-
Notifications
You must be signed in to change notification settings - Fork 3
Add Helm values schema validation and new configuration options #94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
305b128
c61c9e4
820928f
b4f504c
1015ad4
baf3cc9
5f7955c
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| @@ -1,6 +1,87 @@ | ||||||||||||||||||
| {{- $fullName := include "chart.fullname" . -}} | ||||||||||||||||||
| {{ $name := "registry" }} | ||||||||||||||||||
| {{- $name := "registry" -}} | ||||||||||||||||||
| {{- $data := dict "Chart" .Chart "Release" .Release "Values" .Values -}} | ||||||||||||||||||
| {{- $legacySecurityContext := .Values.securityContext | default dict -}} | ||||||||||||||||||
| {{- $podSecurityContext := dict -}} | ||||||||||||||||||
| {{- $containerSecurityContext := dict -}} | ||||||||||||||||||
| {{- if $legacySecurityContext }} | ||||||||||||||||||
| {{- /* Start from legacy securityContext, then let new values override. */ -}} | ||||||||||||||||||
| {{- $podSecurityContext = merge (pick $legacySecurityContext "fsGroup" "fsGroupChangePolicy" "supplementalGroups" "supplementalGroupsPolicy" "sysctls") (.Values.podSecurityContext | default dict) -}} | ||||||||||||||||||
| {{- $containerSecurityContext = merge (omit $legacySecurityContext "fsGroup" "fsGroupChangePolicy" "supplementalGroups" "supplementalGroupsPolicy" "sysctls") (.Values.containerSecurityContext | default dict) -}} | ||||||||||||||||||
|
Comment on lines
+9
to
+10
|
||||||||||||||||||
| {{- $podSecurityContext = merge (pick $legacySecurityContext "fsGroup" "fsGroupChangePolicy" "supplementalGroups" "supplementalGroupsPolicy" "sysctls") (.Values.podSecurityContext | default dict) -}} | |
| {{- $containerSecurityContext = merge (omit $legacySecurityContext "fsGroup" "fsGroupChangePolicy" "supplementalGroups" "supplementalGroupsPolicy" "sysctls") (.Values.containerSecurityContext | default dict) -}} | |
| {{- $podSecurityContext = merge (.Values.podSecurityContext | default dict) (pick $legacySecurityContext "fsGroup" "fsGroupChangePolicy" "supplementalGroups" "supplementalGroupsPolicy" "sysctls") -}} | |
| {{- $containerSecurityContext = merge (.Values.containerSecurityContext | default dict) (omit $legacySecurityContext "fsGroup" "fsGroupChangePolicy" "supplementalGroups" "supplementalGroupsPolicy" "sysctls") -}} |
Copilot
AI
Mar 11, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
imageCredentials.create=true always appends the auto-generated secret name to imagePullSecrets, but templates/private-registry.yaml only creates that secret when imageCredentials.existsSecrets is empty. If users set both imageCredentials.create=true and imageCredentials.existsSecrets (which the schema allows), the Deployment will reference a non-existent secret and Pods will fail to pull images. Only append the generated secret when it will actually be created (or change the secret template to always create it when create=true).
| {{- if .Values.imageCredentials.create }} | |
| {{- if and .Values.imageCredentials.create (not .Values.imageCredentials.existsSecrets) }} |
Copilot
AI
Mar 11, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Splitting the deprecated image.cli_args string on spaces changes the previous behavior (it used to be passed as a single argument) and breaks cases where values include quoting/embedded spaces (e.g. --foo="a b"). For backward compatibility, keep image.cli_args as a single arg (or support a proper list-based legacy field) and avoid naive whitespace splitting.
| {{- range (splitList " " (trim .)) }} | |
| {{- $arg := trim . -}} | |
| {{- if $arg }} | |
| {{- $args = append $args $arg -}} | |
| {{- end }} | |
| {{- $arg := trim . -}} | |
| {{- if $arg }} | |
| {{- $args = append $args $arg -}} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
kubeVersionis relaxed to ">=1.22.0-0", but the CI Kubernetes matrix shown in this PR only runs integration tests on 1.32+. If the chart is intended to support 1.22, consider adding at least one older version to the test matrix (or keepkubeVersionaligned with what is exercised in CI) to avoid advertising untested compatibility.