Compare commits

..

No commits in common. "main" and "grafana/12.1.0" have entirely different histories.

31 changed files with 253 additions and 84 deletions

View File

@ -28,7 +28,7 @@ func init() {
flag.StringVar(&stsName, "name", "", "name of the primary statefulset")
flag.StringVar(&namespace, "namespace", "", "namespace where the application is running")
flag.StringVar(&password, "password", "", "database password for username")
flag.IntVar(&timeoutSeconds, "timeout", 180, "timeout in seconds")
flag.IntVar(&timeoutSeconds, "timeout", 120, "timeout in seconds")
timeout = time.Duration(timeoutSeconds) * time.Second
}

View File

@ -1,12 +1,8 @@
# Changelog
## 4.0.49 (2025-07-11)
## 4.0.48 (2025-07-11)
* [bitnami/chainloop] :zap: :arrow_up: Update dependency references ([#35022](https://github.com/bitnami/charts/pull/35022))
## <small>4.0.48 (2025-07-11)</small>
* [bitnami/chainloop] :zap: :arrow_up: Update dependency references (#35015) ([8482574](https://github.com/bitnami/charts/commit/848257489bb7819bc6b569441de07145a73da7fd)), closes [#35015](https://github.com/bitnami/charts/issues/35015)
* [bitnami/chainloop] :zap: :arrow_up: Update dependency references ([#35015](https://github.com/bitnami/charts/pull/35015))
## <small>4.0.47 (2025-07-11)</small>

View File

@ -5,17 +5,17 @@ annotations:
category: DeveloperTools
images: |
- name: chainloop-artifact-cas
image: docker.io/bitnami/chainloop-artifact-cas:1.30.0-debian-12-r0
image: docker.io/bitnami/chainloop-artifact-cas:1.29.0-debian-12-r0
- name: chainloop-control-plane
image: docker.io/bitnami/chainloop-control-plane:1.30.0-debian-12-r0
image: docker.io/bitnami/chainloop-control-plane:1.29.0-debian-12-r0
- name: chainloop-control-plane-migrations
image: docker.io/bitnami/chainloop-control-plane-migrations:1.30.0-debian-12-r0
image: docker.io/bitnami/chainloop-control-plane-migrations:1.29.0-debian-12-r0
- name: dex
image: docker.io/bitnami/dex:2.43.1-debian-12-r5
license: Apache-2.0
tanzuCategory: application
apiVersion: v2
appVersion: 1.30.0
appVersion: 1.29.0
dependencies:
- name: common
repository: oci://registry-1.docker.io/bitnamicharts
@ -65,4 +65,4 @@ sources:
- https://github.com/bitnami/containers/tree/main/bitnami/chainloop-control-plane-migrations
- https://github.com/bitnami/containers/tree/main/bitnami/chainloop-artifact-cas
- https://github.com/chainloop-dev/chainloop
version: 4.0.49
version: 4.0.48

View File

@ -181,7 +181,7 @@ controlplane:
image:
registry: docker.io
repository: bitnami/chainloop-control-plane
tag: 1.30.0-debian-12-r0
tag: 1.29.0-debian-12-r0
digest: ""
## Specify a imagePullPolicy
## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images
@ -258,7 +258,7 @@ controlplane:
image:
registry: docker.io
repository: bitnami/chainloop-control-plane-migrations
tag: 1.30.0-debian-12-r0
tag: 1.29.0-debian-12-r0
digest: ""
## Specify a imagePullPolicy
## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images
@ -1005,7 +1005,7 @@ cas:
image:
registry: docker.io
repository: bitnami/chainloop-artifact-cas
tag: 1.30.0-debian-12-r0
tag: 1.29.0-debian-12-r0
digest: ""
## Specify a imagePullPolicy
## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images

View File

@ -1,12 +1,8 @@
# Changelog
## 22.0.12 (2025-07-11)
## 22.0.11 (2025-07-08)
* [bitnami/elasticsearch] remove copyTlsCerts init container ([#31960](https://github.com/bitnami/charts/pull/31960))
## <small>22.0.11 (2025-07-08)</small>
* [bitnami/elasticsearch] :zap: :arrow_up: Update dependency references (#34879) ([57b3b91](https://github.com/bitnami/charts/commit/57b3b912e6881ad742a4b4dcd95c87c6e54603bf)), closes [#34879](https://github.com/bitnami/charts/issues/34879)
* [bitnami/elasticsearch] :zap: :arrow_up: Update dependency references ([#34879](https://github.com/bitnami/charts/pull/34879))
## <small>22.0.10 (2025-06-30)</small>

View File

@ -36,4 +36,4 @@ maintainers:
name: elasticsearch
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/elasticsearch
version: 22.0.12
version: 22.0.11

View File

@ -956,6 +956,13 @@ You can enable this initContainer by setting `volumePermissions.enabled` to `tru
| `sysctlImage.pullSecrets` | Kernel settings modifier image pull secrets | `[]` |
| `sysctlImage.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if sysctlImage.resources is set (sysctlImage.resources is recommended for production). | `nano` |
| `sysctlImage.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
| `copyTlsCerts.image.registry` | Copy TLS certificates image registry | `REGISTRY_NAME` |
| `copyTlsCerts.image.repository` | Copy TLS certificates image repository | `REPOSITORY_NAME/os-shell` |
| `copyTlsCerts.image.digest` | Copy TLS certificates image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `copyTlsCerts.image.pullPolicy` | Copy TLS certificates image pull policy | `IfNotPresent` |
| `copyTlsCerts.image.pullSecrets` | Copy TLS certificates image pull secrets | `[]` |
| `copyTlsCerts.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if copyTlsCerts.resources is set (copyTlsCerts.resources is recommended for production). | `nano` |
| `copyTlsCerts.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
### Kibana Parameters

View File

@ -135,10 +135,11 @@ In order to replicate the container startup scripts execute this command:
{{- include "common.warnings.rollingTag" .Values.image }}
{{- include "common.warnings.rollingTag" .Values.volumePermissions.image }}
{{- include "common.warnings.rollingTag" .Values.copyTlsCerts.image }}
{{- include "common.warnings.rollingTag" .Values.sysctlImage }}
{{- end }}
{{ include "elasticsearch.validateValues" . }}
{{- include "common.warnings.resources" (dict "sections" (list "coordinating" "data" "ingest" "master" "metrics" "sysctlImage" "volumePermissions") "context" $) }}
{{- include "common.warnings.modifiedImages" (dict "images" (list .Values.image .Values.metrics.image .Values.volumePermissions.image .Values.sysctlImage ) "context" $) }}
{{- include "common.errors.insecureImages" (dict "images" (list .Values.image .Values.metrics.image .Values.volumePermissions.image .Values.sysctlImage ) "context" $) }}
{{- include "common.warnings.resources" (dict "sections" (list "coordinating" "copyTlsCerts" "data" "ingest" "master" "metrics" "sysctlImage" "volumePermissions") "context" $) }}
{{- include "common.warnings.modifiedImages" (dict "images" (list .Values.image .Values.copyTlsCerts.image .Values.metrics.image .Values.volumePermissions.image .Values.sysctlImage ) "context" $) }}
{{- include "common.errors.insecureImages" (dict "images" (list .Values.image .Values.copyTlsCerts.image .Values.metrics.image .Values.volumePermissions.image .Values.sysctlImage ) "context" $) }}

View File

@ -16,7 +16,7 @@ Return the proper ES image name
Return the proper Docker Image Registry Secret Names
*/}}
{{- define "elasticsearch.imagePullSecrets" -}}
{{ include "common.images.renderPullSecrets" (dict "images" (list .Values.image .Values.metrics.image .Values.sysctlImage .Values.volumePermissions.image) "context" $) }}
{{ include "common.images.renderPullSecrets" (dict "images" (list .Values.image .Values.copyTlsCerts.image .Values.metrics.image .Values.sysctlImage .Values.volumePermissions.image) "context" $) }}
{{- end -}}
{{/*
@ -40,6 +40,13 @@ Return the proper image name (for the init container volume-permissions image)
{{ include "common.images.image" (dict "imageRoot" .Values.volumePermissions.image "global" .Values.global) }}
{{- end -}}
{{/*
Return the proper Copy TLS Certificates image name
*/}}
{{- define "elasticsearch.copyTlsCerts.image" -}}
{{ include "common.images.image" (dict "imageRoot" .Values.copyTlsCerts.image "global" .Values.global) }}
{{- end -}}
{{/*
Name for the Elasticsearch service
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).

View File

@ -108,6 +108,40 @@ spec:
resources: {{- include "common.resources.preset" (dict "type" .Values.sysctlImage.resourcesPreset) | nindent 12 }}
{{- end }}
{{- end }}
{{- if .Values.security.enabled }}
- name: copy-tls-certificates
image: {{ include "elasticsearch.copyTlsCerts.image" . }}
imagePullPolicy: {{ .Values.copyTlsCerts.image.pullPolicy | quote }}
command:
- /bin/sh
- -c
- |
ls -l /
ls -l /certs
for file in /certs/*; do
if [ -f "$file" ]; then
filename=$(basename "$file")
dst_file="/tmp/$filename"
cat "$file" > "$dst_file"
echo "Copied $file to $dst_file"
fi
done
echo "All files have been copied."
volumeMounts:
- name: elasticsearch-certificates
mountPath: /certs
- name: empty-dir
mountPath: /tmp
subPath: certs
{{- if .Values.coordinating.containerSecurityContext.enabled }}
securityContext: {{- include "common.compatibility.renderSecurityContext" (dict "secContext" .Values.coordinating.containerSecurityContext "context" $) | nindent 12 }}
{{- end }}
{{- if .Values.copyTlsCerts.resources }}
resources: {{- toYaml .Values.copyTlsCerts.resources | nindent 12 }}
{{- else if ne .Values.copyTlsCerts.resourcesPreset "none" }}
resources: {{- include "common.resources.preset" (dict "type" .Values.copyTlsCerts.resourcesPreset) | nindent 12 }}
{{- end }}
{{- end }}
- name: copy-default-plugins
image: {{ include "elasticsearch.image" . }}
imagePullPolicy: {{ .Values.image.pullPolicy | quote }}
@ -301,9 +335,9 @@ spec:
subPath: my_elasticsearch.yml
{{- end }}
{{- if .Values.security.enabled }}
- name: elasticsearch-certificates
- name: empty-dir
mountPath: /opt/bitnami/elasticsearch/config/certs
readOnly: true
subPath: certs
{{- end }}
{{- if .Values.initScripts }}
- name: custom-init-scripts

View File

@ -133,6 +133,40 @@ spec:
- name: data
mountPath: /bitnami/elasticsearch/data
{{- end }}
{{- if and .Values.security.enabled .Values.enableDefaultInitContainers }}
- name: copy-tls-certificates
image: {{ include "elasticsearch.copyTlsCerts.image" . }}
imagePullPolicy: {{ .Values.copyTlsCerts.image.pullPolicy | quote }}
command:
- /bin/sh
- -c
- |
ls -l /
ls -l /certs
for file in /certs/*; do
if [ -f "$file" ]; then
filename=$(basename "$file")
dst_file="/tmp/$filename"
cat "$file" > "$dst_file"
echo "Copied $file to $dst_file"
fi
done
echo "All files have been copied."
volumeMounts:
- name: elasticsearch-certificates
mountPath: /certs
- name: empty-dir
mountPath: /tmp
subPath: certs
{{- if .Values.data.containerSecurityContext.enabled }}
securityContext: {{- include "common.compatibility.renderSecurityContext" (dict "secContext" .Values.data.containerSecurityContext "context" $) | nindent 12 }}
{{- end }}
{{- if .Values.copyTlsCerts.resources }}
resources: {{- toYaml .Values.copyTlsCerts.resources | nindent 12 }}
{{- else if ne .Values.copyTlsCerts.resourcesPreset "none" }}
resources: {{- include "common.resources.preset" (dict "type" .Values.copyTlsCerts.resourcesPreset) | nindent 12 }}
{{- end }}
{{- end }}
{{- if .Values.enableDefaultInitContainers }}
- name: copy-default-plugins
image: {{ include "elasticsearch.image" . }}
@ -332,9 +366,9 @@ spec:
subPath: my_elasticsearch.yml
{{- end }}
{{- if .Values.security.enabled }}
- name: elasticsearch-certificates
- name: empty-dir
mountPath: /opt/bitnami/elasticsearch/config/certs
readOnly: true
subPath: certs
{{- end }}
{{- if .Values.initScripts }}
- name: custom-init-scripts

View File

@ -108,6 +108,40 @@ spec:
resources: {{- include "common.resources.preset" (dict "type" .Values.sysctlImage.resourcesPreset) | nindent 12 }}
{{- end }}
{{- end }}
{{- if and .Values.security.enabled .Values.enableDefaultInitContainers }}
- name: copy-tls-certificates
image: {{ include "elasticsearch.copyTlsCerts.image" . }}
imagePullPolicy: {{ .Values.copyTlsCerts.image.pullPolicy | quote }}
command:
- /bin/sh
- -c
- |
ls -l /
ls -l /certs
for file in /certs/*; do
if [ -f "$file" ]; then
filename=$(basename "$file")
dst_file="/tmp/$filename"
cat "$file" > "$dst_file"
echo "Copied $file to $dst_file"
fi
done
echo "All files have been copied."
volumeMounts:
- name: elasticsearch-certificates
mountPath: /certs
- name: empty-dir
mountPath: /tmp
subPath: certs
{{- if .Values.ingest.containerSecurityContext.enabled }}
securityContext: {{- include "common.compatibility.renderSecurityContext" (dict "secContext" .Values.ingest.containerSecurityContext "context" $) | nindent 12 }}
{{- end }}
{{- if .Values.copyTlsCerts.resources }}
resources: {{- toYaml .Values.copyTlsCerts.resources | nindent 12 }}
{{- else if ne .Values.copyTlsCerts.resourcesPreset "none" }}
resources: {{- include "common.resources.preset" (dict "type" .Values.copyTlsCerts.resourcesPreset) | nindent 12 }}
{{- end }}
{{- end }}
{{- if .Values.enableDefaultInitContainers }}
- name: copy-default-plugins
image: {{ include "elasticsearch.image" . }}
@ -303,9 +337,9 @@ spec:
subPath: my_elasticsearch.yml
{{- end }}
{{- if .Values.security.enabled }}
- name: elasticsearch-certificates
- name: empty-dir
mountPath: /opt/bitnami/elasticsearch/config/certs
readOnly: true
subPath: certs
{{- end }}
{{- if .Values.initScripts }}
- name: custom-init-scripts

View File

@ -108,6 +108,40 @@ spec:
resources: {{- include "common.resources.preset" (dict "type" .Values.sysctlImage.resourcesPreset) | nindent 12 }}
{{- end }}
{{- end }}
{{- if and .Values.security.enabled .Values.enableDefaultInitContainers }}
- name: copy-tls-certificates
image: {{ include "elasticsearch.copyTlsCerts.image" . }}
imagePullPolicy: {{ .Values.copyTlsCerts.image.pullPolicy | quote }}
command:
- /bin/sh
- -c
- |
ls -l /
ls -l /certs
for file in /certs/*; do
if [ -f "$file" ]; then
filename=$(basename "$file")
dst_file="/tmp/$filename"
cat "$file" > "$dst_file"
echo "Copied $file to $dst_file"
fi
done
echo "All files have been copied."
volumeMounts:
- name: elasticsearch-certificates
mountPath: /certs
- name: empty-dir
mountPath: /tmp
subPath: certs
{{- if .Values.master.containerSecurityContext.enabled }}
securityContext: {{- include "common.compatibility.renderSecurityContext" (dict "secContext" .Values.master.containerSecurityContext "context" $) | nindent 12 }}
{{- end }}
{{- if .Values.copyTlsCerts.resources }}
resources: {{- toYaml .Values.copyTlsCerts.resources | nindent 12 }}
{{- else if ne .Values.copyTlsCerts.resourcesPreset "none" }}
resources: {{- include "common.resources.preset" (dict "type" .Values.copyTlsCerts.resourcesPreset) | nindent 12 }}
{{- end }}
{{- end }}
{{- if and .Values.volumePermissions.enabled .Values.master.persistence.enabled .Values.enableDefaultInitContainers }}
- name: volume-permissions
image: {{ include "elasticsearch.volumePermissions.image" . }}
@ -333,7 +367,6 @@ spec:
{{- if .Values.security.enabled }}
- name: elasticsearch-certificates
mountPath: /opt/bitnami/elasticsearch/config/certs
readOnly: true
{{- end }}
{{- if .Values.initScripts }}
- name: custom-init-scripts

View File

@ -2729,6 +2729,55 @@ sysctlImage:
##
resources: {}
## copy-tls-certificates init container definition
##
copyTlsCerts:
## @param copyTlsCerts.image.registry [default: REGISTRY_NAME] Copy TLS certificates image registry
## @param copyTlsCerts.image.repository [default: REPOSITORY_NAME/os-shell] Copy TLS certificates image repository
## @skip copyTlsCerts.image.tag Copy TLS certificates image tag
## @param copyTlsCerts.image.digest Copy TLS certificates image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag
## @param copyTlsCerts.image.pullPolicy Copy TLS certificates image pull policy
## @param copyTlsCerts.image.pullSecrets Copy TLS certificates image pull secrets
##
image:
registry: docker.io
repository: bitnami/os-shell
tag: 12-debian-12-r47
digest: ""
## Specify a imagePullPolicy
## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images
##
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.
## Secrets must be manually created in the namespace.
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
## e.g:
## pullSecrets:
## - myRegistryKeySecretName
##
pullSecrets: []
## Init container' resource requests and limits
## ref: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/
## We usually recommend not to specify default resources and to leave this as a conscious
## choice for the user. This also increases chances charts run on environments with little
## resources, such as Minikube. If you do want to specify resources, uncomment the following
## lines, adjust them as necessary, and remove the curly braces after 'resources:'.
## @param copyTlsCerts.resourcesPreset Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if copyTlsCerts.resources is set (copyTlsCerts.resources is recommended for production).
## More information: https://github.com/bitnami/charts/blob/main/bitnami/common/templates/_resources.tpl#L15
##
resourcesPreset: "nano"
## @param copyTlsCerts.resources Set container requests and limits for different resources like CPU or memory (essential for production workloads)
## Example:
## resources:
## requests:
## cpu: 2
## memory: 512Mi
## limits:
## cpu: 3
## memory: 1024Mi
##
resources: {}
## @section Kibana Parameters
## Bundled Kibana parameters

View File

@ -1,12 +1,8 @@
# Changelog
## 23.0.26 (2025-07-11)
## 23.0.25 (2025-07-04)
* [bitnami/ghost] :zap: :arrow_up: Update dependency references ([#35024](https://github.com/bitnami/charts/pull/35024))
## <small>23.0.25 (2025-07-04)</small>
* [bitnami/ghost] :zap: :arrow_up: Update dependency references (#34808) ([67bba4a](https://github.com/bitnami/charts/commit/67bba4ab0d7603f7fc2f309fbd9beff41c4f146e)), closes [#34808](https://github.com/bitnami/charts/issues/34808)
* [bitnami/ghost] :zap: :arrow_up: Update dependency references ([#34808](https://github.com/bitnami/charts/pull/34808))
## <small>23.0.24 (2025-07-04)</small>

View File

@ -5,13 +5,13 @@ annotations:
category: CMS
images: |
- name: ghost
image: docker.io/bitnami/ghost:5.129.2-debian-12-r0
image: docker.io/bitnami/ghost:5.129.1-debian-12-r1
- name: os-shell
image: docker.io/bitnami/os-shell:12-debian-12-r47
licenses: Apache-2.0
tanzuCategory: application
apiVersion: v2
appVersion: 5.129.2
appVersion: 5.129.1
dependencies:
- condition: mysql.enabled
name: mysql
@ -43,4 +43,4 @@ maintainers:
name: ghost
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/ghost
version: 23.0.26
version: 23.0.25

View File

@ -87,7 +87,7 @@ diagnosticMode:
image:
registry: docker.io
repository: bitnami/ghost
tag: 5.129.2-debian-12-r0
tag: 5.129.1-debian-12-r1
digest: ""
## Specify a imagePullPolicy
## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images

View File

@ -1,12 +1,8 @@
# Changelog
## 5.0.5 (2025-07-11)
## 5.0.4 (2025-07-08)
* [bitnami/grafana-loki] :zap: :arrow_up: Update dependency references ([#35019](https://github.com/bitnami/charts/pull/35019))
## <small>5.0.4 (2025-07-09)</small>
* [bitnami/grafana-loki] :zap: :arrow_up: Update dependency references (#34898) ([3999e3d](https://github.com/bitnami/charts/commit/3999e3dce59d7774f7cfb5640ec75f4947d1fa2f)), closes [#34898](https://github.com/bitnami/charts/issues/34898)
* [bitnami/grafana-loki] :zap: :arrow_up: Update dependency references ([#34898](https://github.com/bitnami/charts/pull/34898))
## <small>5.0.3 (2025-06-30)</small>

View File

@ -5,7 +5,7 @@ annotations:
category: Infrastructure
images: |
- name: grafana-loki
image: docker.io/bitnami/grafana-loki:3.5.2-debian-12-r0
image: docker.io/bitnami/grafana-loki:3.5.1-debian-12-r4
- name: nginx
image: docker.io/bitnami/nginx:1.29.0-debian-12-r2
- name: os-shell
@ -13,7 +13,7 @@ annotations:
licenses: Apache-2.0
tanzuCategory: application
apiVersion: v2
appVersion: 3.5.2
appVersion: 3.5.1
dependencies:
- alias: grafanaalloy
condition: grafanaalloy.enabled
@ -61,4 +61,4 @@ maintainers:
name: grafana-loki
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/grafana-loki
version: 5.0.5
version: 5.0.4

View File

@ -89,7 +89,7 @@ loki:
image:
registry: docker.io
repository: bitnami/grafana-loki
tag: 3.5.2-debian-12-r0
tag: 3.5.1-debian-12-r4
digest: ""
## Specify a imagePullPolicy
## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images

View File

@ -1,12 +1,8 @@
# Changelog
## 2.0.23 (2025-07-11)
## 2.0.22 (2025-07-11)
* [bitnami/nessie] :zap: :arrow_up: Update dependency references ([#35021](https://github.com/bitnami/charts/pull/35021))
## <small>2.0.22 (2025-07-11)</small>
* [bitnami/nessie] :zap: :arrow_up: Update dependency references (#35009) ([2147691](https://github.com/bitnami/charts/commit/2147691cc49104ed2a45c1c81377da4637695d94)), closes [#35009](https://github.com/bitnami/charts/issues/35009)
* [bitnami/nessie] :zap: :arrow_up: Update dependency references ([#35009](https://github.com/bitnami/charts/pull/35009))
## <small>2.0.21 (2025-07-01)</small>

View File

@ -5,7 +5,7 @@ annotations:
category: Database
images: |
- name: nessie
image: docker.io/bitnami/nessie:0.104.3-debian-12-r0
image: docker.io/bitnami/nessie:0.104.2-debian-12-r0
- name: os-shell
image: docker.io/bitnami/os-shell:12-debian-12-r47
- name: postgresql
@ -13,7 +13,7 @@ annotations:
licenses: Apache-2.0
tanzuCategory: application
apiVersion: v2
appVersion: 0.104.3
appVersion: 0.104.2
dependencies:
- condition: postgresql.enabled
name: postgresql
@ -40,4 +40,4 @@ sources:
- https://github.com/bitnami/charts/tree/main/bitnami/nessie
- https://github.com/bitnami/containers/tree/main/bitnami/nessie
- https://github.com/nessie/nessie
version: 2.0.23
version: 2.0.22

View File

@ -124,7 +124,7 @@ javaOpts: ""
image:
registry: docker.io
repository: bitnami/nessie
tag: 0.104.3-debian-12-r0
tag: 0.104.2-debian-12-r0
digest: ""
## Specify a imagePullPolicy
## ref: http://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images

View File

@ -1,12 +1,8 @@
# Changelog
## 21.2.10 (2025-07-11)
## 21.2.9 (2025-07-09)
* [bitnami/redis] Fix external service annotations ignored #33270 ([#33776](https://github.com/bitnami/charts/pull/33776))
## <small>21.2.9 (2025-07-09)</small>
* [bitnami/redis] :zap: :arrow_up: Update dependency references (#34949) ([85fa246](https://github.com/bitnami/charts/commit/85fa246dbb8b1e269f4819da33f178d54f0c3f79)), closes [#34949](https://github.com/bitnami/charts/issues/34949)
* [bitnami/redis] :zap: :arrow_up: Update dependency references ([#34949](https://github.com/bitnami/charts/pull/34949))
## <small>21.2.8 (2025-07-09)</small>

View File

@ -39,4 +39,4 @@ maintainers:
name: redis
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/redis
version: 21.2.10
version: 21.2.9

View File

@ -19,9 +19,7 @@ metadata:
labels: {{- include "common.labels.standard" ( dict "customLabels" $root.Values.commonLabels "context" $ ) | nindent 4 }}
pod: {{ $targetPod }}
{{- if or
(ne $root.Values.sentinel.externalAccess.service.loadBalancerIPAnnotaion "")
$root.Values.sentinel.externalAccess.service.annotations
$root.Values.sentinel.commonAnnotations }}
(ne $root.Values.sentinel.externalAccess.service.loadBalancerIPAnnotaion "") }}
{{- $loadBalancerIPAnnotaion := "" }}
{{- if ne $root.Values.sentinel.externalAccess.service.loadBalancerIPAnnotaion ""}}
{{- $loadBalancerIPAnnotaion = printf

View File

@ -1,12 +1,8 @@
# Changelog
## 8.1.11 (2025-07-11)
## 8.1.10 (2025-07-10)
* [bitnami/sonarqube] Substitute SONAR_CE_JAVAADDITIONALOPTS by SONARQUBE_CE_JAVA_ADD_OPTS ([#34665](https://github.com/bitnami/charts/pull/34665))
## <small>8.1.10 (2025-07-10)</small>
* [bitnami/sonarqube] :zap: :arrow_up: Update dependency references (#34824) ([210c1ae](https://github.com/bitnami/charts/commit/210c1ae61078fcffa7762656c17a003b49208076)), closes [#34824](https://github.com/bitnami/charts/issues/34824)
* [bitnami/sonarqube] :zap: :arrow_up: Update dependency references ([#34824](https://github.com/bitnami/charts/pull/34824))
## <small>8.1.9 (2025-06-10)</small>

View File

@ -40,4 +40,4 @@ maintainers:
name: sonarqube
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/sonarqube
version: 8.1.11
version: 8.1.10

View File

@ -297,7 +297,7 @@ As an alternative, this chart supports using an initContainer to change the owne
| `minHeapSize` | Minimum heap size for SonarQube(TM) | `1024m` |
| `maxHeapSize` | Maximum heap size for SonarQube(TM) | `2048m` |
| `jvmOpts` | Values to add to SONARQUBE_WEB_JAVA_ADD_OPTS | `""` |
| `jvmCeOpts` | Values to add to SONARQUBE_CE_JAVA_ADD_OPTS | `""` |
| `jvmCeOpts` | Values to add to SONAR_CE_JAVAADDITIONALOPTS | `""` |
| `startTimeout` | Timeout for the application to start in seconds | `300` |
| `extraProperties` | List of extra properties to be set in the sonar.properties file (key=value format) | `[]` |
| `sonarqubeSkipInstall` | Skip wizard installation | `false` |

View File

@ -364,7 +364,7 @@ spec:
{{- end }}
- name: SONARQUBE_WEB_JAVA_ADD_OPTS
value: {{ template "sonarqube.jvmOpts" . }}
- name: SONARQUBE_CE_JAVA_ADD_OPTS
- name: SONAR_CE_JAVAADDITIONALOPTS
value: {{ template "sonarqube.jvmCEOpts" . }}
{{- if .Values.extraEnvVars }}
{{- include "common.tplvalues.render" (dict "value" .Values.extraEnvVars "context" $) | nindent 12 }}

View File

@ -139,7 +139,7 @@ maxHeapSize: 2048m
## @param jvmOpts Values to add to SONARQUBE_WEB_JAVA_ADD_OPTS
##
jvmOpts: ""
## @param jvmCeOpts Values to add to SONARQUBE_CE_JAVA_ADD_OPTS
## @param jvmCeOpts Values to add to SONAR_CE_JAVAADDITIONALOPTS
##
jvmCeOpts: ""
## @param startTimeout Timeout for the application to start in seconds
@ -707,7 +707,7 @@ ingress:
## @section SonarQube caCerts provisioning parameters
##
## Provide a secret containing one or more certificate files in the keys that will be added to cacerts
## The cacerts file will be set via SONARQUBE_WEB_JAVA_ADD_OPTS and SONARQUBE_CE_JAVA_ADD_OPTS
## The cacerts file will be set via SONARQUBE_WEB_JAVA_ADD_OPTS and SONAR_CE_JAVAADDITIONALOPTS
caCerts:
## @param caCerts.enabled Enable the use of caCerts
##