Skip to content

Commit dd73c95

Browse files
committed
bump to 0.29.0
1 parent 638e17b commit dd73c95

File tree

2 files changed

+24
-3
lines changed

2 files changed

+24
-3
lines changed

helm/wireguard/Chart.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ apiVersion: v2
22
name: wireguard
33
description: A Helm chart for managing a wireguard vpn in kubernetes
44
type: application
5-
version: 0.28.0
5+
version: 0.29.0
66
appVersion: "0.0.0"
77
maintainers:
88
- name: bryopsida

helm/wireguard/README.md

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# wireguard
22

3-
![Version: 0.28.0](https://img.shields.io/badge/Version-0.28.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0](https://img.shields.io/badge/AppVersion-0.0.0-informational?style=flat-square)
3+
![Version: 0.29.0](https://img.shields.io/badge/Version-0.29.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.0](https://img.shields.io/badge/AppVersion-0.0.0-informational?style=flat-square)
44

55
A Helm chart for managing a wireguard vpn in kubernetes
66

@@ -38,7 +38,7 @@ A Helm chart for managing a wireguard vpn in kubernetes
3838
| healthSideCar.image.pullPolicy | string | `"Always"` | Pull Policy always to avoid cached rolling tags, if you change this you should use a non rolling tag |
3939
| healthSideCar.image.repository | string | `"ghcr.io/bryopsida/http-healthcheck-sidecar"` | Override repo if you prefer to use your own image |
4040
| healthSideCar.image.tag | string | `"main"` | Rolling tag used by default to take patches automatically |
41-
| healthSideCar.resources | object | `{"limits":{"cpu":"100m","memory":"256Mi"},"requests":{"cpu":"100m","memory":"256Mi"}}` | set resource constraints, set to nil to remove |
41+
| healthSideCar.resources | object | `{"limits":{"cpu":"100m","ephemeral-storage":"256Mi","memory":"256Mi"},"requests":{"cpu":"100m","ephemeral-storage":"8Mi","memory":"256Mi"}}` | set resource constraints, set to nil to remove |
4242
| healthSideCar.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsGroup":10001,"runAsNonRoot":true,"runAsUser":10001,"seccompProfile":{"type":"RuntimeDefault"}}` | Secure settings by default, can be overriden to reduce security posture if needed |
4343
| healthSideCar.service.enabled | bool | `true` | Toggle to enable the service, if the pod is a daemonset healthSideCar.useHostPort can be used instead |
4444
| healthSideCar.service.nodePort | int | `31313` | The port for the service exposed on each node |
@@ -51,6 +51,12 @@ A Helm chart for managing a wireguard vpn in kubernetes
5151
| image.tag | string | `"main"` | |
5252
| initContainer.image.repository | string | `"busybox"` | |
5353
| initContainer.image.tag | string | `"latest"` | |
54+
| initContainer.resources.limits.cpu | string | `"100m"` | |
55+
| initContainer.resources.limits.ephemeral-storage | string | `"64Mi"` | |
56+
| initContainer.resources.limits.memory | string | `"64Mi"` | |
57+
| initContainer.resources.requests.cpu | string | `"100m"` | |
58+
| initContainer.resources.requests.ephemeral-storage | string | `"8Mi"` | |
59+
| initContainer.resources.requests.memory | string | `"64Mi"` | |
5460
| keygenJob.command | list | `["/job/entry-point.sh"]` | Specify the script to run to generate the private key |
5561
| keygenJob.containerSecurityContext.allowPrivilegeEscalation | bool | `false` | |
5662
| keygenJob.containerSecurityContext.privileged | bool | `false` | |
@@ -63,9 +69,16 @@ A Helm chart for managing a wireguard vpn in kubernetes
6369
| keygenJob.image.pullPolicy | string | `"Always"` | |
6470
| keygenJob.image.repository | string | `"ghcr.io/curium-rocks/wg-kubectl"` | |
6571
| keygenJob.image.tag | string | `"latest"` | |
72+
| keygenJob.podAnnotations | object | `{}` | |
6673
| keygenJob.podSecurityContext.fsGroup | int | `1000` | |
6774
| keygenJob.podSecurityContext.fsGroupChangePolicy | string | `"Always"` | |
6875
| keygenJob.podSecurityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
76+
| keygenJob.resources.limits.cpu | string | `"100m"` | |
77+
| keygenJob.resources.limits.ephemeral-storage | string | `"128Mi"` | |
78+
| keygenJob.resources.limits.memory | string | `"256Mi"` | |
79+
| keygenJob.resources.requests.cpu | string | `"100m"` | |
80+
| keygenJob.resources.requests.ephemeral-storage | string | `"8Mi"` | |
81+
| keygenJob.resources.requests.memory | string | `"256Mi"` | |
6982
| keygenJob.useWireguardManager | bool | `false` | when enabled, uses a image with go bindings for k8s and wg to create the secret if it does not exist, on re-runs it it leaves the existing secret in place and exits succesfully |
7083
| keygenJob.wireguardMgrImage | object | `{"pullPolicy":"Always","repository":"ghcr.io/bryopsida/k8s-wireguard-mgr","tag":"main"}` | When useWireguardManager is enabled this image is used instead of the kubectl image |
7184
| labels | object | `{}` | |
@@ -87,6 +100,12 @@ A Helm chart for managing a wireguard vpn in kubernetes
87100
| metrics.prometheusRule.groups | list | `[]` | Groups, containing the alert rules. Example: groups: - name: Wireguard rules: - alert: WireguardInstanceNotAvailable annotations: message: "Wireguard instance in namespace {{ `{{` }} $labels.namespace {{ `}}` }} has not been available for the last 5 minutes." expr: | absent(kube_pod_status_ready{namespace="{{ include "common.names.namespace" . }}", condition="true"} * on (pod) kube_pod_labels{pod=~"{{ include "common.names.fullname" . }}-\\d+", namespace="{{ include "common.names.namespace" . }}"}) != 0 for: 5m labels: severity: critical |
88101
| metrics.prometheusRule.labels | object | `{}` | Additional labels that can be used so PrometheusRule will be discovered by Prometheus |
89102
| metrics.prometheusRule.namespace | string | `""` | Namespace of the ServiceMonitor. If empty, current namespace is used |
103+
| metrics.resources.limits.cpu | string | `"100m"` | |
104+
| metrics.resources.limits.ephemeral-storage | string | `"128Mi"` | |
105+
| metrics.resources.limits.memory | string | `"256Mi"` | |
106+
| metrics.resources.requests.cpu | string | `"100m"` | |
107+
| metrics.resources.requests.ephemeral-storage | string | `"8Mi"` | |
108+
| metrics.resources.requests.memory | string | `"256Mi"` | |
90109
| metrics.service.annotations | object | `{}` | Annotations for enabling prometheus to access the metrics endpoints |
91110
| metrics.service.labels | object | `{}` | Additional service labels |
92111
| metrics.service.port | int | `9586` | Metrics service HTTP port |
@@ -107,8 +126,10 @@ A Helm chart for managing a wireguard vpn in kubernetes
107126
| podAnnotations | object | `{}` | |
108127
| replicaCount | int | `3` | |
109128
| resources.limits.cpu | string | `"100m"` | |
129+
| resources.limits.ephemeral-storage | string | `"128Mi"` | |
110130
| resources.limits.memory | string | `"256Mi"` | |
111131
| resources.requests.cpu | string | `"100m"` | |
132+
| resources.requests.ephemeral-storage | string | `"8Mi"` | |
112133
| resources.requests.memory | string | `"256Mi"` | |
113134
| runPodOnHostNetwork | bool | `false` | Run pod on host network |
114135
| runtimeClassName | string | `nil` | Override the default runtime class of the container, if not provided `runc` will most likely be used |

0 commit comments

Comments
 (0)