE----- +MIID6TCCAtGgAwIBAgIJAIaCwivkeB5EMA0GCSqGSIb3DQEBCwUAMFYxCzAJBgNV +... +jScrvkiBO65F46KioCL9h5tDvomdU1aqpI/CBzhvZn1c0ZTf87tGQR8NK7v7 +-----END CERTIFICATE----- +``` +* keys should look like: +``` +-----BEGIN RSA PRIVATE KEY----- +MIIEogIBAAKCAQEAvLYcyu8f3skuRyUgeeNpeDvYBCDcgq+LsWap6zbX5f8oLqp4 +... +wrj2wDbCDCFmfqnSJ+dKI3vFLlEz44sAV8jX/kd4Y6ZTQhlLbYc= +-----END RSA PRIVATE KEY----- +```` + +If you are going to use Helm to manage the certificates, please copy +these values into the `certificate` and `key` values for a given +`ingress.secrets` entry. + +If you are going are going to manage TLS secrets outside of Helm, please +know that you can create a TLS secret by doing the following: + +``` +kubectl create secret tls wordpress.local-tls --key /path/to/key.key --cert /path/to/cert.crt +``` + +Please see [this example](https://github.com/kubernetes/contrib/tree/master/ingress/controllers/nginx/examples/tls) +for more information. diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/charts/mariadb-4.3.1.tgz b/pkg/action/testdata/charts/chart-with-compressed-dependencies/charts/mariadb-4.3.1.tgz new file mode 100644 index 0000000000000000000000000000000000000000..5b38fa1c399527b1e3dc452bd90e5e8312c7051a GIT binary patch literal 8401 zcmV;?ATHk@iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKDLa@#o4;QY;}=#zIZaXyohf5h3)n%F;Rh*_B1Oqo9M6o9s@NuhMx)W)=mxsMh;T}RVfV#^ zaOq7+6n?k%((CnlhX)7xXRp_*{@mT$-}`QN|L~yq?C{ys-rje;-MzzJ?>p$NAC>u% z3Q72Py*u|+9o+Avkc9q%Tu>JG;cC|*Ns|A$+w*q4{R1aJ;d7cu{qP4Oi z1Hvbv`HjQ@AQ4lL3{ru>5{zBJQtqRwPgHvnLO>)L5`hkYm;icmeI94|jig+%T-6Bc0~CQ>G%-|bq_ z@faUF)K|pG-VCXXNkl!LMO`8UO3@XP_?IGU)1}ck``y*A+`YZtr@j3HFNw#_B~Gsy z4@BQ_!PZj0O~uF1ac2~C!8}Mfi%?E56;4EGED4Q~>&6%n8ur0w*~5PnP;&rcq6TE2 zxkDx$^CaukOrHjojcrWjBpvFZ*>>4aH(>rHa(9MtO`936T|J)Q0zV~;OXSW~#&`$b zzPIaqYsvU?l#C&-NSLDdIt##J{l9zg?BJlH|Mz=O_cr?fKFZb>d~d`zS9dfbV|2E* zfa7SU)06-k0oQWObLr1GNRqMWI$K+gZr^tRIF6~1eA)-wkTU%=VS-Ago>yQv0FsRJ zmB$TmNJ;Ge-2vFzg0lpDI+_A87@nkIc)~*JPtEI>I3j5%g<5|e9fj9qDjoqHnaT>T zT38;1M52(7b^t?xAW-V+uSaj0JmDxXmX8d$eDM8l_c9$Kk5QuVDC-8y7u{4KcgHCW zu&X-|-K~V9o1|e#-RmLUi2PTQQ6kVUiBRWpih*;p}>ql3O z#0<_&IK3hg-E5Y-*=V=)crAW?{Qy8MU#F(#PdGI%-;xL&MPH`5n6>!zi6SfGvJd=L=snigxBH!Tlp;)t7BPOg^Tx@k)-3st5s!&}>?de#D^TFMimUK)B+ zGi0TdY>$edMljbtmbzhBD{gvGu(p5CY*G*kJ0q`RZK4-mD2%B9)GvhAeTG~tR%+DN z6zX@&Y@R|?_pk#jR;Is!9TBBsz_Ok!NfQ=31zA!R zF-qk0CFK^1{!tYf!v}Nl&Lrc?WP1@3AqrRoIHEBIJ0MI2{r;`ibpNCH=)VeWtbx~Y zJ9W)EogKKIP=5je6-I3YQ^n)H;)5%y+))~j3-Hp|VgZkpf(eYxxebhGUBzh_?m*1u zy3?!)G#?SD7CYci7}L{RfH&(Mxd-rgoa_OM;po>hH3||3ga^Rl8KfV7dbOio!+(e4 z1miPF{LAek>9sWWBw6?6R-IY;dN3Uw>>M}~2fUD}dPDDOkkT7J|7+fSogWo-TW00e9;F2KV zD8%!gr~etGXrO7+f=J*cG|&w~Hg=J7)__aM#@SAi7cwKN{)BMiOXRLV=?cB8`25}Z z4}UXnS!gyRvp1<6{q4f2?(o8=j+rDsq!`N&cc-MCLbrsKLC3NKiOCrG8oFAExK)9% zR*zysyJ!0`MInW@#6ucUx$;WmvnWZWVQsyUm@hQ>lRkX@;sAv73S$)FgtMVtdg@k- zTocDsQWDbNa>be1*}k^aB)LQoEJ9E+qgzqaVu_n_Sno_s+HaOgrk_SFvy;d2n|z?h3EU4AS9rz6sRA>(+4pIM}*|c z?)w;1+tjYLbMD>HXjuQ|R(pkQ+N@Ix)~TxO7^&H;RhzZyc579Hl2c!+ z_#AWNp#$XS7fmM^i-rgZkyLMXPH2c`|8zpQ-u)V)QeIiigyWpkq^}h7uSEJ2yK|9mmI_H^ zD(t3}2E(F=#6cgF2KHqLW0a7vK!AGM!P~ z+#XMPO4Jk*pFg`mNBQgG&a_oAs+L9XOxwy(Mo%wlUk^EqH3rU65YbqvH6j@YpJRZr z($t1}@9Y6gUmr_3Fx#l@!(Sd3XV4yFEj58lOar(K{A;OPD-RFAbp!NSfZL99&Xffkqp$bjrYz;NP#Fhc*MrkE2BJ6* zi^FN#pzbJGtwSnE*SFT^tCsoo|6+ona?d@PtSJm63s|EIgp4ma!neU#6i zyHDVXMtyyLp`0=~P4Ic7$l_114^O(9!MjhKSDzB4ce0=oV56Cl;5oLQYmaGWn#72l zJA13`ea{3O>lHkcC{^?L3OT0%!j1AIVjm9o^{+HKOGhL62|Df!n36fysFdy#=Y>9- z1(Nrn1bzx1QxfX)Lm)|_G54Hb(LmSrrRqbCLfJV!QLBM=#|kcq9`A@^7ziL7jf;ta z(n)ec1w0;3H7#DgJyUgckVk_4_5!lZv{5#izvy22&zGlB)-vHVmLur=Rk(i@or-;A zz^+KnBEDJ?&ZFC+!k5A=qlRmG=`4q4D3%<027XDnaWGGc5-qCh$ZBKMtye>(mUFbg zHFsWQ8uPo2=!P4;Gpkm)&VO{EbFnfm-6zf|%9NYPGILaJ`ZbcrSnAW{#Eo99m_aY5zxTbLLsve zu{?!J4OXI5wPh>C$_>6I<-YYQ_~$M2_8-mmD{T~y-gAvea{Jiu7W=Pv*xN1Je|x>B zdj}i)?>;6>qU(9B4mSagb|rhJ*tUk|BoK@mi8J z?8(g9+tZIIVX^YYvtBy+nTc!wVHd_6hTSsi&w0~u10Pc+F{?O1P9+&vYT8YuVr4^$ z&!6G3_X7=4ct3`02pwfMi>{4}!&vfZ!e}ftA%dY7bf0v#y(3}B3O7LG0AmSz55QrZ zmw!X;b;x~I+U5UQ#s52ew(s9l=p6x%|od4WQDatoV64AZd9ik+eq@P(XI77KM zS?{z6`|48Nq#4#P?IJ;64aM$3+c4sGI&|j3qS7QF63-+j630_R9+Tp9%5)CdJ6*wn z9JHxZoCO_sQXub&Bwj?i68Snchi(NBE6h|zKm9xUDW`J!g2fU)$=MKi8XpOr%mur> z-fsSUB!1*9O-fJg`h_2>Dz_MR2Av7vK_^23fMoG#IqZZ5N5w$3`~~D`121)O)tNuR zAXO9e+GH)5$FDx2pJw?fv*Lne2@BbH`V&t3&?(2DOqh^*Qc7*?oStEbzGS>#c?l2^ z=}&&H%=@gY$N|NHE-~Nv4%`w{7i=VNOZ9}~2>GqZ?!q(Oet{z)MWr(mkh#$sMp*9g#2PFMZ8@x3`ZeSP%u`-{`#RZlkE)cf_Q#10B~_|Er1yQCQr_P50?Al1p zc_+3!n3_iAS*gTsw!te^FGH%vd$xfp*Du4Gj}mQzR&7y+Hy>Tv2Cv$p2(N}W>lv#Y zf?LN~bwRohmbEIwxjS!F0N#nYDzNU#T@`S5XRivt75QrxdF&{y%l=KGaJ~myXSRd2 z+baSwdBks68rSJj<*pXS6sc+_L{9opn-5ZKY7%0qCkl0tns?u;(F${WoO7M(Hx2#N zWh|%$U9$mLVuqnN%GQmZ~2t>4{!g@bR9erlSe!7 z$o19#%D}rgJAQZi;?>35qc^XfcU1d+y^j0GV;vZ%+`_&x1Gc*z#mjN^PP0ewq1DK! zOzoVR@%P={LA$*$kuv!aWtotPVcGdEvb%HU-z>`7Fr}(6pDwZFd{yigA-B7vp0hI0 zsOaVtr@c9$U+-M6u44S`NTp1p74}(Su_LoslisoWGT3@z6jDCRiq4QyCwHD_rx020 zWp%d`>Xwx17U(UuR#w@=%qZ5pak|3JvnfmOKbz{sUDTSCRjA#oshNgC%Q8N$*|e#_ zb+H9eB!J1ttLS`_gj;9D6!8-Dx0+G6vsE$2cdp%I{HWvFmTbRW9Ae$oAw`i31um}M zGTtKIwd0=K$txHV)!y^%G9@HMrp!{Mb&lEZIA(oQ)>oR(f3N&?-3Hnc|FOG&P>uh1 zdbq#2|M^}@ZG4Aac-l{V8%*-s9{E1V0FPySwNkonvw2yl)({I)IAS)3!8JL3>V@ex zcPZv~ER6-dAR`cThB6Gs+0iRYNcgNln%|-z#}bZV&7WK9&DM{ z|H57~yS}TS+w#Ak?d@0f|K9E<{^wpwW*o;%&W?cWUAkWRGRAEksn)Pys0#PKUVPJa z!RY7XgnUdfj{>Y7_GOgJuZq;Y)b3DKj^XB7-oWti0At?{zZi#6KYOJMD7RaC<|Gb| z!em0;rV;G+=KCu+8Vz6+lA!W_C{NW6s&6#ZT$@A)5Uue9L@f*>& z)fCl(Ym$S){kv`A&`8gwshj<}lK!t*|3h+x>kR*IkN-cYe*fq2aCejcb1%ipF^PkP zGM{@9Isc{3GOQyzz+~D!02^U(azKfgjsD=*o&P5JUt{=xYyAJ-)2jSG+uMD% zk^lQB%dPk8%Mw^tcGPao!X=h+;i%{Es_B$t8f*MJU%<0Z@da^ z8UUXhpVk2G?C%iSE zLcR{tt>feCfZZWFz7E{oaxXGR?2nOpQ9GJDbJbcBFKR*Ek+0U5c2Ns&omm%I2lth9 zQOo9=^oUJ*#3nsrlOFLk(j!*ZFw3VWH0&?KeAx6HK7Zf@g^E}BAoCOEC*eV)C(NU@ zRCYp5vsIE47B~NDxd|;;-+yYtCQIQfm&Wto^@abp#{VD8$A2Ci>}}3}@1v}K{<~_H zz@Om6catLUP*VizroH~?>z46zzxOh)|0N3P@-&W-uW1Eni~ry6&Bg!q_BQ(eUP`TI zKVd?OfZZ*G3ibiyX^EqL$OkApbJc9OffV5?)S5fl&c8D88*3A{?`gjba@(kVv_HO|L(Wumf!+4?kX3Qo^d3>aU4zyUuj*1l?t0W z?i~ENEt;h%;buVGN`Do%P`mPyaGCMWTf9QP@eA)%>ev5uX8*Ov{~zqmegF0F*(Uz~ zUdmnX_g^5;Sv#YN^UuovL%oI0IqKBHJUNC6yHQAoA$H)i)gr5WrLygK6kLQyV#2QT z?}Cc|e5CvN^X@KX^6x1NjOzHvwfE5`|GnPRiu~{QdK>%yUWzxS@=weBo07}_>8qoc zZ(ey(@D=)4EdTradrzz1f8EDoW?QGcAQwQ*_Ybcb4+9Tg%m4R({;zW14?$_ z2jb(9u}cl@N5;k>dX7`DHnN@rAfgBx1RKd~!cn)>-v#Fw>fH*3Z#GmaA>r(b1}K2U zpzx-#L_Q)u!ie$Anu*7{jR)rw1Z`nUxH1-(8M4KQgo5Sc`0@3b?)`tB9lwPU5}9%o zp5tt7!THbs`SR3p27`hA`uATzE!;q3AxRi2LJdRABYOsefo}9VmYfBtuLj{b=MyUI zxBZ8VNg+8&)G+56U`*vC9eO^C@}M63)3x`l+Mc$daB=|l>)8-s60&K8u>=;Y4rZU! zHGTBE-BPy1cHT7AlvAwo{+}2|GnDL3(KaN+za(RXh{R-!+)(F)qfWUIRHASkxA+m? zUGLyO;F`(_e2QIyqN%z zGZ{0ZDG(*2w;gBp>0#r|r`((bY2JNbdiLS*R_X6;5UAM;LMo&%pFbs>L@1Sj>hJCQ zB!(g8urYu@XX0c7G@Uulf5DR{=QMfpqz^w+AwiAZj#ya67-+(%t_*{}i)qswq}i)( zfFVlMuZsjPu<1PQZJSy3c_MR+*p<=(cA|^a&5j}j5FwaPiNs*W1BNBcM1{IRfinz4 zzbF#f^gCi<$gcH3wF;aOJf9KuxIlfYvokK3bt@-Gc|Pe^W*^RRZc1BICmA59D>t=I zU!u7TR58TztqRQzMhnZ0bK@>wR;hc}Ruve|4GhW~se=Whnt8tb5Kz$j#o zvIW4~=sCkP+tY0XHpBCE{(0ji`hY!o6@} zZi;%?w$caYiyA3BUzio~^~s&)y?B=1f~PThGZeMe(cT9P_V;^-w?(ml=-kCi%@d#B zS)U8})}gkmvIwG@q~O=xU~a|3EPT5Yls#CUD!C>i)1iEQB0OpxwU zGCbR6JnM08-g9IZwOV%Gwc^UDrX8~pjWM{$@l-TghMqc>L*c0K%N@1F1iewF;6+yX zc62rTIUhMy4{fICi!M_ZKGQt9f#m6(*s})Fg`8TCXv@4qp$E2v6fBA8LRMXX=t7BK zlV+;<^kMVNYiBEA0jTP3cCEppg zPTqCjV8r+|PnXD3B)TDus1zE10}^5u;M(P=HdT92#`8SovEE9I17M?3p6>;TY6OoB zsO`$=)~lCV)366Op#Ov+ju^)(l2q6{Er~%9;~N<4?)BEkp9}K42N`Al$*zHoB*w~0 zN|28jkIdHHLVE7r5zPg7mNV1_w#Q#57#HwTl?1R<)?+xs^R5cC8P96|@W8C^G^SA+ zfzM*0Zx_14EH@cNt^vx#{knKo^OBqKv^AU1)Gp^b@vP6IFKtZB$$Q>r0fVkv-rFlVygyx|94*Sc&*bPK$os;y{sBA~d2hKeVDM1nz2zc;Mm+CL-pltFF5LQl zi9%nR9H-F`Ij|Av#`(R7^{v)K&-rWU8o=JbnZ{}*H*S4?Tw}I!74$du<7yImYu&hS z?Z+)ndTsHK?$M81m>}Io&wKRa>NBQmcWS?>A6LAEpk<4Gkso)~prO|0$5pO_X-0K< zKh9`X?Z&NJj@sS0CHy!IYP&kRwd$pIHx5?u<7ODI&5vunrfZN>rp>Nvpyzt*y7o)J za(}bguB*dvhUXgB_jWgKRlClj{#Eg;bK_RD>oN+j-L7kMIgFsG(guUT;UX13BRoDGeu~auOP*k;ds<|0iS0Y~x zy%vR3%^|u}Fx3qVu6o{X&%1;6sX=s6Ow}BsOGQ)NG{;EY4$)Sdy?|$fz21Q58e%|n zEGZeXt5T?FL=v5}K0(0v3a*rsGYm10%1}Pc`$`C39?QLaxVQ&DFbI`L7=aK=@dL zQ-}_Vf!YHzI{ZYUB*dK+;<^8q17P~(jLAIe;kk*9%l_O+1#&NoS$R&9BoAQG5TG$G z+)Q^CxGd1d4QH;bjpri1&(c`Vf+y4f%P0&yI0^!4k|M$>P-%l~1dv(ijT&B14zTeY z=O~oOW1<$XaJmBo{(bc3XX9JzFmV&FMQt>+b)ECYZN{oLoZMz%1aLi3AS!X-I@bBt z^Wlz4&UzhL3&HCDW~oLh6<7+Ue_w#{;c?-QZJRxyO;P$A0)dfQ?+r$=k7m~1e{a|t z?vkHjM1X`LyB08IshU)U=#-@#{8UI5fr;7HL36YjDGy%9z<6Lp6!m8`%z$nC9rec) zqEtvVK_T*CLFudGLB_oQzD_! zDCJQIAkyfb>NUCpeIsZV%b#ECVFzs}s&8`8sXTK#Yabq$ze^G@Uv!lsamOhQu$%AK zN!Q-<(A~B-J{Xj!Ff*AagxHr=HM| nYd2f9bcUjJ#=LJ$^-bB7P1%%hU;cjp00960B}eC=0O9}utS^%_ literal 0 HcmV?d00001 diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/requirements.lock b/pkg/action/testdata/charts/chart-with-compressed-dependencies/requirements.lock new file mode 100755 index 000000000..cb3439862 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/requirements.lock @@ -0,0 +1,6 @@ +dependencies: +- name: mariadb + repository: https://kubernetes-charts.storage.googleapis.com/ + version: 4.3.1 +digest: sha256:82a0e5374376169d2ecf7d452c18a2ed93507f5d17c3393a1457f9ffad7e9b26 +generated: 2018-08-02T22:07:51.905271776Z diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/requirements.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/requirements.yaml new file mode 100755 index 000000000..a894b8b3b --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/requirements.yaml @@ -0,0 +1,7 @@ +dependencies: +- name: mariadb + version: 4.x.x + repository: https://kubernetes-charts.storage.googleapis.com/ + condition: mariadb.enabled + tags: + - wordpress-database diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/NOTES.txt b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/NOTES.txt new file mode 100755 index 000000000..55626e4d1 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/NOTES.txt @@ -0,0 +1,38 @@ +1. Get the WordPress URL: + +{{- if .Values.ingress.enabled }} + + You should be able to access your new WordPress installation through + + {{- range .Values.ingress.hosts }} + {{ if .tls }}https{{ else }}http{{ end }}://{{ .name }}/admin + {{- end }} + +{{- else if contains "LoadBalancer" .Values.serviceType }} + + NOTE: It may take a few minutes for the LoadBalancer IP to be available. + Watch the status with: 'kubectl get svc --namespace {{ .Release.Namespace }} -w {{ template "fullname" . }}' + + export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ template "fullname" . }} -o jsonpath='{.status.loadBalancer.ingress[0].ip}') + echo "WordPress URL: http://$SERVICE_IP/" + echo "WordPress Admin URL: http://$SERVICE_IP/admin" + +{{- else if contains "ClusterIP" .Values.serviceType }} + + echo "WordPress URL: http://127.0.0.1:8080/" + echo "WordPress Admin URL: http://127.0.0.1:8080/admin" + kubectl port-forward --namespace {{ .Release.Namespace }} svc/{{ template "fullname" . }} 8080:80 + +{{- else if contains "NodePort" .Values.serviceType }} + + export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ template "fullname" . }}) + export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}") + echo "WordPress URL: http://$NODE_IP:$NODE_PORT/" + echo "WordPress Admin URL: http://$NODE_IP:$NODE_PORT/admin" + +{{- end }} + +2. Login with the following credentials to see your blog + + echo Username: {{ .Values.wordpressUsername }} + echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "fullname" . }} -o jsonpath="{.data.wordpress-password}" | base64 --decode) diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/_helpers.tpl b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/_helpers.tpl new file mode 100755 index 000000000..1e52d321c --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/_helpers.tpl @@ -0,0 +1,24 @@ +{{/* vim: set filetype=mustache: */}} +{{/* +Expand the name of the chart. +*/}} +{{- define "name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +*/}} +{{- define "fullname" -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +*/}} +{{- define "mariadb.fullname" -}} +{{- printf "%s-%s" .Release.Name "mariadb" | trunc 63 | trimSuffix "-" -}} +{{- end -}} diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/deployment.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/deployment.yaml new file mode 100755 index 000000000..c5ab3d3ec --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/deployment.yaml @@ -0,0 +1,155 @@ +apiVersion: extensions/v1beta1 +kind: Deployment +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +spec: + replicas: {{ .Values.replicaCount }} + template: + metadata: + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + spec: + {{- if .Values.image.pullSecrets }} + imagePullSecrets: + {{- range .Values.image.pullSecrets }} + - name: {{ . }} + {{- end}} + {{- end }} + containers: + - name: {{ template "fullname" . }} + image: "{{ .Values.image.registry }}/{{ .Values.image.repository }}:{{ .Values.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy | quote }} + env: + - name: ALLOW_EMPTY_PASSWORD + value: {{ .Values.allowEmptyPassword | quote }} + - name: MARIADB_HOST + {{- if .Values.mariadb.enabled }} + value: {{ template "mariadb.fullname" . }} + {{- else }} + value: {{ .Values.externalDatabase.host | quote }} + {{- end }} + - name: MARIADB_PORT_NUMBER + {{- if .Values.mariadb.enabled }} + value: "3306" + {{- else }} + value: {{ .Values.externalDatabase.port | quote }} + {{- end }} + - name: WORDPRESS_DATABASE_NAME + {{- if .Values.mariadb.enabled }} + value: {{ .Values.mariadb.db.name | quote }} + {{- else }} + value: {{ .Values.externalDatabase.database | quote }} + {{- end }} + - name: WORDPRESS_DATABASE_USER + {{- if .Values.mariadb.enabled }} + value: {{ .Values.mariadb.db.user | quote }} + {{- else }} + value: {{ .Values.externalDatabase.user | quote }} + {{- end }} + - name: WORDPRESS_DATABASE_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.mariadb.enabled }} + name: {{ template "mariadb.fullname" . }} + key: mariadb-password + {{- else }} + name: {{ printf "%s-%s" .Release.Name "externaldb" }} + key: db-password + {{- end }} + - name: WORDPRESS_USERNAME + value: {{ .Values.wordpressUsername | quote }} + - name: WORDPRESS_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "fullname" . }} + key: wordpress-password + - name: WORDPRESS_EMAIL + value: {{ .Values.wordpressEmail | quote }} + - name: WORDPRESS_FIRST_NAME + value: {{ .Values.wordpressFirstName | quote }} + - name: WORDPRESS_LAST_NAME + value: {{ .Values.wordpressLastName | quote }} + - name: WORDPRESS_BLOG_NAME + value: {{ .Values.wordpressBlogName | quote }} + - name: WORDPRESS_TABLE_PREFIX + value: {{ .Values.wordpressTablePrefix | quote }} + - name: SMTP_HOST + value: {{ .Values.smtpHost | quote }} + - name: SMTP_PORT + value: {{ .Values.smtpPort | quote }} + - name: SMTP_USER + value: {{ .Values.smtpUser | quote }} + - name: SMTP_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "fullname" . }} + key: smtp-password + - name: SMTP_USERNAME + value: {{ .Values.smtpUsername | quote }} + - name: SMTP_PROTOCOL + value: {{ .Values.smtpProtocol | quote }} + ports: + - name: http + containerPort: 80 + - name: https + containerPort: 443 + livenessProbe: + httpGet: + path: /wp-login.php + {{- if not .Values.healthcheckHttps }} + port: http + {{- else }} + port: https + scheme: HTTPS + {{- end }} +{{ toYaml .Values.livenessProbe | indent 10 }} + readinessProbe: + httpGet: + path: /wp-login.php + {{- if not .Values.healthcheckHttps }} + port: http + {{- else }} + port: https + scheme: HTTPS + {{- end }} +{{ toYaml .Values.readinessProbe | indent 10 }} + volumeMounts: + - mountPath: /bitnami/apache + name: wordpress-data + subPath: apache + - mountPath: /bitnami/wordpress + name: wordpress-data + subPath: wordpress + - mountPath: /bitnami/php + name: wordpress-data + subPath: php + resources: +{{ toYaml .Values.resources | indent 10 }} + volumes: + - name: wordpress-data + {{- if .Values.persistence.enabled }} + persistentVolumeClaim: + claimName: {{ .Values.persistence.existingClaim | default (include "fullname" .) }} + {{- else }} + emptyDir: {} + {{ end }} + {{- if .Values.nodeSelector }} + nodeSelector: +{{ toYaml .Values.nodeSelector | indent 8 }} + {{- end -}} + {{- with .Values.affinity }} + affinity: +{{ toYaml . | indent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} + {{- end }} + diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/externaldb-secrets.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/externaldb-secrets.yaml new file mode 100755 index 000000000..39399ae54 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/externaldb-secrets.yaml @@ -0,0 +1,14 @@ +{{- if not .Values.mariadb.enabled }} +apiVersion: v1 +kind: Secret +metadata: + name: {{ printf "%s-%s" .Release.Name "externaldb" }} + labels: + app: {{ printf "%s-%s" .Release.Name "externaldb" }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +type: Opaque +data: + db-password: {{ .Values.externalDatabase.password | b64enc | quote }} +{{- end }} diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/ingress.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/ingress.yaml new file mode 100755 index 000000000..7870146ff --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/ingress.yaml @@ -0,0 +1,36 @@ +{{- if .Values.ingress.enabled }} +{{- range .Values.ingress.hosts }} +apiVersion: extensions/v1beta1 +kind: Ingress +metadata: + name: "{{- printf "%s-%s" .name $.Release.Name | trunc 63 | trimSuffix "-" -}}" + labels: + app: {{ template "fullname" $ }} + chart: "{{ $.Chart.Name }}-{{ $.Chart.Version }}" + release: "{{ $.Release.Name }}" + heritage: "{{ $.Release.Service }}" + annotations: + {{- if .tls }} + ingress.kubernetes.io/secure-backends: "true" + {{- end }} + {{- range $key, $value := .annotations }} + {{ $key }}: {{ $value | quote }} + {{- end }} +spec: + rules: + - host: {{ .name }} + http: + paths: + - path: {{ default "/" .path }} + backend: + serviceName: {{ template "fullname" $ }} + servicePort: 80 +{{- if .tls }} + tls: + - hosts: + - {{ .name }} + secretName: {{ .tlsSecret }} +{{- end }} +--- +{{- end }} +{{- end }} diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/pvc.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/pvc.yaml new file mode 100755 index 000000000..b3f912480 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/pvc.yaml @@ -0,0 +1,24 @@ +{{- if and .Values.persistence.enabled (not .Values.persistence.existingClaim) }} +kind: PersistentVolumeClaim +apiVersion: v1 +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +spec: + accessModes: + - {{ .Values.persistence.accessMode | quote }} + resources: + requests: + storage: {{ .Values.persistence.size | quote }} +{{- if .Values.persistence.storageClass }} +{{- if (eq "-" .Values.persistence.storageClass) }} + storageClassName: "" +{{- else }} + storageClassName: "{{ .Values.persistence.storageClass }}" +{{- end }} +{{- end }} +{{- end -}} diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/secrets.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/secrets.yaml new file mode 100755 index 000000000..80a28d724 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/secrets.yaml @@ -0,0 +1,17 @@ +apiVersion: v1 +kind: Secret +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +type: Opaque +data: + {{ if .Values.wordpressPassword }} + wordpress-password: {{ default "" .Values.wordpressPassword | b64enc | quote }} + {{ else }} + wordpress-password: {{ randAlphaNum 10 | b64enc | quote }} + {{ end }} + smtp-password: {{ default "" .Values.smtpPassword | b64enc | quote }} diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/svc.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/svc.yaml new file mode 100755 index 000000000..f6c399313 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/svc.yaml @@ -0,0 +1,29 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +spec: + type: {{ .Values.serviceType }} + {{- if (or (eq .Values.serviceType "LoadBalancer") (eq .Values.serviceType "NodePort")) }} + externalTrafficPolicy: {{ .Values.serviceExternalTrafficPolicy | quote }} + {{- end }} + ports: + - name: http + port: 80 + targetPort: http + {{- if (and (eq .Values.serviceType "NodePort") (not (empty .Values.nodePorts.http)))}} + nodePort: {{ .Values.nodePorts.http }} + {{- end }} + - name: https + port: 443 + targetPort: https + {{- if (and (eq .Values.serviceType "NodePort") (not (empty .Values.nodePorts.https)))}} + nodePort: {{ .Values.nodePorts.https }} + {{- end }} + selector: + app: {{ template "fullname" . }} diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/tests/test-mariadb-connection.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/tests/test-mariadb-connection.yaml new file mode 100755 index 000000000..95ccb38ad --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/tests/test-mariadb-connection.yaml @@ -0,0 +1,29 @@ +{{- if .Values.mariadb.enabled }} +apiVersion: v1 +kind: Pod +metadata: + name: "{{ .Release.Name }}-credentials-test" + annotations: + "helm.sh/hook": test-success +spec: + containers: + - name: {{ .Release.Name }}-credentials-test + image: "{{ .Values.image.registry }}/{{ .Values.image.repository }}:{{ .Values.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy | quote }} + env: + - name: MARIADB_HOST + value: {{ template "mariadb.fullname" . }} + - name: MARIADB_PORT + value: "3306" + - name: WORDPRESS_DATABASE_NAME + value: {{ default "" .Values.mariadb.db.name | quote }} + - name: WORDPRESS_DATABASE_USER + value: {{ default "" .Values.mariadb.db.user | quote }} + - name: WORDPRESS_DATABASE_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-password + command: ["sh", "-c", "mysql --host=$MARIADB_HOST --port=$MARIADB_PORT --user=$WORDPRESS_DATABASE_USER --password=$WORDPRESS_DATABASE_PASSWORD"] + restartPolicy: Never +{{- end }} diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/tls-secrets.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/tls-secrets.yaml new file mode 100755 index 000000000..ca75d33ef --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/templates/tls-secrets.yaml @@ -0,0 +1,18 @@ +{{- if .Values.ingress.enabled }} +{{- range .Values.ingress.secrets }} +apiVersion: v1 +kind: Secret +metadata: + name: {{ .name }} + labels: + app: {{ template "fullname" $ }} + chart: "{{ $.Chart.Name }}-{{ $.Chart.Version }}" + release: "{{ $.Release.Name }}" + heritage: "{{ $.Release.Service }}" +type: kubernetes.io/tls +data: + tls.crt: {{ .certificate | b64enc }} + tls.key: {{ .key | b64enc }} +--- +{{- end }} +{{- end }} \ No newline at end of file diff --git a/pkg/action/testdata/charts/chart-with-compressed-dependencies/values.yaml b/pkg/action/testdata/charts/chart-with-compressed-dependencies/values.yaml new file mode 100755 index 000000000..3cb66dafd --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-compressed-dependencies/values.yaml @@ -0,0 +1,254 @@ +## Bitnami WordPress image version +## ref: https://hub.docker.com/r/bitnami/wordpress/tags/ +## +image: + registry: docker.io + repository: bitnami/wordpress + tag: 4.9.8-debian-9 + ## Specify a imagePullPolicy + ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' + ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images + ## + pullPolicy: IfNotPresent + ## Optionally specify an array of imagePullSecrets. + ## Secrets must be manually created in the namespace. + ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ + ## + # pullSecrets: + # - myRegistrKeySecretName + +## User of the application +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressUsername: user + +## Application password +## Defaults to a random 10-character alphanumeric string if not set +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +# wordpressPassword: + +## Admin email +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressEmail: user@example.com + +## First name +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressFirstName: FirstName + +## Last name +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressLastName: LastName + +## Blog name +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressBlogName: User's Blog! + +## Table prefix +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressTablePrefix: wp_ + +## Set to `yes` to allow the container to be started with blank passwords +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +allowEmptyPassword: yes + +## SMTP mail delivery configuration +## ref: https://github.com/bitnami/bitnami-docker-wordpress/#smtp-configuration +## +# smtpHost: +# smtpPort: +# smtpUser: +# smtpPassword: +# smtpUsername: +# smtpProtocol: + +replicaCount: 1 + +externalDatabase: +## All of these values are only used when mariadb.enabled is set to false + ## Database host + host: localhost + + ## non-root Username for Wordpress Database + user: bn_wordpress + + ## Database password + password: "" + + ## Database name + database: bitnami_wordpress + + ## Database port number + port: 3306 + +## +## MariaDB chart configuration +## +mariadb: + ## Whether to deploy a mariadb server to satisfy the applications database requirements. To use an external database set this to false and configure the externalDatabase parameters + enabled: true + ## Disable MariaDB replication + replication: + enabled: false + + ## Create a database and a database user + ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run + ## + db: + name: bitnami_wordpress + user: bn_wordpress + ## If the password is not specified, mariadb will generates a random password + ## + # password: + + ## MariaDB admin password + ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#setting-the-root-password-on-first-run + ## + # rootUser: + # password: + + ## Enable persistence using Persistent Volume Claims + ## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ + ## + master: + persistence: + enabled: true + ## mariadb data Persistent Volume Storage Class + ## If defined, storageClassName: + ## If set to "-", storageClassName: "", which disables dynamic provisioning + ## If undefined (the default) or set to null, no storageClassName spec is + ## set, choosing the default provisioner. (gp2 on AWS, standard on + ## GKE, AWS & OpenStack) + ## + # storageClass: "-" + accessMode: ReadWriteOnce + size: 8Gi + +## Kubernetes configuration +## For minikube, set this to NodePort, elsewhere use LoadBalancer or ClusterIP +## +serviceType: LoadBalancer +## +## serviceType: NodePort +## nodePorts: +## http: +## https: +nodePorts: + http: "" + https: "" +## Enable client source IP preservation +## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip +## +serviceExternalTrafficPolicy: Cluster + +## Allow health checks to be pointed at the https port +healthcheckHttps: false + +## Configure extra options for liveness and readiness probes +## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes) +livenessProbe: + initialDelaySeconds: 120 + periodSeconds: 10 + timeoutSeconds: 5 + failureThreshold: 6 + successThreshold: 1 +readinessProbe: + initialDelaySeconds: 30 + periodSeconds: 10 + timeoutSeconds: 5 + failureThreshold: 6 + successThreshold: 1 + +## Configure the ingress resource that allows you to access the +## Wordpress installation. Set up the URL +## ref: http://kubernetes.io/docs/user-guide/ingress/ +## +ingress: + ## Set to true to enable ingress record generation + enabled: false + + ## The list of hostnames to be covered with this ingress record. + ## Most likely this will be just one host, but in the event more hosts are needed, this is an array + hosts: + - name: wordpress.local + + ## Set this to true in order to enable TLS on the ingress record + ## A side effect of this will be that the backend wordpress service will be connected at port 443 + tls: false + + ## If TLS is set to true, you must declare what secret will store the key/certificate for TLS + tlsSecret: wordpress.local-tls + + ## Ingress annotations done as key:value pairs + ## If you're using kube-lego, you will want to add: + ## kubernetes.io/tls-acme: true + ## + ## For a full list of possible ingress annotations, please see + ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md + ## + ## If tls is set to true, annotation ingress.kubernetes.io/secure-backends: "true" will automatically be set + annotations: + # kubernetes.io/ingress.class: nginx + # kubernetes.io/tls-acme: true + + secrets: + ## If you're providing your own certificates, please use this to add the certificates as secrets + ## key and certificate should start with -----BEGIN CERTIFICATE----- or + ## -----BEGIN RSA PRIVATE KEY----- + ## + ## name should line up with a tlsSecret set further up + ## If you're using kube-lego, this is unneeded, as it will create the secret for you if it is not set + ## + ## It is also possible to create and manage the certificates outside of this helm chart + ## Please see README.md for more information + # - name: wordpress.local-tls + # key: + # certificate: + +## Enable persistence using Persistent Volume Claims +## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ +## +persistence: + enabled: true + ## wordpress data Persistent Volume Storage Class + ## If defined, storageClassName: + ## If set to "-", storageClassName: "", which disables dynamic provisioning + ## If undefined (the default) or set to null, no storageClassName spec is + ## set, choosing the default provisioner. (gp2 on AWS, standard on + ## GKE, AWS & OpenStack) + ## + # storageClass: "-" + ## + ## If you want to reuse an existing claim, you can pass the name of the PVC using + ## the existingClaim variable + # existingClaim: your-claim + accessMode: ReadWriteOnce + size: 10Gi + +## Configure resource requests and limits +## ref: http://kubernetes.io/docs/user-guide/compute-resources/ +## +resources: + requests: + memory: 512Mi + cpu: 300m + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} + +## Tolerations for pod assignment +## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ +## +tolerations: [] + +## Affinity for pod assignment +## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity +## +affinity: {} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies-2.1.8.tgz b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies-2.1.8.tgz new file mode 100644 index 0000000000000000000000000000000000000000..a56460fc49049b824d738f2bf19239eb9975e311 GIT binary patch literal 18127 zcmYhCQ+Q=v)Mk@PC8;D8+jeqd+qNsVZQHh8v2EM7ZJVd-`@8$;Ue8?j`(o|A=X%GO z_>sR*K>k}mN)T#&aYcGVaT!)=cMcWdM)CfW|Tj9=)-jF?&y1nPRY2NsfA2h<*C-3J#?VJL?n{nr=S%w=K*iVhj-HMK$ zPK}AYx-OLf$`9k~Z0iH!_F9J#K$Y7s~v1@p%9IBSWEhBJ}r(}-g% zp!Cf$KotUBCp$kwgG<2>kk=%>rmvXxO4%YO8A2Oqo+z6QN9lhLQCtwCGRr^IVABJ$ zif!iVV3;hhx7%MfHQYYYGl1wM;}ku0AZa|n71!n!wu%SekF|l%o>Ws~a2=|gfLI#X zn8RBkb}}L8jH0Y$RPnRCwCn_OR3M>cF^3~sqEZ~8Ef+O4oZvYp2qkWa*55?HX*uCQ z3)Dfr-n}<$1Q@}n`~)Fe-dEh$tQ()8OA1URRWpO}K9d-lRVkM{4dX2X2AFBX`K z70ZJwap`kgm}He)(}F>*4Z%9Q68tA!LEbHn zWQb!XMb--}XdqvdE8EQ}4tWPZh=Ms)!boHn!tjv{&jSr&2tyPB9YWq$s+p(T-eeGX z<*@yr!3!FYehve-0er33lb1W%B!r*~%dbQ^Y&^Pve^lIE?8AVd4<{O`+>>)E;KPrl zaV9MB+GUJaOL|#{Yl*l*?X?OXMA94Ir49FY5txg=BOWF2JP_5ZkX9b)5fOEW9K<0^ z8*7yGYyMP3g0%X5fvYB|xDS)@BRl~yyn#VR2)|YQr~m_wz(kO7t>tV?vThXD+^C}* zyN^9;Y5pnNytO7pOrqC!md+?k7zJH)?ec>D=*Qa)HnBe}?!Nf3FA;?8*cSo8hQd{5 zPwiVOBKEe}Lp|E19vLry>o7WRzlHgf(6tgF;eacQ=Bi@Bx3xRJrUX4qCeCT^qFgk7y%~s53FEx z=4`+C(3TXbD^y;zaLwS8NXs$TwHQkc~nc2uDtt=kfAfH&|<%4H)U zPhGfgRR|nh+`n9S@;!XQURxubZ-QB1<16fG!>}J*W@F@|qh|Zc^FR+AmAEVmafSJ) z0Bgj+m0$&yZOWiPAaI;JP$oRuC1VO}78iqNzQB29kE1+Y=~t4mobayezgqI}h&s_%&6Q4FCJ zYK$;#bncN*Voij?x|JR;g}|h4_-Bsz_U|Og4rm&d=phZ1DuGE0SfT?#vnLp%Y?fQG zsJ&VZ1eo7u=b+q}WZ1n1t6y$Jo`U;+e?jwFNAsv-Yg>LfdW$SI*IR2hShXP% z`){lWi@@MWl!GVt538)U>Knk0b%)qxB=iwHM%!15&CFRKb_5}k#$)*N6?}87lw0)o ztCyDx6YLNZ#`(oiMF;yTAI`z#YCYd4r}`jLf~J%fX_xaVPDB+Q6RY(nB@hhiN{qiZ zR(}Dko6v7$glx9MDzMCJ)RXU~$_=6M$95bZ2iQ>v!*%Au#F2A`KyUirMMne#uV$yJq81M=l zGG!*V3`ByM%s6B;LJtt2WBc_!`LiJm=p+$w={(F4^*{Z6*nKW&POKEwDa110J1lVo zDF%r{HS|p-K3C$FX3x;&`4WuUldc>e zOUptIIm_Ihvt-wKWklHH5|q<5N^Iq%BgbLYh;yikboBBm1^3gS45LRGNVEcO3i^IQ zK`Ci|WY=EWTR3r!&DjWtN)yJi>m*=&2nXa@o+oqY3U88j<7{XlGI`YgDTVr7Pcfd( zqMsGYI-!YCBY>n}jDjhy^mOn8hG}in4P#hWGJ`=@sshv&N0~l}jDOIwP;HUH&Ev?% z@mvbC(p>^jTW=tx5N#9?9sbMv@$q?XbO3@@nVBPBP;&DnprD z{Y_a69dkq=HJ3D#K*eKmX+xrhhOHsW9^{chWegFXZ(5U;;}8-ArZI{Ut*ow&x9f>y zuS(yk2a)o3Ep4!MPoaom;-@47aknTl7WGbWfLGEC!sr$6;IASF40v@;R_c*)=C;TJ zp>!`r_ESDu?xa8u_lKM1;hpgaC5C6LP3+)9o!Lpv?ZFPshiiaLM+f7DNruxp->lL2 z5e={WM34@lVn#=+Ab>=*+X$*Dmu* zKRKkDwYFSTPqV_c-bjNotR*3RR)Z-LOqOC`j1xiXzV@#>9<|$E6-bnN?&=bBVhTeG7dg#fLt=Pfn?H741L{(I3(eXGWFB1&yp(*9=e!c7 zm>bG|t{fj9i;{jD8g?~2AOP+0XWAicOBppHUSr`$Y&&8eo+_xD;BQP(zYLQ^8%`X( zX_xwR)lE=}c)<%)5Uf86$S@Y9xEcrReFUNuQ((oAVytLL@8Xu%l~{M5SkMH6{sO$c zqZ1!4)KEL~ea3a`1}isge7~Ua06$h%tewIyM3q4yK|Vs02mIIk4`=JO9jkCKC%8(u z0H%U!<$8vUpaRonjRL2nQ3LFWR4FLb3FV|EyM6J^Ib+~Z#1gb}AEcnXNPDqK5ENmf z>{MCWZZyHMbVL}E$q)UID^mmPBm$j=5#t%IX+2%t5HE^8Ob=*(=KuAEe|Gzxo($JO z-@&7&6Tc2};h&#p;9_*RJsb*~O_+ZI0)6e#$c3YHxWCWKa@^xZkeQ})Idi+{+k9wH z!Omkb8pl7)R7b_Y`>#}mG*EBos~{W%C(;?8+XkA!nM8fiTrRM=bVe@RF1AjxPqM)g zE0yQjsg$H+LU71kd*`LfRB4$>KKpHFu+Y|IU))WxaHBrl(SVlE99}>R;N|Jpoq4b) z+JRyu*B@P;G9M2lD#pM&7TuPpi=Y{UrX^@u7N3;c*XUbla9m=^3~vd9U8?Y#$JmQy zt>GmzXZ#~(%_M(pixdovaAwniz!ocv;bC$y{oaBw?Sh=FdB0&I62w2-^Yub!QU0|M zkwnmv38L`cw4##Xa+UIfQp!f5_4+r;UX9%z^9anh3v0+@`}w_&k3COSQ~!>NZNq|l7_ck#MsfA|5D zQLN9u2Q8d2#A{`{pS$-;g8jRnZq@-tPjPpw2USPpcesrZbUf5&M*J@@8b1;!gG&zl zvVfSQU@IYmnS43#1bgVL=&~-#%KdmjEN~0-AJHyYc`&Xh4sP>mcN{fvaz+}IW=BNL z>-;f-_31j?f~Q;Pkqg6%()09aU}j&*9ll3Z^;%1MK5&bx(NV#jSR!GP8qR{_Oi=1PGKIUd+a;0>%doXuRiCdc3tVz33mIE*$dCzFypDsej(XeDT=PpCg(Bffy5m~V%XF_=LQ!y@q`ddZ zxnr+zOful&!se=hU;yce8dIFKnNqxfw;%O0gF(QW#N2DHD&G9%YU2fe=6MG<``f{# z(bM7n?(43i6QOkWQc>!O;JLW@_p58i2xLc%PR`fs_aQS-eJ|W1t_6HpG!G-_eO(JH zYIB7iJkGoYD=Z4Hw|IInt!SIioH`fR$L+-d_{zFvWo_fqtl4q{)lQyr5svd(c<_~& z*r3)?(n04c_wO}z-MQLvm@OX)>@HavHrce9U*it>SjPRfbLiN!ytW%Q_b9>5fwJ41 zmd(7XQDVLRLnlKqEa&7P4S7U2G5ageo-~&!eaTUlTpJnoDy4tX6uDvX*lK7?UgP|F z>T1Ty18*CZ2eBbRs540^>n6lVE z+&WWm7qJbnaF{q2Ot3uB5*JfaZAAK;@RBP@%G-HVIY6fP~FYq6aB5?9F@GH0KF5NOH*J^vJ6F2&;6(+NO{@D^jqhGYdlv#ctRsAAcf z_y=m!d_=yLB5mZT6e@k$k8`UxLR}oy7i=kcDSZ#MHp_Pjj1L90q@!nxp(^=3V=C(d zwfqPnrXefvx_K@xmnuJ{2s6t(moin^+Y^>p$oJGK+s&FOSa;;K6t%I!!OLeXKQ)wX zEFCm*M$OG z@*E_y)=}kUw~ulChpgYvHhxa@zw*4m{VcxfmK&|XbpFjkGct(NqPJIfWotXP+S24E zb?y^*r|a;YnKxM!6Of4xtlKIZ@vY>W1bVt3L%snJ(mQ6!3S{xD;?S##uRNJ!@sr69 zv${T(kv^hhv5bZb+h^Sx!xsPTRkuY7Hmv%m$*@uiQ?DjvmtAHR`RKhuM^24EF)F2o zk00DzsZ4ayL%Z)-VVD}TT^!J!F80_R36g2*oxC}KeMwLZMoZ$OknEtR zTOl_tv z$v4X-T>tg(VloqYg3UKE4z$e&+TJM70C&`P*1h6@FL%=MKnhA=HabXQZbfh}Trq`d z`|)=gIgN-+Ync{@xtFs?8+V>yLs%%mSzJV+ zg|gpS8#5gGX#yis?k=yTIUkB#)Fa96($dnrY`Mk!xpkYH_lk0lS%kO*l>o((?49j0 zb+=K=Ym(2Mm#%w0loR=buf!YO-?MNaTjil8 zjVI#K5chTl`oN1F8=mzi_m9`&pTLxh31BSw=gKcF*TGh|yHOJ;JMFeZRJx6 z9yjLT>iPtmrn;zn$%}@2Zs-K)fvM2Pfa0C8=Ai*cv6=b{-@(*hpK~*xueljO+YdtE zi%-tRCGdf0!qJ?qpegVja-&`i&G0I1b2E~H==x0**aBZQ^<`;dyEd@IkH%G!IDb;6 zIpoUw4Kw8{XJNWWZ$jB6f&Fj{d_VTM`W~5H{uidkj$nuMYxuw5!@tDJ-F~8Tw^g%u z4k+Yiq0YLt3nbJN2nE6)BJGx17HsZ6P1!>GxLto}n0=p^^6ykeuRZuWdU|&u0b9Bo z8lLEZH%A(j)5lI(a&J4ixoHiykwRS>oK`i0qj$>?-meR3_WtNYNQ5GgQf5{*Uh&JE zI){Fyaj|!RG$?eZ$tiFc!-O2Ay}s+I>!jg^pq=lLiUXismQKw{Ls~-^XY8W+@q3=a zuAl{@Dv?~x%0M|}-6(0wK~{`lwXN+16IrXcM87{jvP4SjzAb75vZGN8loyq7MSwbw zt{dtjEZaMVlSG*u-@KU?L0&d#MH~V!>vvhP{W-_9|14yG1>HIQrQC7E&OD2AG;X~O zcduY4t)k?V3S>swx}WwEWMb&1mPiR)_zYB<_@~5nxd^l)r^SJ`OGsM;6Jphe?_w){ z5sD=NHG7O@E^E`Z^_L83cjw=L-s?F~wv!Gn0M3_Ht_~cx)U7;(_lr0hBy%*Go1rDQ zI25}1aU@MqhH+fUWNBW`8G8whY4ay{6AA3sLpK zBgH!B`|bvRk$qsu8U2Vne#_fMg&qP~G?AaH#h9a?64TMWx@K2v&O9IGuh$hU3-i)Z zxGo{w)>iparn6d7l#%nS&Z2g`Zs3o{Mgy!kRp+TaBfVg?|LNl7d7)r?g!6cVJ$06E z$Uy=OQ)+`NjDUlWp@hv=khTLt5`!ZN1}L4+TYoWTK_hzT`fl^_a=7`rc^kH)d_Qq& z!y$la{6IPi$c01nIG=yT3j%}vP`IWW6+8rMgp1&r7T*d+w8odwHaj>unClghk|gH?9AI8y|IMZCvJ2?_phJAB$5k# zKtI-)wQhwIi#e>dvv^xvBLL4;CouD+QBpoXC2M|kxAJ=P3ZKe=HsAn`dz02Nj?l~K zKoC8YdTBx*fVGE3braf3NI?% z9vWTTU6|;dabF>=X$wZhpsk8*r3Z*M4}{yY%jpkh$GZXV-`>0T`XQBzt-H-f-n)z< zhwH7Ah^?-n6G=tlfg?{8J-_f6ga|i#J6#3Py=|sx+S3Z1d7p#_JuPPsxX-=2HMK4u zL^AC;1~*QQB(=>{#AtdCJ{M@Jck6wSrI`WA1aVk@sl5rT_GIb(G38z@y6oisuGQc7 zghaLpbI&ASW8O}^UyX0qz*viNwuD* zSX|OM5GFVMGl`e!?AoRbe$h`e0{U?#_%+NQWOJQU4hCi0zo_ZYYdR+)q^29^~wA zfmgfJ+0Cg@(@J3t7UA%07*%LE^|k727)Io{f_JH2h(;QM0i0zk_WDf;9Hq3%M>?0h z@$g&Q61F#K@PlDpCoHvY$Ip)D6nJADcE!Q8pC?k|q_PQ(6@(Y|1EeDXuKqA4R|hJJ zM@xUIKuyAjE#r!{}o{g^aS z_OpAlE9Zp012H27`WXx1)%ayg6V*Rrj~FMEZ;=p*N;ZE#vz9Cjj0pdDGzZQIm>$8LdgNR6z5YXoryM!$>M0T2ro zr8nh}VxpXJAYKWI&aQd03``hsg;SX(2p*f5+k)w&;}nH=B590GmvJN#8VMo7; zzids4gvcJP)Ulks1z90~6m?9jg0Qam6@ti7YK16}kWUwraw4JG!MmuazS=P+=kwM_|mRNqwiA`KT2t+@^ZrD>)w&<`nP~tdwoXyAe6(vHXHmXVtqi1SNJL zj9lCEXuAuxp<|_|+QZWN!(Agz2D;|&e&?5}C$V_cj5bLi!q0Ec9S33J zA)vGZQNA1k0kappc)wC!z6(<}K}+ar;iY6dv)rjW$}1P`$3ta7>7OtXzRh~7LVJpY z{6{En8#wST+Z?a$r ze8%-x-1o7beuzDUp$}==!}a5&QZq$K9t|x$5FPk(%P65i_HH>(WhYtkETFtsv}l-= z>WCjzQzj1`yC?9))#N{BIK8M20q{!#^t*jW_#Fy_^a_wg0j z1Ok$Wo2iK;&1&Lk2LY5PWaC`8)a?+9*dC%k5O6JVP<9(D++?0*&?Fi#evQTmH)=`B z>5Uz%2B6xIKn4lq0fMv}3`vi$O4?~sA*+zrSJH_`i+v2}Yq07wa(mP$;F}O1?Y54I zQ$+kDidhegD>zBT^zn8zcDRkhq05^ZW701~o!c!`hLImk!AMdf&@(f$tt};l3a~V4%q>qd#OI>Uvp?Uj z2gWEN%*7JR;a2I3mo-p0^)$0NtU_Ndo&|OYc*B!s1>CyjowZ$9bR(IL z7Mw}OusHoW)jR|$d~O{^zbF?7A34J4(VR-jCNmh|NJE!hfBb!q1pqims82mlVjg1b zK^5F&3!w@kB7Q{{Mkpr=nkRW)9M$uZL9wxkaZUMruwc|lc@RPpp(qZMM?KWmIC1=p zJf?-_M^h4G-StP|2ip%-pa{!LA)w+4^Xz>GChW5umeQ0^#zRxe+M1Vz1jIN-1li|l z75wx#9nl6u7FJ~MToM%84_}~m&vB$Jj(buXk*_vzSU2i-%mP~~M>+ooc~H!krZ&O5 zeg+aoCu4)x-1`5E#W@NL6qZUuJq*g4l7BU2H#Id;mXS>{=o$?U))H;UEb$#N$3^0# zBJrC1X+o9`U{(L=*W#Dye$K&{!LZmEko4ZuGc~dNn^iJy&(Kh7gkQ!f&b81p)Q6a87!`K@e6M*gO^%Tq0*{Cnz37Q%Y%I3$xFX79r4r zzKD@TsVN9J(1RZweP;#=t#0t~^0;}|ws^M3+Ge{#Le@0Py*#@NW$s-c^-XN;_4!`m z#dS^G?q_v-H3My09!zcySJ=oQzoyiHo4#$XZ~8A=7rNb-U(Fx7bfKYqTsbEkK+d~` z$cNjbk1NxfmS$h*we1aj(V4*t7*;sm%0%77z~}9W9Z_^3a?M9JkOP-{2hsN1{qys- zBs&r}c0j zp3!|1c<`<6A1>YQ^~KNh1$DJQ?;UQE`97a)ZQsNatbohF8`Hp(%d46(G?#0}ua)7W zitp`;u9btnn!7RIFWT2Ly@&m$4KrX%6>ay&!-Maa>j(GhyYYvwERZ8&``PzS7bV+b zup*QyYdPw$6Pxj|igIIDjAP;F0$M=E_wwM_QTa?lxU!hr^)ig%mBMv0E5;mV_=Z=? zxtJb?&g^QL4b<~Ll#ncC58H!OjK!siQ74_ZHUO~-8CV(^Y0(WWRlLmLG*}K0aq5kV zWOx~)#NCO1SVxa9`-e`#ga%?*TCX{>`8EG^TlcLyq>Q6iQ;#WjruK02p-L9=mRGB; zkEdnsP?B1&(viAZWHi&}*PzTdLqv%6R&oZ0(EhmD8_aXA|Hk0@{1Uj1JaZUfv+iW=%7>G&8w2E;jgnVlU!f{?wdd{d_tx3WVUZ z;=Q>1odbTs^?iH{pK0WMu{OOM+UNI^>oN3uxH%CUUVHVllFyZEW@~!*Y*@6VVZpok z`fJv`xvt?~lJLa`Utjj7;qy)B+d9$t)}zn?v@QIHP161)P?MR!<|vC$33hnPi{?1Zx)dg{u~d!-i8exz=h-C=YcQZ zmwRQn>wj1QsCDCZv3;C^j8ekww8ye%0IP_l|2c~y zfdrTga@r~v$e+y}0FjqO*@`L-wrfQIkdWkgWx$CkfQo}b5-q}ox>|b4LY#ody=k6u zx>e_N64XT+@tV_2qqzTdqTJ^G`CtGYe31XPF(h|AEP66Ae4LUxD0Gq~ORud4ZA2WQ z-CL-K+me?Db1srl&wxstVQ(tkzaM3!Mk?!46_^Or&riW0F?+WEkY+c2%iZBV>fit9 z1s{fWhSu6x&E1Xi5r8y0S5_X{@ih75$jKb_rPeXeXEm7sK2>E`oxj~=&amQ7`~Hu1 zR~{Oue;d+J|AP`2g;7RU&)Y6KYs8%Q16ECZtLmzTU>Aq!aRY|V9utP%9xx@X3$LrZgGY5g zQeC?}cr(|>$Jk}I^wA(1qhW8KB@-0c#^_V}Rc;Uxz~aMY8mHBrM z9C4AQaFex58}#Bd6VM&^{^{mWDful-PX3l$7E?GN)(*`>?HQwq8S^GX%NcvSJIcW3 zqi5!Cct60BcKr7i0-B~XtLk)CLM^J4T5|$k(N*JeA1x}=#Gd!?_?UL-7}AEc-h%uV z*|`7!31tl%&^pr_c z52Ic*=y(ejTN4;2ymkV1f}5z%L9KB{Fx5cniKx^TiWqHNK@m4WYj$~H3YbhSw>$ex zPtQX)v$K$;eIk?8#y4?8I1A-t*l8u%MPSUS()3TA4XS@mN0?a@Amm!;dl=d|f=hPfVd*ybfIdog9h2yX#;(qxP zoS%-+XqL-b3E+3#m1_Fs`KMeq<4U4;0t8bkH(`D#%rNN2qESnNdv@8X*`eSVAkI^tXxQSeAS7 z8B$D{(?1cY3pT;r7^PYLhN#HWVUQq6VEu-`|FZFw#Tmc$-16q%g%f4U=k!2LNwL5@-}_y-CMNoJ ztL%yV{EUKO4Y?b9H~<~4VGiSd6f2dv_sJYScddq!LJYM{s^iXiz02z=a2?WSwUc5P zwAl`EaEI^LN3Yfreol1o@>2a`he!VX;;J;R;gruQ(Id`)6~Q!x@M+aM&-D8n&8YJF zByqw6p_p!+22sWEHw=n@%W7QGdO@9&W)$+4rv`Lnq&*{SD@}~?@Zkhzi0Q&E4dE{z z?~iOjKonT&PXS2|-?_V6zF=hx0_$S}BsYoDYmtc6*&_4t;$5V={5ukNMC{|2z}+$d zK#3r^dFQL$`+HlrnS@w)236meT1lRMlKDU8~QREC+g_2oxud0 z$~8blFC&D8qP$|g9yTR>zX^-W*>mfRqR4Boptlo0j(%LxqH9Mu;B-LUL@}=od8Rv( zmz|pkef_3T*;=JtVW!Ph#BlswO>^qnJ6N!sr&0<2VsU_z#W1^k8kfZqZ@E0Q>DV>+WZcHX#QlXKZB zTk_<@R}#s*U-F_23yOU8-7@?|cGdD^_G0EG5OqZWubXd+?`{yC!7w_g-u-(Gg$FE#js7}00^v)19XA|PzE z)mc``r>P1m1YglV^tYd9S>l#`Xt_&rgNLU#tc?%xWMs%i4z3t}$QUB!KZ&DL$){Na zaQalta&ZT^>Nr94f=p(E$$G1}Y>rDn8*}`0ui*JAZXs2Iv!f_c zzf#)bZw|*)apZ;~97@bOfZM|$Hg9|Qj~NI$2812vXJi9Ap}}Lp6KZ1Qlmy2SY|90j zR{o#1F7Rq>`CM=(R7d5iNmpr8+JqC(Wghn7$;Tk@qrY&CZ1nI@&SlkwHCC+IG7WC= zaINnY$}2J>yX}I~y|8^M8%49fL3`4_>6nqV9FJo!B(b7M>ao+fZJl*C?oA+{!nNu) zQs+Z7raVh*Q}DL#P(axd1Ho+!bbW2EK~q0lR)y_BSSz*^|LB&f0U`^>I%T&U45qH; z@n2;xH>!aD$s9`C$YW9Rc^ntOV^PzN`ft9CZJ$wK>;I8CevN2v_QZ*%r;$7ksV5BK z&jGlti33}5IseHV*?VO%Eo@>9rB>G3(@Pu7!6XVw)3n_M-L^X$RwhX_Z{GpM<{0v= z2`R#t1J7jNm@#toeFUFBXj?$YPO>V5B|pjAE$KofiBEQeGPhf&n2$1NYi60K)!LSK{>*Y}Vx>MSouoz3 zsKgsvRBW~z+i*5mvXGxR8LHu1#L!iz&}lcBs?kHVlqpu}ccVN1#9W3MPgNsWh1$lO z;~#w1byu6Oi!ww7{pmxFq8Jl4M5$a}i&9k1a-vwNwWq0g{h|X7?3}rJ?3sOKbsmI& zHyt6N90{430B&3>-}|zyur06PKlXgMQN8h<=;Jsw<$mExWHF!$W6f=Gm)084swROo z29m0^QkjNv<;^54Z&*q&4v{M@u5{qP<84)&7bV}Mhfxwd_NNWZ0t#)WGD4_dSquX* z0{+J}p(dSzrB>A!iKx-t3xDB^qIlUBu7s!MMkuN}*uO=I2nw#_7yRi>XU1n;<n8iX(jZ%s0BoW(?*AW(m$O46;r3zB zB?r#H^d%g735Dv)x}xbw_Hp0fkzv&Ou{Mo-K2dFk-v~#XBNwVlOG72~gXlC|JUnk8 zoG4b(p3@{v=ou7-JuXny_)?*_6*;m~D!~oyO!Cl@#j0I{AO(X`i0?D=T>~p(3@;M= zizou{SEDnsh0004Ye8dX2mUoP$ynm7N~hx*!a?dZ z7ihERowSOy&HrXVp2xDv+RMxL6r53(#3Yw#BvqPZxzPTi3=efeByhmESLvrN6gbFx z@1T&!QPo>#@pEvs*$#qUO7Cd;1MoEp-cv9CGl%|E*DeYo%AxIK`Q_Q-=~er2ezbP? z@ls+c)({iN>I5Zy1u%O-pX4@$QK z07`DP%UrAo$zq=|#`cLg$;ahOC3Q3|!h@wS(QgDUD#-{+TMA|Y%v&Ei(W<3y?3U5{ zsgzgD#x$eQ)<+;T3_`j~bGkJ9Y7Fz(RZZquHNxe+R$VQfiJi6En%hTTEi1k-8j!JX zr*~M~F5YjxWxLtgoj|+J7GIav4;!F})bb7MM5`}%UoXEonoAK@?YfPGPE3Vq22aS0 zV{+8^?DAq1{xX;5!&7iP!WcHyc#t&8#BwIR>B(ZxVIjkf?t z$w{xWfEsev`(cnxgMC+L*xgi$WV)!-tA>6vA(LjpcKsXUs)+&fW_Zc1^54P3X{Ck+ zJqNmqZCSHFisgV=>{iv3JAJGO8P_bpp1bNy|F@~i=5qn--%7#4nqqy7$_!&Kt)oWs zUgu^AePn*)LlvWL$$sm3gK{?FW$fG;RhJmss%_+V>ft6@b>F3HgM~T5=cGvXY;7-D zU+Yfn5ABCTjR@hUr%i1#^6;r7G8HVx$?sl<3;3BW9@hq-=iUq_tkb{F;{8~a<=fEH z@oVq%#M2$?fa|fJ$#=vxLegh}cISq%*AP*&Dyf=FyQ{Ir-7*Het~qVV#7;;SU&lLY z>X=Mq%dm|36cf|m4|Du14%*nHv^>(OdCWm#yjT*d7NGiP*v)+563)$NI%oBUXR3SS z#N}RBH;?6n;?(_ZhYLG%>9Zz#TIh48i(8Z_N_jNaJ=p4645g3KqNpn^L z`)YIoBFE%#?RHsAF1~WjBc7Cnqd;^l=Xtdr0RoPJS+~HpJD|g~+A&bp z^g{o8XQW}(!`D^gN2KhVZ6=8xRM-xwSY9~v5sH6C+UN}(zf)x(oIA+8zLg(H8T_4cd9^$yICyV~rBw)&_dsIQL9poh+Bc^=ad>mD3Iw7n| zAoyK;HXxhpo0nEIA{NjM;yPKHFI)!k$88UBNeoPs2iHvWNs4zj@qTlQshWeMZ2lb@ zL0-szu}4POKs!X7ypUTrj&v}DE_aBZ3hLNej?1|uI?aAMOLez*G)9WLxu!eoW3|@& zjTB||6_0iMzx9fChA1VKHnf0T{F<7N$ErPWvcoQrZ-DBP`UdqR@CukmJ~yLH%AS?C zPCpDBp(O;bYk&l-k4QbFBw*aeeyQd;(QzzyB#Jh9~;K7v7ws7vIz=q*vt2 zSKhzBylNVxI#&Cs<0SAU&5)YkT< zP$erF#K+Qf>K`{tQ`Qj|p#!8N@R6E6gl}y|Htso#qwd_)B`qrCUPrg}%-g!Z9>!e^ z6+i)B23;DUxunQ(w0qzTQ6e}$yoKs)m_T1J)-mNaPASdB^mBdkeX!TnaptU2tNa_uI^tZ3rY|UOEfO;6s{4010Ba`yFb=$sL+$Pi;{lc9GDqw&A0!i){w<*f#^9d z&`3k72HjU(uSg3v8;AL4EOGs3EWx|%Rpo5d03Ygs$0I=7DzzJ5@8-5I1fVb7jP=Y* zEpD+=BNV#nkS_!009 zW8>|?Bh`ix$WvAoj3Lz~|4&=;EqSP91hTa><3Ij$20QgBz8fcjx0`0)_%}D*9xXS~ zf#4heW<}Z9*m6{Ee79D&H{JeA3@g*XSM7PvdU*LTq2h0CHh#B`%ZD!R5CDZxf0XcKiHaf#12n)Pc00D32olh7UvarHOu>f=8eUc={5oSM~4_BPUFhD{obi5OOAt{88o-lENnFgMHI989L$=`QaO7v>Q9=(uxX^@m>$%81U0$#166)W78JOcq>q z*F8?xwv!)wwn8`*5L*>oLNMU|RN)5AsPz~2)ceaF_wBVvvryv?FQfPZ*!%LMEcKI+14I4IoY!`P)_WT zhSa|IRvfqO7D2a~ghW!5WO|qx)_d2j@O3S~Ek*Xloc|eGX98)RF>W~USnbD~1gA`s z2N=@b8aK;{0JpQ?ffu_PK}VoLA}m31YD7$cf36}?@oibUc#He*oCnd(Ms@5LoHdOm zG+b8{EsmvGdh8$u*l7oD(rC1N@?i&Y98#aQeAdi7HAPfzreIr9wV~Xn(J~XW;Jg+Y zGGyNW6*dOR`7^zDJ&|U&V$TLdXL4#YqI1R_tQOb;vtU6)XR_)HL}$+UJCaNdS07Fv zc{H{X7Jw}7nqv)SE%b6RVT0L=$h^nKvmwmAS8Z`WRwhJIRNGwydPnA^__>IS@7)cD zPQ%j*80pz~7Px>y1`r!Nz@**=^uFF$r<;SP9WC9PiRXzb2`aF3Hgr)6hhd^Dgmh&Z93mCTjCNuQP)|?|Qz^&ycT9_$rpo zGhUASvpbwevoi0^Jo+By`^>cd9(*_Rea?Xaz3*kd&pC)-DxUW?-^=G0&UAghq8txR zjJ?qENO#yoaCy3QjX58J`aZ|IEtDt{pJFX$2x6zFIz3sT! zNw0J4qkFXDW+q6_qvt)^am^Xijh@=y)sC}IA(-Q$pJm6LOp#D`X2(^IgPD%%;&z;p zs%XaD^*owy#w}pSA*j`A@9tDC%{Sv<89T1P_|ELOxyN+%a>~rp>!#52ZuGkOhk)hw z=5)QT3Bv-Np zU=IJP*Sez}`0|Nu3xr%rL&+euOwbinS z&}&vmRSnUFf~l^cchT|IJKim%PXnT}VybG0E)-35H9bb^W{A$!*)2S$=<8GPyn`4J zj3p&~c2Noy9g_r;)<+a*d;u5I$mvHkkIIlX%%@5SUmnZ7c(}L+uUQIXxy**KT)otu zeWJpe@%(;+#vQb#nIK?(Hm0#KamFT)jS_!U(7*~k@3}6g0?z5=1=?(%*783;_kg5B z1Sb*g*@4H(1tGxH zxNtSxCUBWk9XD)DSsl+se4k~pD1s+s2g@k*JlG9_P$fk~69|P4vf)6A&>Pvkpd4W1 zInHh*Xc`l_ctw*nAn?oXySK`=#xQXeuNCTOXl**@i(A2}I-Fc*VFYkFk{~K^;27(C zqVw{4ipODXrac-WjFOxWhj+i_RNJ+m(FP3ge+m q+?ZavX4S$BMQx0Ezch*d3b*R=l>4?0RR6&^=;JvqyYfItOC*i literal 0 HcmV?d00001 diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/.helmignore b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/.helmignore new file mode 100755 index 000000000..e2cf7941f --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/.helmignore @@ -0,0 +1,5 @@ +.git +# OWNERS file for Kubernetes +OWNERS +# example production yaml +values-production.yaml \ No newline at end of file diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/Chart.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/Chart.yaml new file mode 100755 index 000000000..4d8569c89 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/Chart.yaml @@ -0,0 +1,20 @@ +appVersion: 4.9.8 +description: Web publishing platform for building blogs and websites. +engine: gotpl +home: http://www.wordpress.com/ +icon: https://bitnami.com/assets/stacks/wordpress/img/wordpress-stack-220x234.png +keywords: +- wordpress +- cms +- blog +- http +- web +- application +- php +maintainers: +- email: containers@bitnami.com + name: bitnami-bot +name: chart-with-uncompressed-dependencies +sources: +- https://github.com/bitnami/bitnami-docker-wordpress +version: 2.1.8 diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/README.md b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/README.md new file mode 100755 index 000000000..5859a17fa --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/README.md @@ -0,0 +1,232 @@ +# WordPress + +[WordPress](https://wordpress.org/) is one of the most versatile open source content management systems on the market. A publishing platform for building blogs and websites. + +## TL;DR; + +```console +$ helm install stable/wordpress +``` + +## Introduction + +This chart bootstraps a [WordPress](https://github.com/bitnami/bitnami-docker-wordpress) deployment on a [Kubernetes](http://kubernetes.io) cluster using the [Helm](https://helm.sh) package manager. + +It also packages the [Bitnami MariaDB chart](https://github.com/kubernetes/charts/tree/master/stable/mariadb) which is required for bootstrapping a MariaDB deployment for the database requirements of the WordPress application. + +## Prerequisites + +- Kubernetes 1.4+ with Beta APIs enabled +- PV provisioner support in the underlying infrastructure + +## Installing the Chart + +To install the chart with the release name `my-release`: + +```console +$ helm install --name my-release stable/wordpress +``` + +The command deploys WordPress on the Kubernetes cluster in the default configuration. The [configuration](#configuration) section lists the parameters that can be configured during installation. + +> **Tip**: List all releases using `helm list` + +## Uninstalling the Chart + +To uninstall/delete the `my-release` deployment: + +```console +$ helm delete my-release +``` + +The command removes all the Kubernetes components associated with the chart and deletes the release. + +## Configuration + +The following table lists the configurable parameters of the WordPress chart and their default values. + +| Parameter | Description | Default | +|----------------------------------|--------------------------------------------|---------------------------------------------------------| +| `image.registry` | WordPress image registry | `docker.io` | +| `image.repository` | WordPress image name | `bitnami/wordpress` | +| `image.tag` | WordPress image tag | `{VERSION}` | +| `image.pullPolicy` | Image pull policy | `Always` if `imageTag` is `latest`, else `IfNotPresent` | +| `image.pullSecrets` | Specify image pull secrets | `nil` | +| `wordpressUsername` | User of the application | `user` | +| `wordpressPassword` | Application password | _random 10 character long alphanumeric string_ | +| `wordpressEmail` | Admin email | `user@example.com` | +| `wordpressFirstName` | First name | `FirstName` | +| `wordpressLastName` | Last name | `LastName` | +| `wordpressBlogName` | Blog name | `User's Blog!` | +| `wordpressTablePrefix` | Table prefix | `wp_` | +| `allowEmptyPassword` | Allow DB blank passwords | `yes` | +| `smtpHost` | SMTP host | `nil` | +| `smtpPort` | SMTP port | `nil` | +| `smtpUser` | SMTP user | `nil` | +| `smtpPassword` | SMTP password | `nil` | +| `smtpUsername` | User name for SMTP emails | `nil` | +| `smtpProtocol` | SMTP protocol [`tls`, `ssl`] | `nil` | +| `replicaCount` | Number of WordPress Pods to run | `1` | +| `mariadb.enabled` | Deploy MariaDB container(s) | `true` | +| `mariadb.rootUser.password` | MariaDB admin password | `nil` | +| `mariadb.db.name` | Database name to create | `bitnami_wordpress` | +| `mariadb.db.user` | Database user to create | `bn_wordpress` | +| `mariadb.db.password` | Password for the database | _random 10 character long alphanumeric string_ | +| `externalDatabase.host` | Host of the external database | `localhost` | +| `externalDatabase.user` | Existing username in the external db | `bn_wordpress` | +| `externalDatabase.password` | Password for the above username | `nil` | +| `externalDatabase.database` | Name of the existing database | `bitnami_wordpress` | +| `externalDatabase.port` | Database port number | `3306` | +| `serviceType` | Kubernetes Service type | `LoadBalancer` | +| `serviceExternalTrafficPolicy` | Enable client source IP preservation | `Cluster` | +| `nodePorts.http` | Kubernetes http node port | `""` | +| `nodePorts.https` | Kubernetes https node port | `""` | +| `healthcheckHttps` | Use https for liveliness and readiness | `false` | +| `ingress.enabled` | Enable ingress controller resource | `false` | +| `ingress.hosts[0].name` | Hostname to your WordPress installation | `wordpress.local` | +| `ingress.hosts[0].path` | Path within the url structure | `/` | +| `ingress.hosts[0].tls` | Utilize TLS backend in ingress | `false` | +| `ingress.hosts[0].tlsSecret` | TLS Secret (certificates) | `wordpress.local-tls-secret` | +| `ingress.hosts[0].annotations` | Annotations for this host's ingress record | `[]` | +| `ingress.secrets[0].name` | TLS Secret Name | `nil` | +| `ingress.secrets[0].certificate` | TLS Secret Certificate | `nil` | +| `ingress.secrets[0].key` | TLS Secret Key | `nil` | +| `persistence.enabled` | Enable persistence using PVC | `true` | +| `persistence.existingClaim` | Enable persistence using an existing PVC | `nil` | +| `persistence.storageClass` | PVC Storage Class | `nil` (uses alpha storage class annotation) | +| `persistence.accessMode` | PVC Access Mode | `ReadWriteOnce` | +| `persistence.size` | PVC Storage Request | `10Gi` | +| `nodeSelector` | Node labels for pod assignment | `{}` | +| `tolerations` | List of node taints to tolerate | `[]` | +| `affinity` | Map of node/pod affinities | `{}` | + +The above parameters map to the env variables defined in [bitnami/wordpress](http://github.com/bitnami/bitnami-docker-wordpress). For more information please refer to the [bitnami/wordpress](http://github.com/bitnami/bitnami-docker-wordpress) image documentation. + +Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. For example, + +```console +$ helm install --name my-release \ + --set wordpressUsername=admin,wordpressPassword=password,mariadb.mariadbRootPassword=secretpassword \ + stable/wordpress +``` + +The above command sets the WordPress administrator account username and password to `admin` and `password` respectively. Additionally, it sets the MariaDB `root` user password to `secretpassword`. + +Alternatively, a YAML file that specifies the values for the above parameters can be provided while installing the chart. For example, + +```console +$ helm install --name my-release -f values.yaml stable/wordpress +``` + +> **Tip**: You can use the default [values.yaml](values.yaml) + +## Production and horizontal scaling + +The following repo contains the recommended production settings for wordpress capture in an alternative [values file](values-production.yaml). Please read carefully the comments in the values-production.yaml file to set up your environment appropriately. + +To horizontally scale this chart, first download the [values-production.yaml](values-production.yaml) file to your local folder, then: + +```console +$ helm install --name my-release -f ./values-production.yaml stable/wordpress +``` + +Note that [values-production.yaml](values-production.yaml) includes a replicaCount of 3, so there will be 3 WordPress pods. As a result, to use the /admin portal and to ensure you can scale wordpress you need to provide a ReadWriteMany PVC, if you don't have a provisioner for this type of storage, we recommend that you install the nfs provisioner and map it to a RWO volume. + +```console +$ helm install stable/nfs-server-provisioner --set persistence.enabled=true,persistence.size=10Gi +$ helm install --name my-release -f values-production.yaml --set persistence.storageClass=nfs stable/wordpress +``` + +## Persistence + +The [Bitnami WordPress](https://github.com/bitnami/bitnami-docker-wordpress) image stores the WordPress data and configurations at the `/bitnami` path of the container. + +Persistent Volume Claims are used to keep the data across deployments. This is known to work in GCE, AWS, and minikube. +See the [Configuration](#configuration) section to configure the PVC or to disable persistence. + +## Using an external database + +Sometimes you may want to have Wordpress connect to an external database rather than installing one inside your cluster, e.g. to use a managed database service, or use run a single database server for all your applications. To do this, the chart allows you to specify credentials for an external database under the [`externalDatabase` parameter](#configuration). You should also disable the MariaDB installation with the `mariadb.enabled` option. For example: + +```console +$ helm install stable/wordpress \ + --set mariadb.enabled=false,externalDatabase.host=myexternalhost,externalDatabase.user=myuser,externalDatabase.password=mypassword,externalDatabase.database=mydatabase,externalDatabase.port=3306 +``` + +Note also if you disable MariaDB per above you MUST supply values for the `externalDatabase` connection. + +## Ingress + +This chart provides support for ingress resources. If you have an +ingress controller installed on your cluster, such as [nginx-ingress](https://kubeapps.com/charts/stable/nginx-ingress) +or [traefik](https://kubeapps.com/charts/stable/traefik) you can utilize +the ingress controller to serve your WordPress application. + +To enable ingress integration, please set `ingress.enabled` to `true` + +### Hosts + +Most likely you will only want to have one hostname that maps to this +WordPress installation, however, it is possible to have more than one +host. To facilitate this, the `ingress.hosts` object is an array. + +For each item, please indicate a `name`, `tls`, `tlsSecret`, and any +`annotations` that you may want the ingress controller to know about. + +Indicating TLS will cause WordPress to generate HTTPS URLs, and +WordPress will be connected to at port 443. The actual secret that +`tlsSecret` references do not have to be generated by this chart. +However, please note that if TLS is enabled, the ingress record will not +work until this secret exists. + +For annotations, please see [this document](https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md). +Not all annotations are supported by all ingress controllers, but this +document does a good job of indicating which annotation is supported by +many popular ingress controllers. + +### TLS Secrets + +This chart will facilitate the creation of TLS secrets for use with the +ingress controller, however, this is not required. There are three +common use cases: + +* helm generates/manages certificate secrets +* user generates/manages certificates separately +* an additional tool (like [kube-lego](https://kubeapps.com/charts/stable/kube-lego)) +manages the secrets for the application + +In the first two cases, one will need a certificate and a key. We would +expect them to look like this: + +* certificate files should look like (and there can be more than one +certificate if there is a certificate chain) + +``` +-----BEGIN CERTIFICATE----- +MIID6TCCAtGgAwIBAgIJAIaCwivkeB5EMA0GCSqGSIb3DQEBCwUAMFYxCzAJBgNV +... +jScrvkiBO65F46KioCL9h5tDvomdU1aqpI/CBzhvZn1c0ZTf87tGQR8NK7v7 +-----END CERTIFICATE----- +``` +* keys should look like: +``` +-----BEGIN RSA PRIVATE KEY----- +MIIEogIBAAKCAQEAvLYcyu8f3skuRyUgeeNpeDvYBCDcgq+LsWap6zbX5f8oLqp4 +... +wrj2wDbCDCFmfqnSJ+dKI3vFLlEz44sAV8jX/kd4Y6ZTQhlLbYc= +-----END RSA PRIVATE KEY----- +```` + +If you are going to use Helm to manage the certificates, please copy +these values into the `certificate` and `key` values for a given +`ingress.secrets` entry. + +If you are going are going to manage TLS secrets outside of Helm, please +know that you can create a TLS secret by doing the following: + +``` +kubectl create secret tls wordpress.local-tls --key /path/to/key.key --cert /path/to/cert.crt +``` + +Please see [this example](https://github.com/kubernetes/contrib/tree/master/ingress/controllers/nginx/examples/tls) +for more information. diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/.helmignore b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/.helmignore new file mode 100755 index 000000000..6b8710a71 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/.helmignore @@ -0,0 +1 @@ +.git diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/Chart.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/Chart.yaml new file mode 100755 index 000000000..cefc15836 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/Chart.yaml @@ -0,0 +1,21 @@ +appVersion: 10.1.34 +description: Fast, reliable, scalable, and easy to use open-source relational database + system. MariaDB Server is intended for mission-critical, heavy-load production systems + as well as for embedding into mass-deployed software. Highly available MariaDB cluster. +engine: gotpl +home: https://mariadb.org +icon: https://bitnami.com/assets/stacks/mariadb/img/mariadb-stack-220x234.png +keywords: +- mariadb +- mysql +- database +- sql +- prometheus +maintainers: +- email: containers@bitnami.com + name: bitnami-bot +name: mariadb +sources: +- https://github.com/bitnami/bitnami-docker-mariadb +- https://github.com/prometheus/mysqld_exporter +version: 4.3.1 diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/README.md b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/README.md new file mode 100755 index 000000000..3463b8b6d --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/README.md @@ -0,0 +1,143 @@ +# MariaDB + +[MariaDB](https://mariadb.org) is one of the most popular database servers in the world. It’s made by the original developers of MySQL and guaranteed to stay open source. Notable users include Wikipedia, Facebook and Google. + +MariaDB is developed as open source software and as a relational database it provides an SQL interface for accessing data. The latest versions of MariaDB also include GIS and JSON features. + +## TL;DR + +```bash +$ helm install stable/mariadb +``` + +## Introduction + +This chart bootstraps a [MariaDB](https://github.com/bitnami/bitnami-docker-mariadb) replication cluster deployment on a [Kubernetes](http://kubernetes.io) cluster using the [Helm](https://helm.sh) package manager. + +## Prerequisites + +- Kubernetes 1.4+ with Beta APIs enabled +- PV provisioner support in the underlying infrastructure + +## Installing the Chart + +To install the chart with the release name `my-release`: + +```bash +$ helm install --name my-release stable/mariadb +``` + +The command deploys MariaDB on the Kubernetes cluster in the default configuration. The [configuration](#configuration) section lists the parameters that can be configured during installation. + +> **Tip**: List all releases using `helm list` + +## Uninstalling the Chart + +To uninstall/delete the `my-release` deployment: + +```bash +$ helm delete my-release +``` + +The command removes all the Kubernetes components associated with the chart and deletes the release. + +## Configuration + +The following table lists the configurable parameters of the MariaDB chart and their default values. + +| Parameter | Description | Default | +|-------------------------------------------|-----------------------------------------------------|-------------------------------------------------------------------| +| `image.registry` | MariaDB image registry | `docker.io` | +| `image.repository` | MariaDB Image name | `bitnami/mariadb` | +| `image.tag` | MariaDB Image tag | `{VERSION}` | +| `image.pullPolicy` | MariaDB image pull policy | `Always` if `imageTag` is `latest`, else `IfNotPresent` | +| `image.pullSecrets` | Specify image pull secrets | `nil` (does not add image pull secrets to deployed pods) | +| `service.type` | Kubernetes service type | `ClusterIP` | +| `service.port` | MySQL service port | `3306` | +| `rootUser.password` | Password for the `root` user | _random 10 character alphanumeric string_ | +| `rootUser.forcePassword` | Force users to specify a password | `false` | +| `db.user` | Username of new user to create | `nil` | +| `db.password` | Password for the new user | _random 10 character alphanumeric string if `db.user` is defined_ | +| `db.name` | Name for new database to create | `my_database` | +| `replication.enabled` | MariaDB replication enabled | `true` | +| `replication.user` | MariaDB replication user | `replicator` | +| `replication.password` | MariaDB replication user password | _random 10 character alphanumeric string_ | +| `master.antiAffinity` | Master pod anti-affinity policy | `soft` | +| `master.persistence.enabled` | Enable persistence using a `PersistentVolumeClaim` | `true` | +| `master.persistence.annotations` | Persistent Volume Claim annotations | `{}` | +| `master.persistence.storageClass` | Persistent Volume Storage Class | `` | +| `master.persistence.accessModes` | Persistent Volume Access Modes | `[ReadWriteOnce]` | +| `master.persistence.size` | Persistent Volume Size | `8Gi` | +| `master.config` | Config file for the MariaDB Master server | `_default values in the values.yaml file_` | +| `master.resources` | CPU/Memory resource requests/limits for master node | `{}` | +| `master.livenessProbe.enabled` | Turn on and off liveness probe (master) | `true` | +| `master.livenessProbe.initialDelaySeconds`| Delay before liveness probe is initiated (master) | `120` | +| `master.livenessProbe.periodSeconds` | How often to perform the probe (master) | `10` | +| `master.livenessProbe.timeoutSeconds` | When the probe times out (master) | `1` | +| `master.livenessProbe.successThreshold` | Minimum consecutive successes for the probe (master)| `1` | +| `master.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe (master) | `3` | +| `master.readinessProbe.enabled` | Turn on and off readiness probe (master) | `true` | +| `master.readinessProbe.initialDelaySeconds`| Delay before readiness probe is initiated (master) | `15` | +| `master.readinessProbe.periodSeconds` | How often to perform the probe (master) | `10` | +| `master.readinessProbe.timeoutSeconds` | When the probe times out (master) | `1` | +| `master.readinessProbe.successThreshold` | Minimum consecutive successes for the probe (master)| `1` | +| `master.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe (master) | `3` | +| `slave.replicas` | Desired number of slave replicas | `1` | +| `slave.antiAffinity` | Slave pod anti-affinity policy | `soft` | +| `slave.persistence.enabled` | Enable persistence using a `PersistentVolumeClaim` | `true` | +| `slave.persistence.annotations` | Persistent Volume Claim annotations | `{}` | +| `slave.persistence.storageClass` | Persistent Volume Storage Class | `` | +| `slave.persistence.accessModes` | Persistent Volume Access Modes | `[ReadWriteOnce]` | +| `slave.persistence.size` | Persistent Volume Size | `8Gi` | +| `slave.config` | Config file for the MariaDB Slave replicas | `_default values in the values.yaml file_` | +| `slave.resources` | CPU/Memory resource requests/limits for slave node | `{}` | +| `slave.livenessProbe.enabled` | Turn on and off liveness probe (slave) | `true` | +| `slave.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated (slave) | `120` | +| `slave.livenessProbe.periodSeconds` | How often to perform the probe (slave) | `10` | +| `slave.livenessProbe.timeoutSeconds` | When the probe times out (slave) | `1` | +| `slave.livenessProbe.successThreshold` | Minimum consecutive successes for the probe (slave) | `1` | +| `slave.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe (slave) | `3` | +| `slave.readinessProbe.enabled` | Turn on and off readiness probe (slave) | `true` | +| `slave.readinessProbe.initialDelaySeconds`| Delay before readiness probe is initiated (slave) | `15` | +| `slave.readinessProbe.periodSeconds` | How often to perform the probe (slave) | `10` | +| `slave.readinessProbe.timeoutSeconds` | When the probe times out (slave) | `1` | +| `slave.readinessProbe.successThreshold` | Minimum consecutive successes for the probe (slave) | `1` | +| `slave.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe (slave) | `3` | +| `metrics.enabled` | Start a side-car prometheus exporter | `false` | +| `metrics.image.registry` | Exporter image registry | `docker.io` | +`metrics.image.repository` | Exporter image name | `prom/mysqld-exporter` | +| `metrics.image.tag` | Exporter image tag | `v0.10.0` | +| `metrics.image.pullPolicy` | Exporter image pull policy | `IfNotPresent` | +| `metrics.resources` | Exporter resource requests/limit | `nil` | + +The above parameters map to the env variables defined in [bitnami/mariadb](http://github.com/bitnami/bitnami-docker-mariadb). For more information please refer to the [bitnami/mariadb](http://github.com/bitnami/bitnami-docker-mariadb) image documentation. + +Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. For example, + +```bash +$ helm install --name my-release \ + --set root.password=secretpassword,user.database=app_database \ + stable/mariadb +``` + +The above command sets the MariaDB `root` account password to `secretpassword`. Additionally it creates a database named `my_database`. + +Alternatively, a YAML file that specifies the values for the parameters can be provided while installing the chart. For example, + +```bash +$ helm install --name my-release -f values.yaml stable/mariadb +``` + +> **Tip**: You can use the default [values.yaml](values.yaml) + +## Initialize a fresh instance + +The [Bitnami MariaDB](https://github.com/bitnami/bitnami-docker-mariadb) image allows you to use your custom scripts to initialize a fresh instance. In order to execute the scripts, they must be located inside the chart folder `files/docker-entrypoint-initdb.d` so they can be consumed as a ConfigMap. + +The allowed extensions are `.sh`, `.sql` and `.sql.gz`. + +## Persistence + +The [Bitnami MariaDB](https://github.com/bitnami/bitnami-docker-mariadb) image stores the MariaDB data and configurations at the `/bitnami/mariadb` path of the container. + +The chart mounts a [Persistent Volume](kubernetes.io/docs/user-guide/persistent-volumes/) volume at this location. The volume is created using dynamic volume provisioning, by default. An existing PersistentVolumeClaim can be defined. diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/files/docker-entrypoint-initdb.d/README.md b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/files/docker-entrypoint-initdb.d/README.md new file mode 100755 index 000000000..aaddde303 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/files/docker-entrypoint-initdb.d/README.md @@ -0,0 +1,3 @@ +You can copy here your custom .sh, .sql or .sql.gz file so they are executed during the first boot of the image. + +More info in the [bitnami-docker-mariadb](https://github.com/bitnami/bitnami-docker-mariadb#initializing-a-new-instance) repository. \ No newline at end of file diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/NOTES.txt b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/NOTES.txt new file mode 100755 index 000000000..4ba3b668a --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/NOTES.txt @@ -0,0 +1,35 @@ + +Please be patient while the chart is being deployed + +Tip: + + Watch the deployment status using the command: kubectl get pods -w --namespace {{ .Release.Namespace }} -l release={{ .Release.Name }} + +Services: + + echo Master: {{ template "mariadb.fullname" . }}.{{ .Release.Namespace }}.svc.cluster.local:{{ .Values.service.port }} +{{- if .Values.replication.enabled }} + echo Slave: {{ template "slave.fullname" . }}.{{ .Release.Namespace }}.svc.cluster.local:{{ .Values.service.port }} +{{- end }} + +Administrator credentials: + + Username: root + Password : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mariadb.fullname" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode) + +To connect to your database + + 1. Run a pod that you can use as a client: + + kubectl run {{ template "mariadb.fullname" . }}-client --rm --tty -i --image {{ template "mariadb.image" . }} --namespace {{ .Release.Namespace }} --command -- bash + + 2. To connect to master service (read/write): + + mysql -h {{ template "mariadb.fullname" . }}.{{ .Release.Namespace }}.svc.cluster.local -uroot -p {{ .Values.db.name }} + +{{- if .Values.replication.enabled }} + + 3. To connect to slave service (read-only): + + mysql -h {{ template "slave.fullname" . }}.{{ .Release.Namespace }}.svc.cluster.local -uroot -p {{ .Values.db.name }} +{{- end }} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/_helpers.tpl b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/_helpers.tpl new file mode 100755 index 000000000..5afe380ff --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/_helpers.tpl @@ -0,0 +1,53 @@ +{{/* vim: set filetype=mustache: */}} +{{/* +Expand the name of the chart. +*/}} +{{- define "mariadb.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +*/}} +{{- define "mariadb.fullname" -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{- define "master.fullname" -}} +{{- if .Values.replication.enabled -}} +{{- printf "%s-%s" .Release.Name "mariadb-master" | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- printf "%s-%s" .Release.Name "mariadb" | trunc 63 | trimSuffix "-" -}} +{{- end -}} +{{- end -}} + + +{{- define "slave.fullname" -}} +{{- printf "%s-%s" .Release.Name "mariadb-slave" | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{- define "mariadb.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Return the proper image name +*/}} +{{- define "mariadb.image" -}} +{{- $registryName := .Values.image.registry -}} +{{- $repositoryName := .Values.image.repository -}} +{{- $tag := .Values.image.tag | toString -}} +{{- printf "%s/%s:%s" $registryName $repositoryName $tag -}} +{{- end -}} + +{{/* +Return the proper image name +*/}} +{{- define "metrics.image" -}} +{{- $registryName := .Values.metrics.image.registry -}} +{{- $repositoryName := .Values.metrics.image.repository -}} +{{- $tag := .Values.metrics.image.tag | toString -}} +{{- printf "%s/%s:%s" $registryName $repositoryName $tag -}} +{{- end -}} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/initialization-configmap.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/initialization-configmap.yaml new file mode 100755 index 000000000..7bb969627 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/initialization-configmap.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ template "master.fullname" . }}-init-scripts + labels: + app: {{ template "mariadb.name" . }} + component: "master" + chart: {{ template "mariadb.chart" . }} + release: {{ .Release.Name | quote }} + heritage: {{ .Release.Service | quote }} +data: +{{ (.Files.Glob "files/docker-entrypoint-initdb.d/*").AsConfig | indent 2 }} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-configmap.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-configmap.yaml new file mode 100755 index 000000000..880a10198 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-configmap.yaml @@ -0,0 +1,15 @@ +{{- if .Values.master.config }} +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ template "master.fullname" . }} + labels: + app: {{ template "mariadb.name" . }} + component: "master" + chart: {{ template "mariadb.chart" . }} + release: {{ .Release.Name | quote }} + heritage: {{ .Release.Service | quote }} +data: + my.cnf: |- +{{ .Values.master.config | indent 4 }} +{{- end -}} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-statefulset.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-statefulset.yaml new file mode 100755 index 000000000..0d74f01ff --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-statefulset.yaml @@ -0,0 +1,187 @@ +apiVersion: apps/v1beta1 +kind: StatefulSet +metadata: + name: {{ template "master.fullname" . }} + labels: + app: "{{ template "mariadb.name" . }}" + chart: {{ template "mariadb.chart" . }} + component: "master" + release: {{ .Release.Name | quote }} + heritage: {{ .Release.Service | quote }} +spec: + serviceName: "{{ template "master.fullname" . }}" + replicas: 1 + updateStrategy: + type: RollingUpdate + template: + metadata: + labels: + app: "{{ template "mariadb.name" . }}" + component: "master" + release: "{{ .Release.Name }}" + chart: {{ template "mariadb.chart" . }} + spec: + securityContext: + runAsUser: 1001 + fsGroup: 1001 + {{- if eq .Values.master.antiAffinity "hard" }} + affinity: + podAntiAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + - topologyKey: "kubernetes.io/hostname" + labelSelector: + matchLabels: + app: "{{ template "mariadb.name" . }}" + release: "{{ .Release.Name }}" + {{- else if eq .Values.master.antiAffinity "soft" }} + affinity: + podAntiAffinity: + preferredDuringSchedulingIgnoredDuringExecution: + - weight: 1 + podAffinityTerm: + topologyKey: kubernetes.io/hostname + labelSelector: + matchLabels: + app: "{{ template "mariadb.name" . }}" + release: "{{ .Release.Name }}" + {{- end }} + {{- if .Values.image.pullSecrets }} + imagePullSecrets: + {{- range .Values.image.pullSecrets }} + - name: {{ . }} + {{- end}} + {{- end }} + containers: + - name: "mariadb" + image: {{ template "mariadb.image" . }} + imagePullPolicy: {{ .Values.image.pullPolicy | quote }} + env: + - name: MARIADB_ROOT_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-root-password + {{- if .Values.db.user }} + - name: MARIADB_USER + value: "{{ .Values.db.user }}" + - name: MARIADB_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-password + {{- end }} + - name: MARIADB_DATABASE + value: "{{ .Values.db.name }}" + {{- if .Values.replication.enabled }} + - name: MARIADB_REPLICATION_MODE + value: "master" + - name: MARIADB_REPLICATION_USER + value: "{{ .Values.replication.user }}" + - name: MARIADB_REPLICATION_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-replication-password + {{- end }} + ports: + - name: mysql + containerPort: 3306 + {{- if .Values.master.livenessProbe.enabled }} + livenessProbe: + exec: + command: ["sh", "-c", "exec mysqladmin status -uroot -p$MARIADB_ROOT_PASSWORD"] + initialDelaySeconds: {{ .Values.master.livenessProbe.initialDelaySeconds }} + periodSeconds: {{ .Values.master.livenessProbe.periodSeconds }} + timeoutSeconds: {{ .Values.master.livenessProbe.timeoutSeconds }} + successThreshold: {{ .Values.master.livenessProbe.successThreshold }} + failureThreshold: {{ .Values.master.livenessProbe.failureThreshold }} + {{- end }} + {{- if .Values.master.readinessProbe.enabled }} + readinessProbe: + exec: + command: ["sh", "-c", "exec mysqladmin status -uroot -p$MARIADB_ROOT_PASSWORD"] + initialDelaySeconds: {{ .Values.master.readinessProbe.initialDelaySeconds }} + periodSeconds: {{ .Values.master.readinessProbe.periodSeconds }} + timeoutSeconds: {{ .Values.master.readinessProbe.timeoutSeconds }} + successThreshold: {{ .Values.master.readinessProbe.successThreshold }} + failureThreshold: {{ .Values.master.readinessProbe.failureThreshold }} + {{- end }} + resources: +{{ toYaml .Values.master.resources | indent 10 }} + volumeMounts: + - name: data + mountPath: /bitnami/mariadb + - name: custom-init-scripts + mountPath: /docker-entrypoint-initdb.d +{{- if .Values.master.config }} + - name: config + mountPath: /opt/bitnami/mariadb/conf/my.cnf + subPath: my.cnf +{{- end }} +{{- if .Values.metrics.enabled }} + - name: metrics + image: {{ template "metrics.image" . }} + imagePullPolicy: {{ .Values.metrics.image.pullPolicy | quote }} + env: + - name: MARIADB_ROOT_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-root-password + command: [ 'sh', '-c', 'DATA_SOURCE_NAME="root:$MARIADB_ROOT_PASSWORD@(localhost:3306)/" /bin/mysqld_exporter' ] + ports: + - name: metrics + containerPort: 9104 + livenessProbe: + httpGet: + path: /metrics + port: metrics + initialDelaySeconds: 15 + timeoutSeconds: 5 + readinessProbe: + httpGet: + path: /metrics + port: metrics + initialDelaySeconds: 5 + timeoutSeconds: 1 + resources: +{{ toYaml .Values.metrics.resources | indent 10 }} +{{- end }} + volumes: + {{- if .Values.master.config }} + - name: config + configMap: + name: {{ template "master.fullname" . }} + {{- end }} + - name: custom-init-scripts + configMap: + name: {{ template "master.fullname" . }}-init-scripts +{{- if .Values.master.persistence.enabled }} + volumeClaimTemplates: + - metadata: + name: data + labels: + app: "{{ template "mariadb.name" . }}" + chart: {{ template "mariadb.chart" . }} + component: "master" + release: {{ .Release.Name | quote }} + heritage: {{ .Release.Service | quote }} + spec: + accessModes: + {{- range .Values.master.persistence.accessModes }} + - {{ . | quote }} + {{- end }} + resources: + requests: + storage: {{ .Values.master.persistence.size | quote }} + {{- if .Values.master.persistence.storageClass }} + {{- if (eq "-" .Values.master.persistence.storageClass) }} + storageClassName: "" + {{- else }} + storageClassName: {{ .Values.master.persistence.storageClass | quote }} + {{- end }} + {{- end }} +{{- else }} + - name: "data" + emptyDir: {} +{{- end }} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-svc.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-svc.yaml new file mode 100755 index 000000000..460ec328e --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/master-svc.yaml @@ -0,0 +1,29 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ template "mariadb.fullname" . }} + labels: + app: "{{ template "mariadb.name" . }}" + component: "master" + chart: {{ template "mariadb.chart" . }} + release: {{ .Release.Name | quote }} + heritage: {{ .Release.Service | quote }} +{{- if .Values.metrics.enabled }} + annotations: +{{ toYaml .Values.metrics.annotations | indent 4 }} +{{- end }} +spec: + type: {{ .Values.service.type }} + ports: + - name: mysql + port: {{ .Values.service.port }} + targetPort: mysql +{{- if .Values.metrics.enabled }} + - name: metrics + port: 9104 + targetPort: metrics +{{- end }} + selector: + app: "{{ template "mariadb.name" . }}" + component: "master" + release: "{{ .Release.Name }}" diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/secrets.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/secrets.yaml new file mode 100755 index 000000000..17999d609 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/secrets.yaml @@ -0,0 +1,38 @@ +{{- if (not .Values.rootUser.existingSecret) -}} +apiVersion: v1 +kind: Secret +metadata: + name: {{ template "mariadb.fullname" . }} + labels: + app: "{{ template "mariadb.name" . }}" + chart: {{ template "mariadb.chart" . }} + release: {{ .Release.Name | quote }} + heritage: {{ .Release.Service | quote }} +type: Opaque +data: + {{- if .Values.rootUser.password }} + mariadb-root-password: "{{ .Values.rootUser.password | b64enc }}" + {{- else if (not .Values.rootUser.forcePassword) }} + mariadb-root-password: "{{ randAlphaNum 10 | b64enc }}" + {{ else }} + mariadb-root-password: {{ required "A MariaDB Root Password is required!" .Values.rootUser.password }} + {{- end }} + {{- if .Values.db.user }} + {{- if .Values.db.password }} + mariadb-password: "{{ .Values.db.password | b64enc }}" + {{- else if (not .Values.db.forcePassword) }} + mariadb-password: "{{ randAlphaNum 10 | b64enc }}" + {{- else }} + mariadb-password: {{ required "A MariaDB Database Password is required!" .Values.db.password }} + {{- end }} + {{- end }} + {{- if .Values.replication.enabled }} + {{- if .Values.replication.password }} + mariadb-replication-password: "{{ .Values.replication.password | b64enc }}" + {{- else if (not .Values.replication.forcePassword) }} + mariadb-replication-password: "{{ randAlphaNum 10 | b64enc }}" + {{- else }} + mariadb-replication-password: {{ required "A MariaDB Replication Password is required!" .Values.replication.password }} + {{- end }} + {{- end }} +{{- end }} \ No newline at end of file diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-configmap.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-configmap.yaml new file mode 100755 index 000000000..056cf5c07 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-configmap.yaml @@ -0,0 +1,15 @@ +{{- if and .Values.replication.enabled .Values.slave.config }} +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ template "slave.fullname" . }} + labels: + app: {{ template "mariadb.name" . }} + component: "slave" + chart: {{ template "mariadb.chart" . }} + release: {{ .Release.Name | quote }} + heritage: {{ .Release.Service | quote }} +data: + my.cnf: |- +{{ .Values.slave.config | indent 4 }} +{{- end }} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-statefulset.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-statefulset.yaml new file mode 100755 index 000000000..aa67d4a70 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-statefulset.yaml @@ -0,0 +1,193 @@ +{{- if .Values.replication.enabled }} +apiVersion: apps/v1beta1 +kind: StatefulSet +metadata: + name: {{ template "slave.fullname" . }} + labels: + app: "{{ template "mariadb.name" . }}" + chart: {{ template "mariadb.chart" . }} + component: "slave" + release: {{ .Release.Name | quote }} + heritage: {{ .Release.Service | quote }} +spec: + serviceName: "{{ template "slave.fullname" . }}" + replicas: {{ .Values.slave.replicas }} + updateStrategy: + type: RollingUpdate + template: + metadata: + labels: + app: "{{ template "mariadb.name" . }}" + component: "slave" + release: "{{ .Release.Name }}" + chart: {{ template "mariadb.chart" . }} + spec: + securityContext: + runAsUser: 1001 + fsGroup: 1001 + {{- if eq .Values.slave.antiAffinity "hard" }} + affinity: + podAntiAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + - topologyKey: "kubernetes.io/hostname" + labelSelector: + matchLabels: + app: "{{ template "mariadb.name" . }}" + release: "{{ .Release.Name }}" + {{- else if eq .Values.slave.antiAffinity "soft" }} + affinity: + podAntiAffinity: + preferredDuringSchedulingIgnoredDuringExecution: + - weight: 1 + podAffinityTerm: + topologyKey: kubernetes.io/hostname + labelSelector: + matchLabels: + app: "{{ template "mariadb.name" . }}" + release: "{{ .Release.Name }}" + {{- end }} + {{- if .Values.image.pullSecrets }} + imagePullSecrets: + {{- range .Values.image.pullSecrets }} + - name: {{ . }} + {{- end}} + {{- end }} + containers: + - name: "mariadb" + image: {{ template "mariadb.image" . }} + imagePullPolicy: {{ .Values.image.pullPolicy | quote }} + env: + - name: MARIADB_ROOT_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-root-password + {{- if .Values.db.user }} + - name: MARIADB_USER + value: "{{ .Values.db.user }}" + - name: MARIADB_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-password + {{- end }} + - name: MARIADB_DATABASE + value: "{{ .Values.db.name }}" + - name: MARIADB_REPLICATION_MODE + value: "slave" + - name: MARIADB_MASTER_HOST + value: {{ template "mariadb.fullname" . }} + - name: MARIADB_MASTER_PORT + value: "3306" + - name: MARIADB_MASTER_USER + value: "root" + - name: MARIADB_MASTER_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-root-password + - name: MARIADB_REPLICATION_USER + value: "{{ .Values.replication.user }}" + - name: MARIADB_REPLICATION_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-replication-password + ports: + - name: mysql + containerPort: 3306 + {{- if .Values.slave.livenessProbe.enabled }} + livenessProbe: + exec: + command: ["sh", "-c", "exec mysqladmin status -uroot -p$MARIADB_ROOT_PASSWORD"] + initialDelaySeconds: {{ .Values.slave.livenessProbe.initialDelaySeconds }} + periodSeconds: {{ .Values.slave.livenessProbe.periodSeconds }} + timeoutSeconds: {{ .Values.slave.livenessProbe.timeoutSeconds }} + successThreshold: {{ .Values.slave.livenessProbe.successThreshold }} + failureThreshold: {{ .Values.slave.livenessProbe.failureThreshold }} + {{- end }} + {{- if .Values.slave.readinessProbe.enabled }} + readinessProbe: + exec: + command: ["sh", "-c", "exec mysqladmin status -uroot -p$MARIADB_ROOT_PASSWORD"] + initialDelaySeconds: {{ .Values.slave.readinessProbe.initialDelaySeconds }} + periodSeconds: {{ .Values.slave.readinessProbe.periodSeconds }} + timeoutSeconds: {{ .Values.slave.readinessProbe.timeoutSeconds }} + successThreshold: {{ .Values.slave.readinessProbe.successThreshold }} + failureThreshold: {{ .Values.slave.readinessProbe.failureThreshold }} + {{- end }} + resources: +{{ toYaml .Values.slave.resources | indent 10 }} + volumeMounts: + - name: data + mountPath: /bitnami/mariadb +{{- if .Values.slave.config }} + - name: config + mountPath: /opt/bitnami/mariadb/conf/my.cnf + subPath: my.cnf +{{- end }} +{{- if .Values.metrics.enabled }} + - name: metrics + image: {{ template "metrics.image" . }} + imagePullPolicy: {{ .Values.metrics.image.pullPolicy | quote }} + env: + - name: MARIADB_ROOT_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-root-password + command: [ 'sh', '-c', 'DATA_SOURCE_NAME="root:$MARIADB_ROOT_PASSWORD@(localhost:3306)/" /bin/mysqld_exporter' ] + ports: + - name: metrics + containerPort: 9104 + livenessProbe: + httpGet: + path: /metrics + port: metrics + initialDelaySeconds: 15 + timeoutSeconds: 5 + readinessProbe: + httpGet: + path: /metrics + port: metrics + initialDelaySeconds: 5 + timeoutSeconds: 1 + resources: +{{ toYaml .Values.metrics.resources | indent 10 }} +{{- end }} + volumes: + {{- if .Values.slave.config }} + - name: config + configMap: + name: {{ template "slave.fullname" . }} + {{- end }} +{{- if .Values.slave.persistence.enabled }} + volumeClaimTemplates: + - metadata: + name: data + labels: + app: "{{ template "mariadb.name" . }}" + chart: {{ template "mariadb.chart" . }} + component: "slave" + release: {{ .Release.Name | quote }} + heritage: {{ .Release.Service | quote }} + spec: + accessModes: + {{- range .Values.slave.persistence.accessModes }} + - {{ . | quote }} + {{- end }} + resources: + requests: + storage: {{ .Values.slave.persistence.size | quote }} + {{- if .Values.slave.persistence.storageClass }} + {{- if (eq "-" .Values.slave.persistence.storageClass) }} + storageClassName: "" + {{- else }} + storageClassName: {{ .Values.slave.persistence.storageClass | quote }} + {{- end }} + {{- end }} +{{- else }} + - name: "data" + emptyDir: {} +{{- end }} +{{- end }} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-svc.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-svc.yaml new file mode 100755 index 000000000..fa551371f --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/slave-svc.yaml @@ -0,0 +1,31 @@ +{{- if .Values.replication.enabled }} +apiVersion: v1 +kind: Service +metadata: + name: {{ template "slave.fullname" . }} + labels: + app: "{{ template "mariadb.name" . }}" + chart: {{ template "mariadb.chart" . }} + component: "slave" + release: {{ .Release.Name | quote }} + heritage: {{ .Release.Service | quote }} +{{- if .Values.metrics.enabled }} + annotations: +{{ toYaml .Values.metrics.annotations | indent 4 }} +{{- end }} +spec: + type: {{ .Values.service.type }} + ports: + - name: mysql + port: {{ .Values.service.port }} + targetPort: mysql +{{- if .Values.metrics.enabled }} + - name: metrics + port: 9104 + targetPort: metrics +{{- end }} + selector: + app: "{{ template "mariadb.name" . }}" + component: "slave" + release: "{{ .Release.Name }}" +{{- end }} \ No newline at end of file diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/test-runner.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/test-runner.yaml new file mode 100755 index 000000000..99a85d4aa --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/test-runner.yaml @@ -0,0 +1,44 @@ +apiVersion: v1 +kind: Pod +metadata: + name: "{{ template "mariadb.fullname" . }}-test-{{ randAlphaNum 5 | lower }}" + annotations: + "helm.sh/hook": test-success +spec: + initContainers: + - name: "test-framework" + image: "dduportal/bats:0.4.0" + command: + - "bash" + - "-c" + - | + set -ex + # copy bats to tools dir + cp -R /usr/local/libexec/ /tools/bats/ + volumeMounts: + - mountPath: /tools + name: tools + containers: + - name: mariadb-test + image: "{{ .Values.image.registry }}/{{ .Values.image.repository }}:{{ .Values.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy | quote }} + command: ["/tools/bats/bats", "-t", "/tests/run.sh"] + env: + - name: MARIADB_ROOT_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-root-password + volumeMounts: + - mountPath: /tests + name: tests + readOnly: true + - mountPath: /tools + name: tools + volumes: + - name: tests + configMap: + name: {{ template "mariadb.fullname" . }}-tests + - name: tools + emptyDir: {} + restartPolicy: Never diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/tests.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/tests.yaml new file mode 100755 index 000000000..957f3fd1e --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/templates/tests.yaml @@ -0,0 +1,9 @@ +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ template "mariadb.fullname" . }}-tests +data: + run.sh: |- + @test "Testing MariaDB is accessible" { + mysql -h {{ template "mariadb.fullname" . }} -uroot -p$MARIADB_ROOT_PASSWORD -e 'show databases;' + } diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/values.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/values.yaml new file mode 100755 index 000000000..ce2414e9f --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/charts/mariadb/values.yaml @@ -0,0 +1,233 @@ +## Bitnami MariaDB image +## ref: https://hub.docker.com/r/bitnami/mariadb/tags/ +## +image: + registry: docker.io + repository: bitnami/mariadb + tag: 10.1.34-debian-9 + ## Specify a imagePullPolicy + ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' + ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images + ## + pullPolicy: IfNotPresent + ## Optionally specify an array of imagePullSecrets. + ## Secrets must be manually created in the namespace. + ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ + ## + # pullSecrets: + # - myRegistrKeySecretName + +service: + ## Kubernetes service type + type: ClusterIP + port: 3306 + +rootUser: + ## MariaDB admin password + ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run + ## + password: + ## Use existing secret (ignores root, db and replication passwords) + # existingSecret: + ## + ## Option to force users to specify a password. That is required for 'helm upgrade' to work properly. + ## If it is not force, a random password will be generated. + forcePassword: false + +db: + ## MariaDB username and password + ## ref: https://github.com/bitnami/bitnami-docker-mariadb#creating-a-database-user-on-first-run + ## + user: + password: + ## Password is ignored if existingSecret is specified. + ## Database to create + ## ref: https://github.com/bitnami/bitnami-docker-mariadb#creating-a-database-on-first-run + ## + name: my_database + ## Option to force users to specify a password. That is required for 'helm upgrade' to work properly. + ## If it is not force, a random password will be generated. + forcePassword: false + +replication: + ## Enable replication. This enables the creation of replicas of MariaDB. If false, only a + ## master deployment would be created + enabled: true + ## + ## MariaDB replication user + ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-up-a-replication-cluster + ## + user: replicator + ## MariaDB replication user password + ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-up-a-replication-cluster + ## + password: + ## Password is ignored if existingSecret is specified. + ## + ## Option to force users to specify a password. That is required for 'helm upgrade' to work properly. + ## If it is not force, a random password will be generated. + forcePassword: false + +master: + antiAffinity: soft + ## Enable persistence using Persistent Volume Claims + ## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ + ## + persistence: + ## If true, use a Persistent Volume Claim, If false, use emptyDir + ## + enabled: true + ## Persistent Volume Storage Class + ## If defined, storageClassName: + ## If set to "-", storageClassName: "", which disables dynamic provisioning + ## If undefined (the default) or set to null, no storageClassName spec is + ## set, choosing the default provisioner. (gp2 on AWS, standard on + ## GKE, AWS & OpenStack) + ## + # storageClass: "-" + ## Persistent Volume Claim annotations + ## + annotations: + ## Persistent Volume Access Mode + ## + accessModes: + - ReadWriteOnce + ## Persistent Volume size + ## + size: 8Gi + ## + + ## Configure MySQL with a custom my.cnf file + ## ref: https://mysql.com/kb/en/mysql/configuring-mysql-with-mycnf/#example-of-configuration-file + ## + config: |- + [mysqld] + skip-name-resolve + explicit_defaults_for_timestamp + basedir=/opt/bitnami/mariadb + port=3306 + socket=/opt/bitnami/mariadb/tmp/mysql.sock + tmpdir=/opt/bitnami/mariadb/tmp + max_allowed_packet=16M + bind-address=0.0.0.0 + pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid + log-error=/opt/bitnami/mariadb/logs/mysqld.log + character-set-server=UTF8 + collation-server=utf8_general_ci + + [client] + port=3306 + socket=/opt/bitnami/mariadb/tmp/mysql.sock + default-character-set=UTF8 + + [manager] + port=3306 + socket=/opt/bitnami/mariadb/tmp/mysql.sock + pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid + + ## Configure master resource requests and limits + ## ref: http://kubernetes.io/docs/user-guide/compute-resources/ + ## + resources: {} + livenessProbe: + enabled: true + ## + ## Initializing the database could take some time + initialDelaySeconds: 120 + ## + ## Default Kubernetes values + periodSeconds: 10 + timeoutSeconds: 1 + successThreshold: 1 + failureThreshold: 3 + readinessProbe: + enabled: true + initialDelaySeconds: 15 + ## + ## Default Kubernetes values + periodSeconds: 10 + timeoutSeconds: 1 + successThreshold: 1 + failureThreshold: 3 + +slave: + replicas: 1 + antiAffinity: soft + persistence: + ## If true, use a Persistent Volume Claim, If false, use emptyDir + ## + enabled: true + # storageClass: "-" + annotations: + accessModes: + - ReadWriteOnce + ## Persistent Volume size + ## + size: 8Gi + ## + + ## Configure MySQL slave with a custom my.cnf file + ## ref: https://mysql.com/kb/en/mysql/configuring-mysql-with-mycnf/#example-of-configuration-file + ## + config: |- + [mysqld] + skip-name-resolve + explicit_defaults_for_timestamp + basedir=/opt/bitnami/mariadb + port=3306 + socket=/opt/bitnami/mariadb/tmp/mysql.sock + tmpdir=/opt/bitnami/mariadb/tmp + max_allowed_packet=16M + bind-address=0.0.0.0 + pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid + log-error=/opt/bitnami/mariadb/logs/mysqld.log + character-set-server=UTF8 + collation-server=utf8_general_ci + + [client] + port=3306 + socket=/opt/bitnami/mariadb/tmp/mysql.sock + default-character-set=UTF8 + + [manager] + port=3306 + socket=/opt/bitnami/mariadb/tmp/mysql.sock + pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid + + ## + ## Configure slave resource requests and limits + ## ref: http://kubernetes.io/docs/user-guide/compute-resources/ + ## + resources: {} + livenessProbe: + enabled: true + ## + ## Initializing the database could take some time + initialDelaySeconds: 120 + ## + ## Default Kubernetes values + periodSeconds: 10 + timeoutSeconds: 1 + successThreshold: 1 + failureThreshold: 3 + readinessProbe: + enabled: true + initialDelaySeconds: 15 + ## + ## Default Kubernetes values + periodSeconds: 10 + timeoutSeconds: 1 + successThreshold: 1 + failureThreshold: 3 + +metrics: + enabled: false + image: + registry: docker.io + repository: prom/mysqld-exporter + tag: v0.10.0 + pullPolicy: IfNotPresent + resources: {} + annotations: + prometheus.io/scrape: "true" + prometheus.io/port: "9104" diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/requirements.lock b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/requirements.lock new file mode 100755 index 000000000..cb3439862 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/requirements.lock @@ -0,0 +1,6 @@ +dependencies: +- name: mariadb + repository: https://kubernetes-charts.storage.googleapis.com/ + version: 4.3.1 +digest: sha256:82a0e5374376169d2ecf7d452c18a2ed93507f5d17c3393a1457f9ffad7e9b26 +generated: 2018-08-02T22:07:51.905271776Z diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/requirements.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/requirements.yaml new file mode 100755 index 000000000..a894b8b3b --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/requirements.yaml @@ -0,0 +1,7 @@ +dependencies: +- name: mariadb + version: 4.x.x + repository: https://kubernetes-charts.storage.googleapis.com/ + condition: mariadb.enabled + tags: + - wordpress-database diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/NOTES.txt b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/NOTES.txt new file mode 100755 index 000000000..55626e4d1 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/NOTES.txt @@ -0,0 +1,38 @@ +1. Get the WordPress URL: + +{{- if .Values.ingress.enabled }} + + You should be able to access your new WordPress installation through + + {{- range .Values.ingress.hosts }} + {{ if .tls }}https{{ else }}http{{ end }}://{{ .name }}/admin + {{- end }} + +{{- else if contains "LoadBalancer" .Values.serviceType }} + + NOTE: It may take a few minutes for the LoadBalancer IP to be available. + Watch the status with: 'kubectl get svc --namespace {{ .Release.Namespace }} -w {{ template "fullname" . }}' + + export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ template "fullname" . }} -o jsonpath='{.status.loadBalancer.ingress[0].ip}') + echo "WordPress URL: http://$SERVICE_IP/" + echo "WordPress Admin URL: http://$SERVICE_IP/admin" + +{{- else if contains "ClusterIP" .Values.serviceType }} + + echo "WordPress URL: http://127.0.0.1:8080/" + echo "WordPress Admin URL: http://127.0.0.1:8080/admin" + kubectl port-forward --namespace {{ .Release.Namespace }} svc/{{ template "fullname" . }} 8080:80 + +{{- else if contains "NodePort" .Values.serviceType }} + + export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ template "fullname" . }}) + export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}") + echo "WordPress URL: http://$NODE_IP:$NODE_PORT/" + echo "WordPress Admin URL: http://$NODE_IP:$NODE_PORT/admin" + +{{- end }} + +2. Login with the following credentials to see your blog + + echo Username: {{ .Values.wordpressUsername }} + echo Password: $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "fullname" . }} -o jsonpath="{.data.wordpress-password}" | base64 --decode) diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/_helpers.tpl b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/_helpers.tpl new file mode 100755 index 000000000..1e52d321c --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/_helpers.tpl @@ -0,0 +1,24 @@ +{{/* vim: set filetype=mustache: */}} +{{/* +Expand the name of the chart. +*/}} +{{- define "name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +*/}} +{{- define "fullname" -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +*/}} +{{- define "mariadb.fullname" -}} +{{- printf "%s-%s" .Release.Name "mariadb" | trunc 63 | trimSuffix "-" -}} +{{- end -}} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/deployment.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/deployment.yaml new file mode 100755 index 000000000..c5ab3d3ec --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/deployment.yaml @@ -0,0 +1,155 @@ +apiVersion: extensions/v1beta1 +kind: Deployment +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +spec: + replicas: {{ .Values.replicaCount }} + template: + metadata: + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + spec: + {{- if .Values.image.pullSecrets }} + imagePullSecrets: + {{- range .Values.image.pullSecrets }} + - name: {{ . }} + {{- end}} + {{- end }} + containers: + - name: {{ template "fullname" . }} + image: "{{ .Values.image.registry }}/{{ .Values.image.repository }}:{{ .Values.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy | quote }} + env: + - name: ALLOW_EMPTY_PASSWORD + value: {{ .Values.allowEmptyPassword | quote }} + - name: MARIADB_HOST + {{- if .Values.mariadb.enabled }} + value: {{ template "mariadb.fullname" . }} + {{- else }} + value: {{ .Values.externalDatabase.host | quote }} + {{- end }} + - name: MARIADB_PORT_NUMBER + {{- if .Values.mariadb.enabled }} + value: "3306" + {{- else }} + value: {{ .Values.externalDatabase.port | quote }} + {{- end }} + - name: WORDPRESS_DATABASE_NAME + {{- if .Values.mariadb.enabled }} + value: {{ .Values.mariadb.db.name | quote }} + {{- else }} + value: {{ .Values.externalDatabase.database | quote }} + {{- end }} + - name: WORDPRESS_DATABASE_USER + {{- if .Values.mariadb.enabled }} + value: {{ .Values.mariadb.db.user | quote }} + {{- else }} + value: {{ .Values.externalDatabase.user | quote }} + {{- end }} + - name: WORDPRESS_DATABASE_PASSWORD + valueFrom: + secretKeyRef: + {{- if .Values.mariadb.enabled }} + name: {{ template "mariadb.fullname" . }} + key: mariadb-password + {{- else }} + name: {{ printf "%s-%s" .Release.Name "externaldb" }} + key: db-password + {{- end }} + - name: WORDPRESS_USERNAME + value: {{ .Values.wordpressUsername | quote }} + - name: WORDPRESS_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "fullname" . }} + key: wordpress-password + - name: WORDPRESS_EMAIL + value: {{ .Values.wordpressEmail | quote }} + - name: WORDPRESS_FIRST_NAME + value: {{ .Values.wordpressFirstName | quote }} + - name: WORDPRESS_LAST_NAME + value: {{ .Values.wordpressLastName | quote }} + - name: WORDPRESS_BLOG_NAME + value: {{ .Values.wordpressBlogName | quote }} + - name: WORDPRESS_TABLE_PREFIX + value: {{ .Values.wordpressTablePrefix | quote }} + - name: SMTP_HOST + value: {{ .Values.smtpHost | quote }} + - name: SMTP_PORT + value: {{ .Values.smtpPort | quote }} + - name: SMTP_USER + value: {{ .Values.smtpUser | quote }} + - name: SMTP_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "fullname" . }} + key: smtp-password + - name: SMTP_USERNAME + value: {{ .Values.smtpUsername | quote }} + - name: SMTP_PROTOCOL + value: {{ .Values.smtpProtocol | quote }} + ports: + - name: http + containerPort: 80 + - name: https + containerPort: 443 + livenessProbe: + httpGet: + path: /wp-login.php + {{- if not .Values.healthcheckHttps }} + port: http + {{- else }} + port: https + scheme: HTTPS + {{- end }} +{{ toYaml .Values.livenessProbe | indent 10 }} + readinessProbe: + httpGet: + path: /wp-login.php + {{- if not .Values.healthcheckHttps }} + port: http + {{- else }} + port: https + scheme: HTTPS + {{- end }} +{{ toYaml .Values.readinessProbe | indent 10 }} + volumeMounts: + - mountPath: /bitnami/apache + name: wordpress-data + subPath: apache + - mountPath: /bitnami/wordpress + name: wordpress-data + subPath: wordpress + - mountPath: /bitnami/php + name: wordpress-data + subPath: php + resources: +{{ toYaml .Values.resources | indent 10 }} + volumes: + - name: wordpress-data + {{- if .Values.persistence.enabled }} + persistentVolumeClaim: + claimName: {{ .Values.persistence.existingClaim | default (include "fullname" .) }} + {{- else }} + emptyDir: {} + {{ end }} + {{- if .Values.nodeSelector }} + nodeSelector: +{{ toYaml .Values.nodeSelector | indent 8 }} + {{- end -}} + {{- with .Values.affinity }} + affinity: +{{ toYaml . | indent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: +{{ toYaml . | indent 8 }} + {{- end }} + diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/externaldb-secrets.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/externaldb-secrets.yaml new file mode 100755 index 000000000..39399ae54 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/externaldb-secrets.yaml @@ -0,0 +1,14 @@ +{{- if not .Values.mariadb.enabled }} +apiVersion: v1 +kind: Secret +metadata: + name: {{ printf "%s-%s" .Release.Name "externaldb" }} + labels: + app: {{ printf "%s-%s" .Release.Name "externaldb" }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +type: Opaque +data: + db-password: {{ .Values.externalDatabase.password | b64enc | quote }} +{{- end }} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/ingress.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/ingress.yaml new file mode 100755 index 000000000..7870146ff --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/ingress.yaml @@ -0,0 +1,36 @@ +{{- if .Values.ingress.enabled }} +{{- range .Values.ingress.hosts }} +apiVersion: extensions/v1beta1 +kind: Ingress +metadata: + name: "{{- printf "%s-%s" .name $.Release.Name | trunc 63 | trimSuffix "-" -}}" + labels: + app: {{ template "fullname" $ }} + chart: "{{ $.Chart.Name }}-{{ $.Chart.Version }}" + release: "{{ $.Release.Name }}" + heritage: "{{ $.Release.Service }}" + annotations: + {{- if .tls }} + ingress.kubernetes.io/secure-backends: "true" + {{- end }} + {{- range $key, $value := .annotations }} + {{ $key }}: {{ $value | quote }} + {{- end }} +spec: + rules: + - host: {{ .name }} + http: + paths: + - path: {{ default "/" .path }} + backend: + serviceName: {{ template "fullname" $ }} + servicePort: 80 +{{- if .tls }} + tls: + - hosts: + - {{ .name }} + secretName: {{ .tlsSecret }} +{{- end }} +--- +{{- end }} +{{- end }} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/pvc.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/pvc.yaml new file mode 100755 index 000000000..b3f912480 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/pvc.yaml @@ -0,0 +1,24 @@ +{{- if and .Values.persistence.enabled (not .Values.persistence.existingClaim) }} +kind: PersistentVolumeClaim +apiVersion: v1 +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +spec: + accessModes: + - {{ .Values.persistence.accessMode | quote }} + resources: + requests: + storage: {{ .Values.persistence.size | quote }} +{{- if .Values.persistence.storageClass }} +{{- if (eq "-" .Values.persistence.storageClass) }} + storageClassName: "" +{{- else }} + storageClassName: "{{ .Values.persistence.storageClass }}" +{{- end }} +{{- end }} +{{- end -}} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/secrets.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/secrets.yaml new file mode 100755 index 000000000..80a28d724 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/secrets.yaml @@ -0,0 +1,17 @@ +apiVersion: v1 +kind: Secret +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +type: Opaque +data: + {{ if .Values.wordpressPassword }} + wordpress-password: {{ default "" .Values.wordpressPassword | b64enc | quote }} + {{ else }} + wordpress-password: {{ randAlphaNum 10 | b64enc | quote }} + {{ end }} + smtp-password: {{ default "" .Values.smtpPassword | b64enc | quote }} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/svc.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/svc.yaml new file mode 100755 index 000000000..f6c399313 --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/svc.yaml @@ -0,0 +1,29 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ template "fullname" . }} + labels: + app: {{ template "fullname" . }} + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + release: "{{ .Release.Name }}" + heritage: "{{ .Release.Service }}" +spec: + type: {{ .Values.serviceType }} + {{- if (or (eq .Values.serviceType "LoadBalancer") (eq .Values.serviceType "NodePort")) }} + externalTrafficPolicy: {{ .Values.serviceExternalTrafficPolicy | quote }} + {{- end }} + ports: + - name: http + port: 80 + targetPort: http + {{- if (and (eq .Values.serviceType "NodePort") (not (empty .Values.nodePorts.http)))}} + nodePort: {{ .Values.nodePorts.http }} + {{- end }} + - name: https + port: 443 + targetPort: https + {{- if (and (eq .Values.serviceType "NodePort") (not (empty .Values.nodePorts.https)))}} + nodePort: {{ .Values.nodePorts.https }} + {{- end }} + selector: + app: {{ template "fullname" . }} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/tests/test-mariadb-connection.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/tests/test-mariadb-connection.yaml new file mode 100755 index 000000000..95ccb38ad --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/tests/test-mariadb-connection.yaml @@ -0,0 +1,29 @@ +{{- if .Values.mariadb.enabled }} +apiVersion: v1 +kind: Pod +metadata: + name: "{{ .Release.Name }}-credentials-test" + annotations: + "helm.sh/hook": test-success +spec: + containers: + - name: {{ .Release.Name }}-credentials-test + image: "{{ .Values.image.registry }}/{{ .Values.image.repository }}:{{ .Values.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy | quote }} + env: + - name: MARIADB_HOST + value: {{ template "mariadb.fullname" . }} + - name: MARIADB_PORT + value: "3306" + - name: WORDPRESS_DATABASE_NAME + value: {{ default "" .Values.mariadb.db.name | quote }} + - name: WORDPRESS_DATABASE_USER + value: {{ default "" .Values.mariadb.db.user | quote }} + - name: WORDPRESS_DATABASE_PASSWORD + valueFrom: + secretKeyRef: + name: {{ template "mariadb.fullname" . }} + key: mariadb-password + command: ["sh", "-c", "mysql --host=$MARIADB_HOST --port=$MARIADB_PORT --user=$WORDPRESS_DATABASE_USER --password=$WORDPRESS_DATABASE_PASSWORD"] + restartPolicy: Never +{{- end }} diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/tls-secrets.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/tls-secrets.yaml new file mode 100755 index 000000000..ca75d33ef --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/templates/tls-secrets.yaml @@ -0,0 +1,18 @@ +{{- if .Values.ingress.enabled }} +{{- range .Values.ingress.secrets }} +apiVersion: v1 +kind: Secret +metadata: + name: {{ .name }} + labels: + app: {{ template "fullname" $ }} + chart: "{{ $.Chart.Name }}-{{ $.Chart.Version }}" + release: "{{ $.Release.Name }}" + heritage: "{{ $.Release.Service }}" +type: kubernetes.io/tls +data: + tls.crt: {{ .certificate | b64enc }} + tls.key: {{ .key | b64enc }} +--- +{{- end }} +{{- end }} \ No newline at end of file diff --git a/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/values.yaml b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/values.yaml new file mode 100755 index 000000000..3cb66dafd --- /dev/null +++ b/pkg/action/testdata/charts/chart-with-uncompressed-dependencies/values.yaml @@ -0,0 +1,254 @@ +## Bitnami WordPress image version +## ref: https://hub.docker.com/r/bitnami/wordpress/tags/ +## +image: + registry: docker.io + repository: bitnami/wordpress + tag: 4.9.8-debian-9 + ## Specify a imagePullPolicy + ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' + ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images + ## + pullPolicy: IfNotPresent + ## Optionally specify an array of imagePullSecrets. + ## Secrets must be manually created in the namespace. + ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ + ## + # pullSecrets: + # - myRegistrKeySecretName + +## User of the application +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressUsername: user + +## Application password +## Defaults to a random 10-character alphanumeric string if not set +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +# wordpressPassword: + +## Admin email +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressEmail: user@example.com + +## First name +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressFirstName: FirstName + +## Last name +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressLastName: LastName + +## Blog name +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressBlogName: User's Blog! + +## Table prefix +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +## +wordpressTablePrefix: wp_ + +## Set to `yes` to allow the container to be started with blank passwords +## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables +allowEmptyPassword: yes + +## SMTP mail delivery configuration +## ref: https://github.com/bitnami/bitnami-docker-wordpress/#smtp-configuration +## +# smtpHost: +# smtpPort: +# smtpUser: +# smtpPassword: +# smtpUsername: +# smtpProtocol: + +replicaCount: 1 + +externalDatabase: +## All of these values are only used when mariadb.enabled is set to false + ## Database host + host: localhost + + ## non-root Username for Wordpress Database + user: bn_wordpress + + ## Database password + password: "" + + ## Database name + database: bitnami_wordpress + + ## Database port number + port: 3306 + +## +## MariaDB chart configuration +## +mariadb: + ## Whether to deploy a mariadb server to satisfy the applications database requirements. To use an external database set this to false and configure the externalDatabase parameters + enabled: true + ## Disable MariaDB replication + replication: + enabled: false + + ## Create a database and a database user + ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run + ## + db: + name: bitnami_wordpress + user: bn_wordpress + ## If the password is not specified, mariadb will generates a random password + ## + # password: + + ## MariaDB admin password + ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#setting-the-root-password-on-first-run + ## + # rootUser: + # password: + + ## Enable persistence using Persistent Volume Claims + ## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ + ## + master: + persistence: + enabled: true + ## mariadb data Persistent Volume Storage Class + ## If defined, storageClassName: + ## If set to "-", storageClassName: "", which disables dynamic provisioning + ## If undefined (the default) or set to null, no storageClassName spec is + ## set, choosing the default provisioner. (gp2 on AWS, standard on + ## GKE, AWS & OpenStack) + ## + # storageClass: "-" + accessMode: ReadWriteOnce + size: 8Gi + +## Kubernetes configuration +## For minikube, set this to NodePort, elsewhere use LoadBalancer or ClusterIP +## +serviceType: LoadBalancer +## +## serviceType: NodePort +## nodePorts: +## http: +## https: +nodePorts: + http: "" + https: "" +## Enable client source IP preservation +## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip +## +serviceExternalTrafficPolicy: Cluster + +## Allow health checks to be pointed at the https port +healthcheckHttps: false + +## Configure extra options for liveness and readiness probes +## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes) +livenessProbe: + initialDelaySeconds: 120 + periodSeconds: 10 + timeoutSeconds: 5 + failureThreshold: 6 + successThreshold: 1 +readinessProbe: + initialDelaySeconds: 30 + periodSeconds: 10 + timeoutSeconds: 5 + failureThreshold: 6 + successThreshold: 1 + +## Configure the ingress resource that allows you to access the +## Wordpress installation. Set up the URL +## ref: http://kubernetes.io/docs/user-guide/ingress/ +## +ingress: + ## Set to true to enable ingress record generation + enabled: false + + ## The list of hostnames to be covered with this ingress record. + ## Most likely this will be just one host, but in the event more hosts are needed, this is an array + hosts: + - name: wordpress.local + + ## Set this to true in order to enable TLS on the ingress record + ## A side effect of this will be that the backend wordpress service will be connected at port 443 + tls: false + + ## If TLS is set to true, you must declare what secret will store the key/certificate for TLS + tlsSecret: wordpress.local-tls + + ## Ingress annotations done as key:value pairs + ## If you're using kube-lego, you will want to add: + ## kubernetes.io/tls-acme: true + ## + ## For a full list of possible ingress annotations, please see + ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md + ## + ## If tls is set to true, annotation ingress.kubernetes.io/secure-backends: "true" will automatically be set + annotations: + # kubernetes.io/ingress.class: nginx + # kubernetes.io/tls-acme: true + + secrets: + ## If you're providing your own certificates, please use this to add the certificates as secrets + ## key and certificate should start with -----BEGIN CERTIFICATE----- or + ## -----BEGIN RSA PRIVATE KEY----- + ## + ## name should line up with a tlsSecret set further up + ## If you're using kube-lego, this is unneeded, as it will create the secret for you if it is not set + ## + ## It is also possible to create and manage the certificates outside of this helm chart + ## Please see README.md for more information + # - name: wordpress.local-tls + # key: + # certificate: + +## Enable persistence using Persistent Volume Claims +## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ +## +persistence: + enabled: true + ## wordpress data Persistent Volume Storage Class + ## If defined, storageClassName: + ## If set to "-", storageClassName: "", which disables dynamic provisioning + ## If undefined (the default) or set to null, no storageClassName spec is + ## set, choosing the default provisioner. (gp2 on AWS, standard on + ## GKE, AWS & OpenStack) + ## + # storageClass: "-" + ## + ## If you want to reuse an existing claim, you can pass the name of the PVC using + ## the existingClaim variable + # existingClaim: your-claim + accessMode: ReadWriteOnce + size: 10Gi + +## Configure resource requests and limits +## ref: http://kubernetes.io/docs/user-guide/compute-resources/ +## +resources: + requests: + memory: 512Mi + cpu: 300m + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} + +## Tolerations for pod assignment +## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ +## +tolerations: [] + +## Affinity for pod assignment +## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity +## +affinity: {} diff --git a/pkg/action/testdata/output/compressed-deps-tgz.txt b/pkg/action/testdata/output/compressed-deps-tgz.txt new file mode 100644 index 000000000..6cc526b70 --- /dev/null +++ b/pkg/action/testdata/output/compressed-deps-tgz.txt @@ -0,0 +1,3 @@ +NAME VERSION REPOSITORY STATUS +mariadb 4.x.x https://kubernetes-charts.storage.googleapis.com/ unpacked + diff --git a/pkg/action/testdata/output/compressed-deps.txt b/pkg/action/testdata/output/compressed-deps.txt new file mode 100644 index 000000000..ff2b0ab75 --- /dev/null +++ b/pkg/action/testdata/output/compressed-deps.txt @@ -0,0 +1,3 @@ +NAME VERSION REPOSITORY STATUS +mariadb 4.x.x https://kubernetes-charts.storage.googleapis.com/ ok + diff --git a/pkg/action/testdata/output/missing-deps.txt b/pkg/action/testdata/output/missing-deps.txt new file mode 100644 index 000000000..8d742883a --- /dev/null +++ b/pkg/action/testdata/output/missing-deps.txt @@ -0,0 +1,3 @@ +NAME VERSION REPOSITORY STATUS +mariadb 4.x.x https://kubernetes-charts.storage.googleapis.com/ missing + diff --git a/pkg/action/testdata/output/uncompressed-deps-tgz.txt b/pkg/action/testdata/output/uncompressed-deps-tgz.txt new file mode 100644 index 000000000..6cc526b70 --- /dev/null +++ b/pkg/action/testdata/output/uncompressed-deps-tgz.txt @@ -0,0 +1,3 @@ +NAME VERSION REPOSITORY STATUS +mariadb 4.x.x https://kubernetes-charts.storage.googleapis.com/ unpacked + diff --git a/pkg/action/testdata/output/uncompressed-deps.txt b/pkg/action/testdata/output/uncompressed-deps.txt new file mode 100644 index 000000000..6cc526b70 --- /dev/null +++ b/pkg/action/testdata/output/uncompressed-deps.txt @@ -0,0 +1,3 @@ +NAME VERSION REPOSITORY STATUS +mariadb 4.x.x https://kubernetes-charts.storage.googleapis.com/ unpacked +