Skip to content

Commit e053386

Browse files
chore: release main
1 parent b7312b6 commit e053386

File tree

6 files changed

+148
-165
lines changed

6 files changed

+148
-165
lines changed

.release-please-manifest.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
{
2-
".": "0.39.0-rc.2"
2+
".": "0.39.0-rc.3"
33
}

CHANGELOG.md

Lines changed: 123 additions & 0 deletions
Large diffs are not rendered by default.

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Mac / Linux
7070
<!-- x-release-please-start-version -->
7171

7272
```console
73-
curl --silent --location "https://github.com/weaveworks/weave-gitops/releases/download/v0.39.0-rc.2/gitops-$(uname)-$(uname -m).tar.gz" | tar xz -C /tmp
73+
curl --silent --location "https://github.com/weaveworks/weave-gitops/releases/download/v0.39.0-rc.3/gitops-$(uname)-$(uname -m).tar.gz" | tar xz -C /tmp
7474
sudo mv /tmp/gitops /usr/local/bin
7575
gitops version
7676
```

charts/gitops-server/Chart.yaml

Lines changed: 2 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,6 @@
11
apiVersion: v2
22
name: weave-gitops
33
description: Weave Gitops is a set of tools and services to aid your interactions with Flux
4-
# A chart can be either an 'application' or a 'library' chart.
5-
#
6-
# Application charts are a collection of templates that can be packaged into versioned archives
7-
# to be deployed.
8-
#
9-
# Library charts provide useful utilities or functions for the chart developer. They're included as
10-
# a dependency of application charts to inject those utilities and functions into the rendering
11-
# pipeline. Library charts do not define any templates and therefore cannot be deployed.
124
type: application
13-
# This is the chart version. This version number should be incremented each time you make changes
14-
# to the chart and its templates, including the app version.
15-
# Versions are expected to follow Semantic Versioning (https://semver.org/)
16-
version: 0.39.0-rc.2 # x-release-please-version
17-
# This is the version number of the application being deployed. This version number should be
18-
# incremented each time you make changes to the application. Versions are not expected to
19-
# follow Semantic Versioning. They should reflect the version the application is using.
20-
# It is recommended to use it with quotes.
21-
appVersion: "v0.39.0-rc.2" # x-release-please-version
5+
version: 0.39.0-rc.3
6+
appVersion: 0.39.0-rc.3

charts/gitops-server/values.yaml

Lines changed: 20 additions & 145 deletions
Original file line numberDiff line numberDiff line change
@@ -1,108 +1,48 @@
1-
# Default values for chart.
2-
# This is a YAML-formatted file.
3-
# Declare variables to be passed into your templates.
4-
5-
# Note: paragraphs starting with `# --` will end up in our manual -
6-
# see https://github.com/norwoodj/helm-docs
71
replicaCount: 1
82
image:
9-
# FIXME check the app name
103
repository: ghcr.io/weaveworks/wego-app
114
pullPolicy: IfNotPresent
12-
# Overrides the image tag whose default is the chart appVersion.
13-
tag: "v0.39.0-rc.2" # x-release-please-version
5+
tag: 0.39.0-rc.3
146
imagePullSecrets: []
15-
nameOverride: ""
16-
fullnameOverride: ""
17-
# -- What log level to output. Valid levels are 'debug', 'info', 'warn' and 'error'
7+
nameOverride: ''
8+
fullnameOverride: ''
189
logLevel: info
19-
# -- Additional arguments to pass in to the gitops-server
2010
additionalArgs: []
21-
# Any other environment variables:
2211
envVars:
2312
- name: WEAVE_GITOPS_FEATURE_TENANCY
24-
value: "true"
13+
value: 'true'
2514
- name: WEAVE_GITOPS_FEATURE_CLUSTER
26-
value: "false"
27-
# -- Enable this feature flag if you want to expand Flux Runtime UI with other Weave GitOps components like Policy Agent or TF-Controller.
28-
# Ensure that Weave GitOps Deployment and CRDs have the label 'app.kubernetes.io/part-of=weave-gitops'. See https://docs.gitops.weaveworks.org/docs/open-source/getting-started/install-OSS for more info.
15+
value: 'false'
2916
- name: WEAVE_GITOPS_FEATURE_GITOPS_RUNTIME
30-
value: "false"
31-
32-
# -- Annotations to add to the deployment
17+
value: 'false'
3318
annotations: {}
34-
# Should the 'oidc-auth' secret be created. For a detailed
35-
# explanation of these attributes please see our documentation:
36-
# https://docs.gitops.weaveworks.org/docs/configuration/securing-access-to-the-dashboard/#login-via-an-oidc-provider
3719
oidcSecret:
3820
create: false
39-
# clientID:
40-
# clientSecret:
41-
# issuerURL:
42-
# redirectURL:
43-
# -- If non empty, additional keys can be added to the OIDC secret
4421
additionalKeys: {}
45-
# additionalKeys:
46-
# claimUsername: "email"
47-
# claimGroups: "groups"
48-
# customScopes: "openid,offline_access,email,groups"
4922
serviceAccount:
50-
# -- Specifies whether a service account should be created
5123
create: true
52-
# -- Annotations to add to the service account
5324
annotations: {}
54-
# -- The name of the service account to use.
55-
# If not set and create is true, a name is generated using the fullname template
56-
name: ""
25+
name: ''
5726
rbac:
58-
# -- Specifies whether the clusterRole & binding to the service account should be created
5927
create: true
60-
# -- If non-empty, this limits the resources that the service
61-
# account can impersonate. This applies to both users and groups, e.g.
62-
# `['[email protected]', '[email protected]', 'operations']`
6328
impersonationResourceNames: []
64-
# -- Limit the type of principal that can be impersonated
65-
impersonationResources: ["users", "groups"]
66-
# -- Specifies whether the service account should have cluster-wide view access to secrets.
67-
# If enabled, the secrets permitted to read can be limited by name with `viewSecretsResourceNames`.
29+
impersonationResources:
30+
- users
31+
- groups
6832
viewSecretsEnabled: true
69-
# -- If non-empty, this limits the secrets that can be accessed by
70-
# the service account to the specified ones, e.g. `['weave-gitops-enterprise-credentials']`
71-
viewSecretsResourceNames: ["cluster-user-auth", "oidc-auth"]
72-
# -- If non-empty, these additional rules will be appended to the RBAC role and the cluster role.
73-
# for example,
74-
# additionalRules:
75-
# - apiGroups: ["infra.contrib.fluxcd.io"]
76-
# resources: ["terraforms"]
77-
# verbs: [ "get", "list", "patch" ]
33+
viewSecretsResourceNames:
34+
- cluster-user-auth
35+
- oidc-auth
7836
additionalRules: []
7937
adminUser:
80-
# -- Whether the local admin user should be created.
81-
# If you use this make sure you add it to `rbac.impersonationResourceNames`.
8238
create: false
83-
# -- Specifies whether the clusterRole & binding to the admin user should be created.
84-
# Will be created only if `adminUser.create` is enabled. Without this,
85-
# the adminUser will only be able to see resources in the target namespace.
8639
createClusterRole: true
87-
# -- Whether we should create the secret for the local
88-
# adminUser. Will be created only if `adminUser.create` is
89-
# enabled. Without this, we'll still set up the roles and
90-
# permissions, but the secret with username and password has to be
91-
# provided separately.
9240
createSecret: true
93-
# -- Set username for local admin user, this should match the value in the secret `cluster-user-auth`
94-
# which can be created with `adminUser.createSecret`. Requires `adminUser.create`.
9541
username: gitops-test-user
96-
# -- (string) Set the password for local admin user. Requires `adminUser.create` and `adminUser.createSecret`
97-
# This needs to have been hashed using bcrypt.
98-
# You can do this via our CLI with `gitops get bcrypt-hash`.
99-
passwordHash:
42+
passwordHash: null
10043
podAnnotations: {}
10144
podLabels: {}
102-
# aadpodidbinding: identity
10345
podSecurityContext: {}
104-
# fsGroup: 2000
105-
10646
securityContext:
10747
runAsNonRoot: true
10848
allowPrivilegeEscalation: false
@@ -117,94 +57,29 @@ service:
11757
create: true
11858
type: ClusterIP
11959
port: 9001
120-
# nodePort:
12160
annotations: {}
12261
ingress:
12362
enabled: false
124-
className: ""
63+
className: ''
12564
annotations: {}
126-
# kubernetes.io/ingress.class: nginx
127-
# kubernetes.io/tls-acme: "true"
128-
hosts:
129-
# - host: chart-example.local
130-
# paths:
131-
# - path: /
132-
# pathType: ImplementationSpecific
133-
#
65+
hosts: null
13466
tls: []
135-
# - secretName: chart-example-tls
136-
# hosts:
137-
# - chart-example.local
13867
extraVolumes: []
13968
extraVolumeMounts: []
140-
# Example using extraVolumes and extraVolumeMounts to load 'oidc-auth' secret
141-
# with a secrets store CSI driver. Specify the secretName 'oidc-auth' in the
142-
# secretProviderClass so this will be created by the secrets store CSI driver.
143-
# See https://secrets-store-csi-driver.sigs.k8s.io/topics/sync-as-kubernetes-secret.html
144-
# extraVolumeMounts:
145-
# - name: ww-gitops-oauth-volume
146-
# mountPath: /mnt/secrets
147-
# readOnly: true
148-
# extraVolumes:
149-
# - name: ww-gitops-oauth-volume
150-
# csi:
151-
# driver: secrets-store.csi.k8s.io
152-
# readOnly: true
153-
# volumeAttributes:
154-
# secretProviderClass: ww-gitops-oauth-provider
15569
resources: {}
156-
# We usually recommend not to specify default resources and to leave this as a conscious
157-
# choice for the user. This also increases chances charts run on environments with little
158-
# resources, such as Minikube. If you do want to specify resources, uncomment the following
159-
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
160-
# limits:
161-
# cpu: 100m
162-
# memory: 128Mi
163-
# requests:
164-
# cpu: 100m
165-
# memory: 128Mi
166-
16770
networkPolicy:
168-
# -- Specifies whether default network policies should be created.
16971
create: true
17072
nodeSelector: {}
17173
tolerations: []
17274
affinity: {}
17375
serverTLS:
174-
# -- Enable TLS termination in gitops itself. If you enable this,
175-
# you need to create a secret, and specify the secretName. Another
176-
# option is to create an ingress.
17776
enable: false
178-
# -- Specify the tls secret name. This type of secrets have a key called `tls.crt` and `tls.key` containing their corresponding values in base64 format.
179-
# See
180-
# https://kubernetes.io/docs/concepts/configuration/secret/#tls-secrets for more details and examples
181-
secretName: "my-secret-tls"
182-
# Example of tls secret
183-
#
184-
# apiVersion: v1
185-
# kind: Secret
186-
# metadata:
187-
# name: my-secret-tls
188-
# type: kubernetes.io/tls
189-
# data:
190-
# # the data is abbreviated in this example
191-
# tls.crt: |
192-
# MIIC2DCCAcCgAwIBAgIBATANBgkqh ...
193-
# tls.key: |
194-
# MIIEpgIBAAKCAQEA7yn3bRHQ5FHMQ ...
195-
#
196-
# You can also create a tls secre t from files whith this k8s command:
197-
# kubectl create secret tls my-tls-secret \
198-
# --cert=path/to/cert/file \
199-
# --key=path/to/key/file
77+
secretName: my-secret-tls
20078
metrics:
201-
# -- Start the metrics exporter
20279
enabled: false
20380
service:
204-
# -- Port to start the metrics exporter on
20581
port: 2112
206-
# -- Annotations to set on the service
20782
annotations:
208-
prometheus.io/scrape: "true"
209-
prometheus.io/path: "/metrics"
210-
prometheus.io/port: "{{ .Values.metrics.service.port }}"
83+
prometheus.io/scrape: 'true'
84+
prometheus.io/path: /metrics
85+
prometheus.io/port: '{{ .Values.metrics.service.port }}'

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "@weaveworks/weave-gitops",
3-
"version": "0.39.0-rc.2",
3+
"version": "0.39.0-rc.3",
44
"description": "Weave GitOps core",
55
"targets": {
66
"default": {

0 commit comments

Comments
 (0)