* fix(helm): namespace app-specific values under global.seaweedfs Move all app-specific values from the global namespace to global.seaweedfs.* to avoid polluting the shared .Values.global namespace when the chart is used as a subchart. Standard Helm conventions (global.imageRegistry, global.imagePullSecrets) remain at the global level as they are designed to be shared across subcharts. Fixes seaweedfs/seaweedfs#8699 BREAKING CHANGE: global values have been restructured. Users must update their values files to use the new paths: - global.registry → global.imageRegistry - global.repository → global.seaweedfs.image.repository - global.imageName → global.seaweedfs.image.name - global.<key> → global.seaweedfs.<key> (for all other app-specific values) * fix(ci): update helm CI tests to use new global.seaweedfs.* value paths Update all --set flags in helm_ci.yml to use the new namespaced global.seaweedfs.* paths matching the values.yaml restructuring. * fix(ci): install Claude Code via npm to avoid install.sh 403 The claude-code-action's built-in installer uses `curl https://claude.ai/install.sh | bash` which can fail with 403. Due to the pipe, bash exits 0 on empty input, masking the curl failure and leaving the `claude` binary missing. Work around this by installing Claude Code via npm before invoking the action, and passing the executable path via path_to_claude_code_executable. * revert: remove claude-code-review.yml changes from this PR The claude-code-action OIDC token exchange validates that the workflow file matches the version on the default branch. Modifying it in a PR causes the review job to fail with "Workflow validation failed". The Claude Code install fix will need to be applied directly to master or in a separate PR. * fix: update stale references to old global.* value paths - admin-statefulset.yaml: fix fail message to reference global.seaweedfs.masterServer - values.yaml: fix comment to reference image.name instead of imageName - helm_ci.yml: fix diagnostic message to reference global.seaweedfs.enableSecurity * feat(helm): add backward-compat shim for old global.* value paths Add _compat.tpl with a seaweedfs.compat helper that detects old-style global.* keys (e.g. global.enableSecurity, global.registry) and merges them into the new global.seaweedfs.* namespace. Since the old keys no longer have defaults in values.yaml, their presence means the user explicitly provided them. The helper uses in-place mutation via `set` so all templates see the merged values. This ensures existing deployments using old value paths continue to work without changes after upgrading. * fix: update stale comment references in values.yaml Update comments referencing global.enableSecurity and global.masterServer to the new global.seaweedfs.* paths. --------- Co-authored-by: Copilot <copilot@github.com>
339 lines
15 KiB
YAML
339 lines
15 KiB
YAML
{{- include "seaweedfs.compat" . -}}
|
|
{{- if .Values.admin.enabled }}
|
|
{{- if gt (.Values.admin.replicas | int) 1 }}
|
|
{{- fail "admin.replicas must be 0 or 1" -}}
|
|
{{- end }}
|
|
{{- if and (not .Values.admin.masters) (not .Values.global.seaweedfs.masterServer) (not .Values.master.enabled) }}
|
|
{{- fail "admin.masters or global.seaweedfs.masterServer must be set if master.enabled is false" -}}
|
|
{{- end }}
|
|
apiVersion: apps/v1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: {{ include "seaweedfs.componentName" (list . "admin") }}
|
|
namespace: {{ .Release.Namespace }}
|
|
labels:
|
|
app.kubernetes.io/name: {{ template "seaweedfs.name" . }}
|
|
helm.sh/chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}
|
|
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
|
app.kubernetes.io/component: admin
|
|
{{- if .Values.admin.annotations }}
|
|
annotations:
|
|
{{- toYaml .Values.admin.annotations | nindent 4 }}
|
|
{{- end }}
|
|
spec:
|
|
serviceName: {{ include "seaweedfs.componentName" (list . "admin") }}
|
|
podManagementPolicy: {{ .Values.admin.podManagementPolicy }}
|
|
replicas: {{ .Values.admin.replicas }}
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: {{ template "seaweedfs.name" . }}
|
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
|
app.kubernetes.io/component: admin
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/name: {{ template "seaweedfs.name" . }}
|
|
helm.sh/chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}
|
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
|
app.kubernetes.io/component: admin
|
|
{{ with .Values.podLabels }}
|
|
{{- toYaml . | nindent 8 }}
|
|
{{- end }}
|
|
{{- with .Values.admin.podLabels }}
|
|
{{- toYaml . | nindent 8 }}
|
|
{{- end }}
|
|
annotations:
|
|
{{ with .Values.podAnnotations }}
|
|
{{- toYaml . | nindent 8 }}
|
|
{{- end }}
|
|
{{- with .Values.admin.podAnnotations }}
|
|
{{- toYaml . | nindent 8 }}
|
|
{{- end }}
|
|
spec:
|
|
restartPolicy: {{ default .Values.global.seaweedfs.restartPolicy .Values.admin.restartPolicy }}
|
|
{{- if .Values.admin.affinity }}
|
|
affinity:
|
|
{{ tpl .Values.admin.affinity . | nindent 8 | trim }}
|
|
{{- end }}
|
|
{{- if .Values.admin.topologySpreadConstraints }}
|
|
topologySpreadConstraints:
|
|
{{ tpl .Values.admin.topologySpreadConstraints . | nindent 8 | trim }}
|
|
{{- end }}
|
|
{{- if .Values.admin.tolerations }}
|
|
tolerations:
|
|
{{ tpl .Values.admin.tolerations . | nindent 8 | trim }}
|
|
{{- end }}
|
|
{{- include "seaweedfs.imagePullSecrets" . | nindent 6 }}
|
|
terminationGracePeriodSeconds: 30
|
|
{{- if .Values.admin.priorityClassName }}
|
|
priorityClassName: {{ .Values.admin.priorityClassName | quote }}
|
|
{{- end }}
|
|
enableServiceLinks: false
|
|
{{- if .Values.admin.serviceAccountName }}
|
|
serviceAccountName: {{ .Values.admin.serviceAccountName | quote }}
|
|
{{- end }}
|
|
{{- if .Values.admin.initContainers }}
|
|
initContainers:
|
|
{{ tpl .Values.admin.initContainers . | nindent 8 | trim }}
|
|
{{- end }}
|
|
{{- if .Values.admin.podSecurityContext.enabled }}
|
|
securityContext: {{- omit .Values.admin.podSecurityContext "enabled" | toYaml | nindent 8 }}
|
|
{{- end }}
|
|
containers:
|
|
- name: seaweedfs
|
|
image: {{ template "admin.image" . }}
|
|
imagePullPolicy: {{ default "IfNotPresent" .Values.global.seaweedfs.imagePullPolicy }}
|
|
{{- $adminAuthEnabled := or .Values.admin.secret.existingSecret .Values.admin.secret.adminPassword }}
|
|
{{- $urlPrefix := .Values.admin.urlPrefix }}
|
|
{{- if and (not $urlPrefix) .Values.admin.ingress.enabled (ne .Values.admin.ingress.path "/") }}
|
|
{{- $urlPrefix = trimSuffix "/" .Values.admin.ingress.path }}
|
|
{{- end }}
|
|
{{- if and .Values.admin.secret.existingSecret (not .Values.admin.secret.userKey) -}}
|
|
{{- fail "admin.secret.userKey must be set when admin.secret.existingSecret is provided" -}}
|
|
{{- end -}}
|
|
{{- if and .Values.admin.secret.existingSecret (not .Values.admin.secret.pwKey) -}}
|
|
{{- fail "admin.secret.pwKey must be set when admin.secret.existingSecret is provided" -}}
|
|
{{- end -}}
|
|
{{- $adminSecretName := .Values.admin.secret.existingSecret | default (printf "%s-admin-secret" (include "seaweedfs.fullname" .)) }}
|
|
env:
|
|
{{- if $adminAuthEnabled }}
|
|
- name: WEED_ADMIN_USER
|
|
valueFrom:
|
|
secretKeyRef:
|
|
name: {{ $adminSecretName }}
|
|
key: {{ if .Values.admin.secret.existingSecret }}{{ .Values.admin.secret.userKey }}{{ else }}adminUser{{ end }}
|
|
- name: WEED_ADMIN_PASSWORD
|
|
valueFrom:
|
|
secretKeyRef:
|
|
name: {{ $adminSecretName }}
|
|
key: {{ if .Values.admin.secret.existingSecret }}{{ .Values.admin.secret.pwKey }}{{ else }}adminPassword{{ end }}
|
|
{{- end }}
|
|
- name: POD_IP
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: status.podIP
|
|
- name: POD_NAME
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.name
|
|
- name: NAMESPACE
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: SEAWEEDFS_FULLNAME
|
|
value: "{{ include "seaweedfs.fullname" . }}"
|
|
{{- $mergedExtraEnvironmentVars := dict }}
|
|
{{- include "seaweedfs.mergeExtraEnvironmentVars" (dict "global" .Values.global.seaweedfs "component" .Values.admin "target" $mergedExtraEnvironmentVars) }}
|
|
{{- range $key := keys $mergedExtraEnvironmentVars | sortAlpha }}
|
|
{{- $value := index $mergedExtraEnvironmentVars $key }}
|
|
- name: {{ $key }}
|
|
{{- if kindIs "string" $value }}
|
|
value: {{ tpl $value $ | quote }}
|
|
{{- else }}
|
|
valueFrom:
|
|
{{ toYaml $value | nindent 16 | trim }}
|
|
{{- end -}}
|
|
{{- end }}
|
|
command:
|
|
- "/bin/sh"
|
|
- "-ec"
|
|
- |
|
|
exec /usr/bin/weed \
|
|
{{- if or (eq .Values.admin.logs.type "hostPath") (eq .Values.admin.logs.type "persistentVolumeClaim") (eq .Values.admin.logs.type "emptyDir") (eq .Values.admin.logs.type "existingClaim") }}
|
|
-logdir=/logs \
|
|
{{- else }}
|
|
-logtostderr=true \
|
|
{{- end }}
|
|
{{- if .Values.admin.loggingOverrideLevel }}
|
|
-v={{ .Values.admin.loggingOverrideLevel }} \
|
|
{{- else }}
|
|
-v={{ .Values.global.seaweedfs.loggingLevel }} \
|
|
{{- end }}
|
|
admin \
|
|
-port={{ .Values.admin.port }} \
|
|
-port.grpc={{ .Values.admin.grpcPort }} \
|
|
{{- if or (eq .Values.admin.data.type "hostPath") (eq .Values.admin.data.type "persistentVolumeClaim") (eq .Values.admin.data.type "emptyDir") (eq .Values.admin.data.type "existingClaim") }}
|
|
-dataDir=/data \
|
|
{{- else if .Values.admin.dataDir }}
|
|
-dataDir={{ .Values.admin.dataDir }} \
|
|
{{- end }}
|
|
{{- if .Values.admin.masters }}
|
|
-masters={{ .Values.admin.masters }}{{- if or $urlPrefix .Values.admin.extraArgs }} \{{ end }}
|
|
{{- else if .Values.global.seaweedfs.masterServer }}
|
|
-masters={{ .Values.global.seaweedfs.masterServer }}{{- if or $urlPrefix .Values.admin.extraArgs }} \{{ end }}
|
|
{{- else }}
|
|
-masters={{ range $index := until (.Values.master.replicas | int) }}${SEAWEEDFS_FULLNAME}-master-{{ $index }}.${SEAWEEDFS_FULLNAME}-master.{{ $.Release.Namespace }}:{{ $.Values.master.port }}{{ if lt $index (sub ($.Values.master.replicas | int) 1) }},{{ end }}{{ end }}{{- if or $urlPrefix .Values.admin.extraArgs }} \{{ end }}
|
|
{{- end }}
|
|
{{- if $urlPrefix }}
|
|
-urlPrefix={{ $urlPrefix }}{{- if .Values.admin.extraArgs }} \{{ end }}
|
|
{{- end }}
|
|
{{- range $index, $arg := .Values.admin.extraArgs }}
|
|
{{ $arg }}{{- if lt $index (sub (len $.Values.admin.extraArgs) 1) }} \{{ end }}
|
|
{{- end }}
|
|
volumeMounts:
|
|
{{- if or (eq .Values.admin.data.type "hostPath") (eq .Values.admin.data.type "persistentVolumeClaim") (eq .Values.admin.data.type "emptyDir") (eq .Values.admin.data.type "existingClaim") }}
|
|
- name: admin-data
|
|
mountPath: /data
|
|
{{- end }}
|
|
{{- if or (eq .Values.admin.logs.type "hostPath") (eq .Values.admin.logs.type "persistentVolumeClaim") (eq .Values.admin.logs.type "emptyDir") (eq .Values.admin.logs.type "existingClaim") }}
|
|
- name: admin-logs
|
|
mountPath: /logs
|
|
{{- end }}
|
|
{{- if .Values.global.seaweedfs.enableSecurity }}
|
|
- name: security-config
|
|
readOnly: true
|
|
mountPath: /etc/seaweedfs/security.toml
|
|
subPath: security.toml
|
|
- name: ca-cert
|
|
readOnly: true
|
|
mountPath: /usr/local/share/ca-certificates/ca/
|
|
- name: master-cert
|
|
readOnly: true
|
|
mountPath: /usr/local/share/ca-certificates/master/
|
|
- name: volume-cert
|
|
readOnly: true
|
|
mountPath: /usr/local/share/ca-certificates/volume/
|
|
- name: filer-cert
|
|
readOnly: true
|
|
mountPath: /usr/local/share/ca-certificates/filer/
|
|
- name: client-cert
|
|
readOnly: true
|
|
mountPath: /usr/local/share/ca-certificates/client/
|
|
- name: admin-cert
|
|
readOnly: true
|
|
mountPath: /usr/local/share/ca-certificates/admin/
|
|
{{- end }}
|
|
{{ tpl .Values.admin.extraVolumeMounts . | nindent 12 | trim }}
|
|
ports:
|
|
- containerPort: {{ .Values.admin.port }}
|
|
name: http
|
|
- containerPort: {{ .Values.admin.grpcPort }}
|
|
name: grpc
|
|
{{- if .Values.admin.readinessProbe.enabled }}
|
|
readinessProbe:
|
|
httpGet:
|
|
path: {{ if $urlPrefix }}{{ $urlPrefix }}{{ end }}{{ .Values.admin.readinessProbe.httpGet.path }}
|
|
port: http
|
|
scheme: {{ .Values.admin.readinessProbe.httpGet.scheme }}
|
|
initialDelaySeconds: {{ .Values.admin.readinessProbe.initialDelaySeconds }}
|
|
periodSeconds: {{ .Values.admin.readinessProbe.periodSeconds }}
|
|
successThreshold: {{ .Values.admin.readinessProbe.successThreshold }}
|
|
failureThreshold: {{ .Values.admin.readinessProbe.failureThreshold }}
|
|
timeoutSeconds: {{ .Values.admin.readinessProbe.timeoutSeconds }}
|
|
{{- end }}
|
|
{{- if .Values.admin.livenessProbe.enabled }}
|
|
livenessProbe:
|
|
httpGet:
|
|
path: {{ if $urlPrefix }}{{ $urlPrefix }}{{ end }}{{ .Values.admin.livenessProbe.httpGet.path }}
|
|
port: http
|
|
scheme: {{ .Values.admin.livenessProbe.httpGet.scheme }}
|
|
initialDelaySeconds: {{ .Values.admin.livenessProbe.initialDelaySeconds }}
|
|
periodSeconds: {{ .Values.admin.livenessProbe.periodSeconds }}
|
|
successThreshold: {{ .Values.admin.livenessProbe.successThreshold }}
|
|
failureThreshold: {{ .Values.admin.livenessProbe.failureThreshold }}
|
|
timeoutSeconds: {{ .Values.admin.livenessProbe.timeoutSeconds }}
|
|
{{- end }}
|
|
{{- with .Values.admin.resources }}
|
|
resources:
|
|
{{- toYaml . | nindent 12 }}
|
|
{{- end }}
|
|
{{- if .Values.admin.containerSecurityContext.enabled }}
|
|
securityContext: {{- omit .Values.admin.containerSecurityContext "enabled" | toYaml | nindent 12 }}
|
|
{{- end }}
|
|
{{- if .Values.admin.sidecars }}
|
|
{{- include "common.tplvalues.render" (dict "value" .Values.admin.sidecars "context" $) | nindent 8 }}
|
|
{{- end }}
|
|
volumes:
|
|
{{- if eq .Values.admin.data.type "hostPath" }}
|
|
- name: admin-data
|
|
hostPath:
|
|
path: {{ .Values.admin.data.hostPathPrefix }}/seaweedfs-admin-data
|
|
type: DirectoryOrCreate
|
|
{{- end }}
|
|
{{- if eq .Values.admin.data.type "emptyDir" }}
|
|
- name: admin-data
|
|
emptyDir: {}
|
|
{{- end }}
|
|
{{- if eq .Values.admin.data.type "existingClaim" }}
|
|
- name: admin-data
|
|
persistentVolumeClaim:
|
|
claimName: {{ .Values.admin.data.claimName }}
|
|
{{- end }}
|
|
{{- if eq .Values.admin.logs.type "hostPath" }}
|
|
- name: admin-logs
|
|
hostPath:
|
|
path: {{ .Values.admin.logs.hostPathPrefix }}/logs/seaweedfs/admin
|
|
type: DirectoryOrCreate
|
|
{{- end }}
|
|
{{- if eq .Values.admin.logs.type "emptyDir" }}
|
|
- name: admin-logs
|
|
emptyDir: {}
|
|
{{- end }}
|
|
{{- if eq .Values.admin.logs.type "existingClaim" }}
|
|
- name: admin-logs
|
|
persistentVolumeClaim:
|
|
claimName: {{ .Values.admin.logs.claimName }}
|
|
{{- end }}
|
|
{{- if .Values.global.seaweedfs.enableSecurity }}
|
|
- name: security-config
|
|
configMap:
|
|
name: {{ include "seaweedfs.fullname" . }}-security-config
|
|
- name: ca-cert
|
|
secret:
|
|
secretName: {{ include "seaweedfs.fullname" . }}-ca-cert
|
|
- name: master-cert
|
|
secret:
|
|
secretName: {{ include "seaweedfs.fullname" . }}-master-cert
|
|
- name: volume-cert
|
|
secret:
|
|
secretName: {{ include "seaweedfs.fullname" . }}-volume-cert
|
|
- name: filer-cert
|
|
secret:
|
|
secretName: {{ include "seaweedfs.fullname" . }}-filer-cert
|
|
- name: client-cert
|
|
secret:
|
|
secretName: {{ include "seaweedfs.fullname" . }}-client-cert
|
|
- name: admin-cert
|
|
secret:
|
|
secretName: {{ include "seaweedfs.fullname" . }}-admin-cert
|
|
{{- end }}
|
|
{{ tpl .Values.admin.extraVolumes . | indent 8 | trim }}
|
|
{{- if .Values.admin.nodeSelector }}
|
|
nodeSelector:
|
|
{{ tpl .Values.admin.nodeSelector . | indent 8 | trim }}
|
|
{{- end }}
|
|
{{- $pvc_exists := include "admin.pvc_exists" . -}}
|
|
{{- if $pvc_exists }}
|
|
volumeClaimTemplates:
|
|
{{- if eq .Values.admin.data.type "persistentVolumeClaim" }}
|
|
- metadata:
|
|
name: admin-data
|
|
{{- with .Values.admin.data.annotations }}
|
|
annotations:
|
|
{{- toYaml . | nindent 10 }}
|
|
{{- end }}
|
|
spec:
|
|
accessModes: [ "ReadWriteOnce" ]
|
|
storageClassName: {{ .Values.admin.data.storageClass }}
|
|
resources:
|
|
requests:
|
|
storage: {{ .Values.admin.data.size }}
|
|
{{- end }}
|
|
{{- if eq .Values.admin.logs.type "persistentVolumeClaim" }}
|
|
- metadata:
|
|
name: admin-logs
|
|
{{- with .Values.admin.logs.annotations }}
|
|
annotations:
|
|
{{- toYaml . | nindent 10 }}
|
|
{{- end }}
|
|
spec:
|
|
accessModes: [ "ReadWriteOnce" ]
|
|
storageClassName: {{ .Values.admin.logs.storageClass }}
|
|
resources:
|
|
requests:
|
|
storage: {{ .Values.admin.logs.size }}
|
|
{{- end }}
|
|
{{- end }}
|
|
{{- end }}
|