Skip to content

Commit 5eb0682

Browse files
authored
feat: install using helm charts (#9)
* install using helm charts * SKIP UPGRADE TEST
1 parent dd3abc8 commit 5eb0682

32 files changed

+447
-491
lines changed

.secrets.baseline

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "go.sum|^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2025-01-08T20:11:33Z",
6+
"generated_at": "2025-01-24T16:49:18Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -82,7 +82,7 @@
8282
"hashed_secret": "2254481e1661d8f017a712b0d1ad9a14fd9460a3",
8383
"is_secret": false,
8484
"is_verified": false,
85-
"line_number": 138,
85+
"line_number": 134,
8686
"type": "Secret Keyword",
8787
"verified_result": null
8888
}

.trivyignore

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
2+
KSV014 # "Use read-only filesystem for containers where possible"
3+
4+
KSV020 # "Force the container to run with user ID > 10000"
5+
6+
KSV021 # "Force the container to run with group ID > 10000"
7+
8+
KSV111 # "Cluster admin role only used where required"
9+
10+
KSV001 # "A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node."
11+
12+
KSV003 # "The container should drop all default capabilities and add only those that are needed for its execution."
13+
14+
KSV012 # "Force the running image to run as a non-root user to ensure least privileges."
15+
16+
KSV013 # "It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version."
17+
18+
KSV030 # "According to pod security standard 'Seccomp', the RuntimeDefault seccomp profile must be required, or allow specific additional profiles."
19+
20+
KSV104 # "A program inside the container can bypass Seccomp protection policies."
21+
22+
KSV105 # "Containers should be forbidden from running with a root UID."
23+
24+
KSV106 # "Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability."

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Update status and "latest release" badges:
1313
[![semantic-release](https://img.shields.io/badge/%20%20%F0%9F%93%A6%F0%9F%9A%80-semantic--release-e10079.svg)](https://github.com/semantic-release/semantic-release)
1414

1515

16-
This repository contains the following deployment an Red Hat OpenShift cluster:
16+
This repository contains the following deployment on an Red Hat OpenShift cluster:
1717
- [IBM Cloud Pak for Data](./solutions/deploy)
1818

1919
**NB:** These solutions are not intended to be called by one or more other modules since they contain a provider configurations, meaning they are not compatible with the `for_each`, `count`, and `depends_on` arguments. For more information see [Providers Within Modules](https://developer.hashicorp.com/terraform/language/modules/develop/providers)
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
# Patterns to ignore when building packages.
2+
# This supports shell glob matching, relative path matching, and
3+
# negation (prefixed with !). Only one pattern per line.
4+
.DS_Store
5+
# Common VCS dirs
6+
.git/
7+
.gitignore
8+
.bzr/
9+
.bzrignore
10+
.hg/
11+
.hgignore
12+
.svn/
13+
# Common backup files
14+
*.swp
15+
*.bak
16+
*.tmp
17+
*.orig
18+
*~
19+
# Various IDEs
20+
.project
21+
.idea/
22+
*.tmproj
23+
.vscode/
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
apiVersion: v2
2+
name: cloud-pak-deployer
3+
description: A Helm chart for Kubernetes
4+
5+
# A chart can be either an 'application' or a 'library' chart.
6+
#
7+
# Application charts are a collection of templates that can be packaged into versioned archives
8+
# to be deployed.
9+
#
10+
# Library charts provide useful utilities or functions for the chart developer. They're included as
11+
# a dependency of application charts to inject those utilities and functions into the rendering
12+
# pipeline. Library charts do not define any templates and therefore cannot be deployed.
13+
type: application
14+
15+
# This is the chart version. This version number should be incremented each time you make changes
16+
# to the chart and its templates, including the app version.
17+
# Versions are expected to follow Semantic Versioning (https://semver.org/)
18+
version: 0.0.1
19+
20+
# This is the version number of the application being deployed. This version number should be
21+
# incremented each time you make changes to the application. Versions are not expected to
22+
# follow Semantic Versioning. They should reflect the version the application is using.
23+
# It is recommended to use it with quotes.
24+
appVersion: "1.0.0"
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
apiVersion: rbac.authorization.k8s.io/v1
2+
kind: ClusterRoleBinding
3+
metadata:
4+
name: {{ .Values.deployer.prefix }}-sa-rbac
5+
roleRef:
6+
apiGroup: rbac.authorization.k8s.io
7+
kind: ClusterRole
8+
name: {{ .Values.clusterRoleBinding.roleRefName }}
9+
subjects:
10+
- kind: ServiceAccount
11+
name: {{ .Values.deployer.prefix }}-sa
12+
namespace: {{ .Values.namespace }}
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
apiVersion: v1
2+
data:
3+
cpd-config.yaml: |
4+
{{ .Values.deployer.configuration | indent 4 }}
5+
kind: ConfigMap
6+
metadata:
7+
name: {{ .Values.deployer.prefix }}-config
8+
namespace: {{ .Values.namespace }}
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
apiVersion: v1
2+
kind: Secret
3+
data:
4+
cp-entitlement-key: {{ .Values.deployer.entitlement_key | b64enc }}
5+
metadata:
6+
name: cloud-pak-entitlement-key
7+
namespace: {{ .Values.namespace }}
8+
type: Opaque
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
{{- if eq (default .Values.createImagePullSecret false) true }}
2+
apiVersion: v1
3+
kind: Secret
4+
metadata:
5+
name: cpd-docker-cfg
6+
namespace: {{ .Values.namespace }}
7+
type: kubernetes.io/dockerconfigjson
8+
data:
9+
.dockerconfigjson: {{ template "imagePullSecret" . }}
10+
{{- end }}
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
{{- define "imagePullSecret" }}
2+
{{- with .Values.imageCredentials }}
3+
{{- printf "{\"auths\":{\"%s\":{\"username\":\"%s\",\"password\":\"%s\",\"email\":\"%s\",\"auth\":\"%s\"}}}" .registry .username .password .email (printf "%s:%s" .username .password | b64enc) | b64enc }}
4+
{{- end }}
5+
{{- end }}

0 commit comments

Comments
 (0)