Skip to content

Commit 227dce1

Browse files
committedJul 28, 2023
feat: update helmchart using new extension discovery annotation and improved tls configuration
1 parent 841bb1d commit 227dce1

9 files changed

+88
-50
lines changed
 
+3-3
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
dependencies:
22
- name: extensionlib
33
repository: https://steadybit.github.io/helm-charts
4-
version: 1.2.0
5-
digest: sha256:8797b2f7c03291e3115e76a62b43d27827181c28606b49e2d3aeffda3f287bb0
6-
generated: "2023-04-26T14:10:43.195293+02:00"
4+
version: 1.4.0
5+
digest: sha256:c3931aae14c06eac0b12f52e593eb270c729c263cdea9264d3f9b099c2be72ab
6+
generated: "2023-07-28T17:27:37.332742+02:00"

‎charts/steadybit-extension-http/Chart.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
apiVersion: v2
22
name: steadybit-extension-http
33
description: Steadybit action implementation to check HTTP endpoints.
4-
version: 1.0.6
4+
version: 1.0.7
55
appVersion: latest
66
home: https://www.steadybit.com/
77
icon: https://steadybit-website-assets.s3.amazonaws.com/logo-symbol-transparent.png
@@ -21,5 +21,5 @@ annotations:
2121
url: https://hub.steadybit.com
2222
dependencies:
2323
- name: extensionlib
24-
version: 1.2.0
24+
version: ^1.4.0
2525
repository: https://steadybit.github.io/helm-charts
Binary file not shown.
Binary file not shown.

‎charts/steadybit-extension-http/tests/__snapshot__/deployment_test.yaml.snap

+6-20
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ manifest should match snapshot with extra env vars:
114114
runAsUser: 10000
115115
volumeMounts: null
116116
volumes: null
117-
manifest should match snapshot with mutual TLS:
117+
manifest should match snapshot with mutual TLS using containerPaths:
118118
1: |
119119
apiVersion: apps/v1
120120
kind: Deployment
@@ -139,11 +139,11 @@ manifest should match snapshot with mutual TLS:
139139
- name: STEADYBIT_LOG_FORMAT
140140
value: text
141141
- name: STEADYBIT_EXTENSION_TLS_SERVER_CERT
142-
value: /etc/extension/certificates/server-cert/tls.crt
142+
value: /etc/tls/server.crt
143143
- name: STEADYBIT_EXTENSION_TLS_SERVER_KEY
144-
value: /etc/extension/certificates/server-cert/tls.key
144+
value: /etc/tls/server.key
145145
- name: STEADYBIT_EXTENSION_TLS_CLIENT_CAS
146-
value: /etc/extension/certificates/client-cert-a/tls.crt,/etc/extension/certificates/client-cert-a/tls.crt
146+
value: /etc/tls/ca.crt,/etc/tls/ca2.crt
147147
image: ghcr.io/steadybit/extension-http:latest
148148
imagePullPolicy: Always
149149
livenessProbe:
@@ -167,22 +167,8 @@ manifest should match snapshot with mutual TLS:
167167
runAsGroup: 10000
168168
runAsNonRoot: true
169169
runAsUser: 10000
170-
volumeMounts:
171-
- mountPath: /etc/extension/certificates/client-cert-a
172-
name: certificate-client-cert-a
173-
readOnly: true
174-
- mountPath: /etc/extension/certificates/server-cert
175-
name: certificate-server-cert
176-
readOnly: true
177-
volumes:
178-
- name: certificate-client-cert-a
179-
secret:
180-
optional: false
181-
secretName: client-cert-a
182-
- name: certificate-server-cert
183-
secret:
184-
optional: false
185-
secretName: server-cert
170+
volumeMounts: null
171+
volumes: null
186172
manifest should match snapshot without TLS:
187173
1: |
188174
apiVersion: apps/v1

‎charts/steadybit-extension-http/tests/__snapshot__/service_test.yaml.snap

+23-19
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ manifest should match snapshot with TLS:
44
kind: Service
55
metadata:
66
annotations:
7-
steadybit.com/extension-auto-discovery: "{\n \"extensions\": [\n {\n \"port\": 8085,\n \"types\": [\"ACTION\"],\n \"tls\": {\n \"server\": {\n \"extraCertsFile\": \"server-cert/tls.crt\"\n }\n \n }\n }\n ]\n}\n"
7+
steadybit.com/extension-auto-discovery: |
8+
{"extensions":[{"port":8085,"protocol":"https","types":["ACTION"]}]}
89
labels: null
910
name: RELEASE-NAME-steadybit-extension-http
1011
namespace: NAMESPACE
@@ -22,23 +23,25 @@ manifest should match snapshot with mutual TLS:
2223
metadata:
2324
annotations:
2425
steadybit.com/extension-auto-discovery: |
25-
{
26-
"extensions": [
27-
{
28-
"port": 8085,
29-
"types": ["ACTION"],
30-
"tls": {
31-
"server": {
32-
"extraCertsFile": "server-cert/tls.crt"
33-
},
34-
"client": {
35-
"certChainFile": "client-cert-a/tls.crt",
36-
"certKeyFile": "client-cert-a/tls.key"
37-
}
38-
}
39-
}
40-
]
41-
}
26+
{"extensions":[{"port":8085,"protocol":"https","types":["ACTION"]}]}
27+
labels: null
28+
name: RELEASE-NAME-steadybit-extension-http
29+
namespace: NAMESPACE
30+
spec:
31+
ports:
32+
- port: 8085
33+
protocol: TCP
34+
targetPort: 8085
35+
selector:
36+
app.kubernetes.io/name: steadybit-extension-http
37+
manifest should match snapshot with mutual TLS using containerPaths:
38+
1: |
39+
apiVersion: v1
40+
kind: Service
41+
metadata:
42+
annotations:
43+
steadybit.com/extension-auto-discovery: |
44+
{"extensions":[{"port":8085,"protocol":"https","types":["ACTION"]}]}
4245
labels: null
4346
name: RELEASE-NAME-steadybit-extension-http
4447
namespace: NAMESPACE
@@ -55,7 +58,8 @@ manifest should match snapshot without TLS:
5558
kind: Service
5659
metadata:
5760
annotations:
58-
steadybit.com/extension-auto-discovery: "{\n \"extensions\": [\n {\n \"port\": 8085,\n \"types\": [\"ACTION\"],\n \"tls\": {\n \n }\n }\n ]\n}\n"
61+
steadybit.com/extension-auto-discovery: |
62+
{"extensions":[{"port":8085,"protocol":"http","types":["ACTION"]}]}
5963
labels: null
6064
name: RELEASE-NAME-steadybit-extension-http
6165
namespace: NAMESPACE

‎charts/steadybit-extension-http/tests/deployment_test.yaml

+25
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,31 @@ tests:
2323
fromSecrets:
2424
- client-cert-a
2525
- client-cert-a
26+
- it: manifest should match snapshot with mutual TLS using containerPaths
27+
set:
28+
tls:
29+
server:
30+
certificate:
31+
path: /etc/tls/server.crt
32+
key:
33+
path: /etc/tls/server.key
34+
client:
35+
certificates:
36+
paths:
37+
- /etc/tls/ca.crt
38+
- /etc/tls/ca2.crt
39+
asserts:
40+
- matchSnapshot: {}
41+
- it: manifest should match snapshot with extra env vars
42+
set:
43+
extraEnv:
44+
- name: FOO
45+
value: "bar"
46+
extraEnvFrom:
47+
- configMapRef:
48+
name: env-configmap
49+
- secretRef:
50+
name: env-secrets
2651
asserts:
2752
- matchSnapshot: {}
2853
- it: manifest should match snapshot with extra env vars

‎charts/steadybit-extension-http/tests/service_test.yaml

+17-2
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ templates:
33
tests:
44
- it: manifest should match snapshot without TLS
55
asserts:
6-
- matchSnapshot: { }
6+
- matchSnapshot: {}
77
- it: manifest should match snapshot with TLS
88
set:
99
tls:
1010
server:
1111
certificate:
1212
fromSecret: server-cert
1313
asserts:
14-
- matchSnapshot: { }
14+
- matchSnapshot: {}
1515
- it: manifest should match snapshot with mutual TLS
1616
set:
1717
tls:
@@ -25,3 +25,18 @@ tests:
2525
- client-cert-a
2626
asserts:
2727
- matchSnapshot: {}
28+
- it: manifest should match snapshot with mutual TLS using containerPaths
29+
set:
30+
tls:
31+
server:
32+
certificate:
33+
path: /etc/tls/server.crt
34+
key:
35+
path: /etc/tls/server.key
36+
client:
37+
certificates:
38+
paths:
39+
- /etc/tls/ca.crt
40+
- /etc/tls/ca2.crt
41+
asserts:
42+
- matchSnapshot: {}

‎charts/steadybit-extension-http/values.yaml

+12-4
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,22 @@ image:
1313
tls:
1414
server:
1515
certificate:
16-
# tls.server.certificate.fromSecret -- The name of the secret containing the TLS certificate for the extension. The extension will then create
17-
# an HTTPS server instead of an HTTP server.
16+
# tls.server.certificate.fromSecret -- The name of the secret containing the TLS certificate for the extension.
17+
# The extension will then create an HTTPS server instead of an HTTP server.
1818
fromSecret: null
19+
# tls.server.certificate.path --Path to the TLS certificate for the extension.
20+
path: null
21+
key:
22+
# tls.server.certificate.key-path --Path to the key for the TLS certificate for the extension.
23+
path: null
1924
client:
2025
certificates:
21-
# tls.client.certificates.fromSecrets -- List of secret names containing TLS certificates for the extension to trust. The extension will require
22-
# clients to authenticate using one of these certificates. In essence, this will enable mutual TLS.
26+
# tls.client.certificates.fromSecrets -- List of secret names containing TLS certificates for the extension to trust.
27+
# The extension will require clients to authenticate using one of these certificates. In essence, this will enable mutual TLS.
2328
fromSecrets: []
29+
# tls.client.certificates.paths -- List paths containing TLS certificates for the extension to trust.
30+
# The extension will require clients to authenticate using one of these certificates. In essence, this will enable mutual TLS.
31+
paths: []
2432

2533
logging:
2634
# logging.level -- The active log level. Valid values are: TRACE, DEBUG, INFO, WARN, ERROR

0 commit comments

Comments
 (0)
Please sign in to comment.