You've already forked prometheus-fail2ban-exporter-charts
							
							Compare commits
	
		
			1 Commits
		
	
	
		
			0.4.20
			...
			cda9a16f48
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| cda9a16f48 | 
| @@ -1,114 +0,0 @@ | ||||
| #!/bin/bash | ||||
|  | ||||
| set -e | ||||
|  | ||||
| CHART_FILE="Chart.yaml" | ||||
| if [ ! -f "${CHART_FILE}" ]; then | ||||
|   echo "ERROR: ${CHART_FILE} not found!" 1>&2 | ||||
|   exit 1 | ||||
| fi | ||||
|  | ||||
| DEFAULT_NEW_TAG="$(git tag --sort=-version:refname | head -n 1)" | ||||
| DEFAULT_OLD_TAG="$(git tag --sort=-version:refname | head -n 2 | tail -n 1)" | ||||
|  | ||||
| if [ -z "${1}" ]; then | ||||
|   read -p "Enter start tag [${DEFAULT_OLD_TAG}]: " OLD_TAG | ||||
|   if [ -z "${OLD_TAG}" ]; then | ||||
|     OLD_TAG="${DEFAULT_OLD_TAG}" | ||||
|   fi | ||||
|  | ||||
|   while [ -z "$(git tag --list "${OLD_TAG}")" ]; do | ||||
|     echo "ERROR: Tag '${OLD_TAG}' not found!" 1>&2 | ||||
|     read -p "Enter start tag [${DEFAULT_OLD_TAG}]: " OLD_TAG | ||||
|     if [ -z "${OLD_TAG}" ]; then | ||||
|       OLD_TAG="${DEFAULT_OLD_TAG}" | ||||
|     fi | ||||
|   done | ||||
| else | ||||
|   OLD_TAG=${1} | ||||
|   if [ -z "$(git tag --list "${OLD_TAG}")" ]; then | ||||
|     echo "ERROR: Tag '${OLD_TAG}' not found!" 1>&2 | ||||
|     exit 1 | ||||
|   fi | ||||
| fi | ||||
|  | ||||
| if [ -z "${2}" ]; then | ||||
|   read -p "Enter end tag [${DEFAULT_NEW_TAG}]: " NEW_TAG | ||||
|   if [ -z "${NEW_TAG}" ]; then | ||||
|     NEW_TAG="${DEFAULT_NEW_TAG}" | ||||
|   fi | ||||
|  | ||||
|   while [ -z "$(git tag --list "${NEW_TAG}")" ]; do | ||||
|     echo "ERROR: Tag '${NEW_TAG}' not found!" 1>&2 | ||||
|     read -p "Enter end tag [${DEFAULT_NEW_TAG}]: " NEW_TAG | ||||
|     if [ -z "${NEW_TAG}" ]; then | ||||
|       NEW_TAG="${DEFAULT_NEW_TAG}" | ||||
|     fi | ||||
|   done | ||||
| else | ||||
|   NEW_TAG=${2} | ||||
|  | ||||
|   if [ -z "$(git tag --list "${NEW_TAG}")" ]; then | ||||
|     echo "ERROR: Tag '${NEW_TAG}' not found!" 1>&2 | ||||
|     exit 1 | ||||
|   fi | ||||
| fi | ||||
|  | ||||
| CHANGE_LOG_YAML=$(mktemp) | ||||
| echo "[]" > "${CHANGE_LOG_YAML}" | ||||
|  | ||||
| function map_type_to_kind() { | ||||
|   case "${1}" in | ||||
|     feat) | ||||
|       echo "added" | ||||
|     ;; | ||||
|     fix) | ||||
|       echo "fixed" | ||||
|     ;; | ||||
|     chore|style|test|ci|docs|refac) | ||||
|       echo "changed" | ||||
|     ;; | ||||
|     revert) | ||||
|       echo "removed" | ||||
|     ;; | ||||
|     sec) | ||||
|       echo "security" | ||||
|     ;; | ||||
|     *) | ||||
|       echo "skip" | ||||
|     ;; | ||||
|   esac | ||||
| } | ||||
|  | ||||
| COMMIT_TITLES="$(git log --pretty=format:"%s" "${OLD_TAG}..${NEW_TAG}")" | ||||
|  | ||||
| echo "INFO: Generate change log entries from ${OLD_TAG} until ${NEW_TAG}" | ||||
|  | ||||
| while IFS= read -r line; do | ||||
|   if [[ "${line}" =~ ^([a-zA-Z]+)(\([^\)]+\))?\:\ (.+)$ ]]; then | ||||
|     TYPE="${BASH_REMATCH[1]}" | ||||
|     KIND=$(map_type_to_kind "${TYPE}") | ||||
|  | ||||
|     if [ "${KIND}" == "skip" ]; then | ||||
|       continue | ||||
|     fi | ||||
|  | ||||
|     DESC="${BASH_REMATCH[3]}" | ||||
|  | ||||
|     echo "- ${KIND}: ${DESC}" | ||||
|  | ||||
|     jq --arg kind changed --arg description "$DESC" '. += [ $ARGS.named ]' < ${CHANGE_LOG_YAML} > ${CHANGE_LOG_YAML}.new | ||||
|     mv ${CHANGE_LOG_YAML}.new ${CHANGE_LOG_YAML} | ||||
|  | ||||
|   fi | ||||
| done <<< "${COMMIT_TITLES}" | ||||
|  | ||||
| if [ -s "${CHANGE_LOG_YAML}" ]; then | ||||
|   yq --inplace --input-format json --output-format yml "${CHANGE_LOG_YAML}" | ||||
|   yq --no-colors --inplace ".annotations.\"artifacthub.io/changes\" |= loadstr(\"${CHANGE_LOG_YAML}\") | sort_keys(.)" "${CHART_FILE}" | ||||
| else | ||||
|   echo "ERROR: Changelog file is empty: ${CHANGE_LOG_YAML}" 1>&2 | ||||
|   exit 1 | ||||
| fi | ||||
|  | ||||
| rm "${CHANGE_LOG_YAML}" | ||||
| @@ -13,7 +13,7 @@ on: | ||||
| jobs: | ||||
|   helm-lint: | ||||
|     container: | ||||
|       image: docker.io/volkerraschek/helm:3.18.2 | ||||
|       image: docker.io/volkerraschek/helm:3.18.0 | ||||
|     runs-on: | ||||
|     - ubuntu-latest | ||||
|     steps: | ||||
| @@ -28,7 +28,7 @@ jobs: | ||||
|  | ||||
|   helm-unittest: | ||||
|     container: | ||||
|       image: docker.io/volkerraschek/helm:3.18.2 | ||||
|       image: docker.io/volkerraschek/helm:3.18.0 | ||||
|     runs-on: | ||||
|     - ubuntu-latest | ||||
|     steps: | ||||
|   | ||||
| @@ -8,54 +8,39 @@ on: | ||||
| jobs: | ||||
|   publish-chart: | ||||
|     container: | ||||
|       image: docker.io/volkerraschek/helm:3.18.2 | ||||
|       image: docker.io/volkerraschek/helm:3.18.0 | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - name: Install packages via apk | ||||
|       - name: Install tooling | ||||
|         run: | | ||||
|           apk update | ||||
|           apk add git npm jq yq | ||||
|  | ||||
|           apk add git npm | ||||
|       - uses: actions/checkout@v4 | ||||
|         with: | ||||
|           fetch-depth: 0 | ||||
|  | ||||
|       - name: Add Artifacthub.io annotations | ||||
|         run: | | ||||
|           NEW_TAG="$(git tag --sort=-version:refname | head -n 1)" | ||||
|           OLD_TAG="$(git tag --sort=-version:refname | head -n 2 | tail -n 1)" | ||||
|           .gitea/scripts/add-annotations.sh "${OLD_TAG}" "${NEW_TAG}" | ||||
|  | ||||
|       - name: Extract meta information | ||||
|         run: | | ||||
|           echo "PACKAGE_VERSION=${GITHUB_REF#refs/tags/}" >> $GITHUB_ENV | ||||
|           echo "REPOSITORY_NAME=$(echo ${GITHUB_REPOSITORY} | cut -d '/' -f 2)" >> $GITHUB_ENV | ||||
|           echo "REPOSITORY_OWNER=$(echo ${GITHUB_REPOSITORY} | cut -d '/' -f 1)" >> $GITHUB_ENV | ||||
|  | ||||
|       - name: Update Helm Chart version in README.md | ||||
|         run: sed -i -E "s/^CHART_VERSION=.*/CHART_VERSION=${PACKAGE_VERSION}/g" README.md | ||||
|  | ||||
|       - name: Package chart | ||||
|         run: | | ||||
|           helm dependency build | ||||
|           helm package --version "${PACKAGE_VERSION}" ./ | ||||
|  | ||||
|       - name: Upload Chart to ChartMuseum | ||||
|         env: | ||||
|           HELM_REPO_NAME: upload | ||||
|  | ||||
|           CHARTMUSEUM_PASSWORD: ${{ secrets.CHARTMUSEUM_PASSWORD }} | ||||
|           CHARTMUSEUM_REPOSITORY: ${{ vars.CHARTMUSEUM_REPOSITORY }} | ||||
|           CHARTMUSEUM_USERNAME: ${{ secrets.CHARTMUSEUM_USERNAME }} | ||||
|           CHARTMUSEUM_HOSTNAME: ${{ vars.CHARTMUSEUM_HOSTNAME }} | ||||
|  | ||||
|           GITEA_PACKAGE_REGISTRY_TOKEN: ${{ secrets.GIT_CRYPTIC_SYSTEMS_PACKAGE_REGISTRY_TOKEN }} | ||||
|           GITEA_SERVER_URL: ${{ github.server_url }} | ||||
|         run: | | ||||
|           PACKAGE_VERSION=${GITHUB_REF#refs/tags/} | ||||
|           REPOSITORY_NAME=$(echo ${GITHUB_REPOSITORY} | cut -d '/' -f 2 | sed --regexp-extended 's/-charts?//g') | ||||
|           REPOSITORY_OWNER=$(echo ${GITHUB_REPOSITORY} | cut -d '/' -f 1) | ||||
|  | ||||
|           helm dependency build | ||||
|           helm package --version "${PACKAGE_VERSION}" ./ | ||||
|  | ||||
|           # chart-museum | ||||
|           helm repo add --username ${CHARTMUSEUM_USERNAME} --password ${CHARTMUSEUM_PASSWORD} chartmuseum https://${CHARTMUSEUM_HOSTNAME}/${CHARTMUSEUM_REPOSITORY} | ||||
|           helm cm-push ${REPOSITORY_NAME}-${PACKAGE_VERSION}.tgz chartmuseum | ||||
|           helm repo remove chartmuseum | ||||
|  | ||||
|       - name: Upload Chart to Gitea | ||||
|         env: | ||||
|           GITEA_PACKAGE_REGISTRY_TOKEN: ${{ secrets.GIT_CRYPTIC_SYSTEMS_PACKAGE_REGISTRY_TOKEN }} | ||||
|           GITEA_SERVER_URL: ${{ github.server_url }} | ||||
|         run: | | ||||
|           # gitea | ||||
|           helm repo add --username ${REPOSITORY_OWNER} --password ${GITEA_PACKAGE_REGISTRY_TOKEN} gitea ${GITEA_SERVER_URL}/api/packages/${REPOSITORY_OWNER}/helm | ||||
|           helm cm-push ${REPOSITORY_NAME}-${PACKAGE_VERSION}.tgz gitea | ||||
|           helm repo remove gitea | ||||
|           helm repo remove gitea | ||||
							
								
								
									
										34
									
								
								Chart.yaml
									
									
									
									
									
								
							
							
						
						
									
										34
									
								
								Chart.yaml
									
									
									
									
									
								
							| @@ -1,21 +1,19 @@ | ||||
| annotations: | ||||
|   artifacthub.io/links: | | ||||
|     - name: Prometheus Fail2Ban exporter (binary) | ||||
|       url: https://git.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter | ||||
|     - name: support | ||||
|       url: https://git.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter-charts/issues | ||||
| apiVersion: v2 | ||||
| appVersion: "0.1.1" | ||||
| description: Prometheus metric exporter for Fail2Ban | ||||
| # icon: https://annotations.example.com/icon.png | ||||
| keywords: | ||||
|   - prometheus | ||||
|   - prometheus-exporter | ||||
|   - prometheus-fail2ban-exporter | ||||
|   - fail2ban-exporter | ||||
| name: prometheus-fail2ban-exporter | ||||
| sources: | ||||
|   - https://git.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter-charts | ||||
|   - https://git.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter | ||||
| description: Prometheus metric exporter for Fail2Ban | ||||
| type: application | ||||
| version: "0.4.1" | ||||
| kubeVersion: ">=1.20.0" | ||||
| version: "0.1.0" | ||||
| appVersion: "0.1.1" | ||||
|  | ||||
| # icon: https://annotations.example.com/icon.png | ||||
|  | ||||
| keywords: | ||||
| - prometheus | ||||
| - prometheus-exporter | ||||
| - prometheus-fail2ban-exporter | ||||
| - fail2ban-exporter | ||||
|  | ||||
| sources: | ||||
| - https://git.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter-charts | ||||
| - https://git.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter | ||||
							
								
								
									
										21
									
								
								LICENSE
									
									
									
									
									
								
							
							
						
						
									
										21
									
								
								LICENSE
									
									
									
									
									
								
							| @@ -1,21 +0,0 @@ | ||||
| MIT License | ||||
|  | ||||
| Copyright (c) 2025 Markus Pesch | ||||
|  | ||||
| Permission is hereby granted, free of charge, to any person obtaining a copy | ||||
| of this software and associated documentation files (the "Software"), to deal | ||||
| in the Software without restriction, including without limitation the rights | ||||
| to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||||
| copies of the Software, and to permit persons to whom the Software is | ||||
| furnished to do so, subject to the following conditions: | ||||
|  | ||||
| The above copyright notice and this permission notice shall be included in all | ||||
| copies or substantial portions of the Software. | ||||
|  | ||||
| THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||||
| IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||||
| FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | ||||
| AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||||
| LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||||
| OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE | ||||
| SOFTWARE. | ||||
							
								
								
									
										4
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								Makefile
									
									
									
									
									
								
							| @@ -4,13 +4,13 @@ CONTAINER_RUNTIME?=$(shell which podman) | ||||
| # HELM_IMAGE | ||||
| HELM_IMAGE_REGISTRY_HOST?=docker.io | ||||
| HELM_IMAGE_REPOSITORY?=volkerraschek/helm | ||||
| HELM_IMAGE_VERSION?=3.18.2 # renovate: datasource=docker registryUrl=https://docker.io depName=volkerraschek/helm | ||||
| HELM_IMAGE_VERSION?=3.18.0 # renovate: datasource=docker registryUrl=https://docker.io depName=volkerraschek/helm | ||||
| HELM_IMAGE_FULLY_QUALIFIED=${HELM_IMAGE_REGISTRY_HOST}/${HELM_IMAGE_REPOSITORY}:${HELM_IMAGE_VERSION} | ||||
|  | ||||
| # NODE_IMAGE | ||||
| NODE_IMAGE_REGISTRY_HOST?=docker.io | ||||
| NODE_IMAGE_REPOSITORY?=library/node | ||||
| NODE_IMAGE_VERSION?=24.1.0-alpine # renovate: datasource=docker registryUrl=https://docker.io depName=docker.io/library/node packageName=library/node | ||||
| NODE_IMAGE_VERSION?=22.16.0-alpine # renovate: datasource=docker registryUrl=https://docker.io depName=library/node | ||||
| NODE_IMAGE_FULLY_QUALIFIED=${NODE_IMAGE_REGISTRY_HOST}/${NODE_IMAGE_REPOSITORY}:${NODE_IMAGE_VERSION} | ||||
|  | ||||
| # MISSING DOT | ||||
|   | ||||
| @@ -1,5 +1,6 @@ | ||||
| # Prometheus Fail2Ban exporter | ||||
|  | ||||
| [](https://drone.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter) | ||||
| [](https://artifacthub.io/packages/search?repo=prometheus-exporters) | ||||
|  | ||||
| This helm chart enables the deployment of a Prometheus metrics exporter for Fail2Ban and allows the individual | ||||
| @@ -19,7 +20,7 @@ helm chart is tested for deployment scenarios with **ArgoCD**. | ||||
| ## Helm: configuration and installation | ||||
|  | ||||
| 1. A helm chart repository must be configured, to pull the helm charts from. | ||||
| 2. All available [parameters](#parameters) are documented in detail below. The parameters can be defined via the helm | ||||
| 2. All available parameters are [here](#parameters) in detail documented. The parameters can be defined via the helm | ||||
|    `--set` flag or directly as part of a `values.yaml` file. The following example defines the `prometheus-exporter` | ||||
|    repository and use the `--set` flag for a basic deployment. | ||||
|  | ||||
| @@ -42,7 +43,7 @@ version of the chart must be in sync with the `values.yaml`. Newer *minor* versi | ||||
| versions can break something! | ||||
|  | ||||
| ```bash | ||||
| CHART_VERSION=0.4.16 | ||||
| CHART_VERSION=0.3.1 | ||||
| helm show values prometheus-exporters/prometheus-fail2ban-exporter --version "${CHART_VERSION}" > values.yaml | ||||
| ``` | ||||
|  | ||||
| @@ -70,8 +71,7 @@ available. As this is a Golang application, this can be implemented using `GOMAX | ||||
| of defining `GOMAXPROCS` automatically based on the defined CPU limit like `1000m`. Please keep in mind, that the CFS | ||||
| rate of `100ms` - default on each kubernetes node, is also very important to avoid CPU throttling. | ||||
|  | ||||
| Further information about this topic can be found in one of Kanishk's blog | ||||
| [posts](https://kanishk.io/posts/cpu-throttling-in-containerized-go-apps/). | ||||
| Further information about this topic can be found [here](https://kanishk.io/posts/cpu-throttling-in-containerized-go-apps/). | ||||
|  | ||||
| > [!NOTE] | ||||
| > The environment variable `GOMAXPROCS` is set automatically, when a CPU limit is defined. An explicit configuration is | ||||
|   | ||||
| @@ -4,21 +4,6 @@ | ||||
|  | ||||
| {{- define "prometheus-fail2ban-exporter.pod.annotations" -}} | ||||
| {{ include "prometheus-fail2ban-exporter.annotations" . }} | ||||
|  | ||||
| # The following annotations are required to trigger a rolling update. Further information can be found in the official | ||||
| # documentation of helm: | ||||
| # | ||||
| #   https://helm.sh/docs/howto/charts_tips_and_tricks/#automatically-roll-deployments | ||||
| # | ||||
|  | ||||
| {{/* web config */}} | ||||
| {{- if and .Values.config.webConfig.existingSecret.enabled .Values.config.webConfig.existingSecret.secretName }} | ||||
| {{- $secret := default (dict "data" (dict)) (lookup "v1" "Secret" .Release.Namespace .Values.config.webConfig.existingSecret.secretName ) }} | ||||
| checksum/secret-web-config: {{ print $secret.spec | sha256sum }} | ||||
| {{- else }} | ||||
| checksum/secret-web-config: {{ include (print $.Template.BasePath "/prometheus-fail2ban-exporter/secretWebConfig.yaml") . | sha256sum }} | ||||
| {{- end }} | ||||
|  | ||||
| {{- end }} | ||||
|  | ||||
| {{/* labels */}} | ||||
|   | ||||
| @@ -17,8 +17,6 @@ spec: | ||||
|       {{- include "prometheus-fail2ban-exporter.pod.selectorLabels" . | nindent 6 }} | ||||
|   template: | ||||
|     metadata: | ||||
|       annotations: | ||||
|         {{- include "prometheus-fail2ban-exporter.pod.annotations" . | nindent 8 }} | ||||
|       labels: | ||||
|         {{- include "prometheus-fail2ban-exporter.pod.labels" . | nindent 8 }} | ||||
|     spec: | ||||
|   | ||||
| @@ -7,22 +7,18 @@ release: | ||||
|   namespace: testing | ||||
| templates: | ||||
| - templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
| - templates/prometheus-fail2ban-exporter/secretWebConfig.yaml | ||||
| tests: | ||||
| - it: Rendering default | ||||
|   asserts: | ||||
|   - hasDocuments: | ||||
|       count: 1 | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - containsDocument: | ||||
|       apiVersion: apps/v1 | ||||
|       kind: DaemonSet | ||||
|       name: prometheus-fail2ban-exporter-unittest | ||||
|       namespace: testing | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: metadata.annotations | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: metadata.labels | ||||
|       value: | ||||
| @@ -31,31 +27,15 @@ tests: | ||||
|         app.kubernetes.io/name: prometheus-fail2ban-exporter | ||||
|         app.kubernetes.io/version: 0.1.0 | ||||
|         helm.sh/chart: prometheus-fail2ban-exporter-0.1.0 | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - exists: | ||||
|       path: spec.template.metadata.annotations.checksum/secret-web-config | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.metadata.labels | ||||
|       value: | ||||
|         app.kubernetes.io/instance: prometheus-fail2ban-exporter-unittest | ||||
|         app.kubernetes.io/managed-by: Helm | ||||
|         app.kubernetes.io/name: prometheus-fail2ban-exporter | ||||
|         app.kubernetes.io/version: 0.1.0 | ||||
|         helm.sh/chart: prometheus-fail2ban-exporter-0.1.0 | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.affinity | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.containers[0].envFrom | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.containers[0].args | ||||
|       value: | ||||
|       # - --web.config.file=/etc/prometheus-fail2ban-exporter/config.d/webConfig.yaml | ||||
|       - --web.listen-address=:9191 | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.containers[0].volumeMounts | ||||
|       value: | ||||
| @@ -63,7 +43,6 @@ tests: | ||||
|         name: socket | ||||
|       - mountPath: /etc/prometheus-fail2ban-exporter/config.d | ||||
|         name: config-d | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.volumes | ||||
|       value: | ||||
| @@ -74,59 +53,42 @@ tests: | ||||
|       - name: config-d | ||||
|         secret: | ||||
|           secretName: prometheus-fail2ban-exporter-unittest-web-config | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.containers[0].image | ||||
|       value: git.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter:0.1.0 | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.containers[0].imagePullPolicy | ||||
|       value: IfNotPresent | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.containers[0].resources | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.containers[0].securityContext | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.dnsConfig | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.dnsPolicy | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.hostname | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.hostNetwork | ||||
|       value: false | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.imagePullSecrets | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.nodeSelector | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.priorityClassName | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.restartPolicy | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.subdomain | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.terminationGracePeriodSeconds | ||||
|       value: 60 | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.tolerations | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - notExists: | ||||
|       path: spec.template.spec.topologySpreadConstraints | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.updateStrategy | ||||
|       value: | ||||
| @@ -134,7 +96,6 @@ tests: | ||||
|           maxSurge: 1 | ||||
|           maxUnavailable: 0 | ||||
|         type: "RollingUpdate" | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test custom affinity | ||||
|   set: | ||||
| @@ -161,7 +122,6 @@ tests: | ||||
|                 values: | ||||
|                 - antarctica-east1 | ||||
|                 - antarctica-west1 | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test additional arguments | ||||
|   set: | ||||
| @@ -176,7 +136,6 @@ tests: | ||||
|       - --web.listen-address=:9191 | ||||
|       - --foo=bar | ||||
|       - --bar=foo | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test custom imageRegistry and imageRepository | ||||
|   set: | ||||
| @@ -186,7 +145,6 @@ tests: | ||||
|   - equal: | ||||
|       path: spec.template.spec.containers[0].image | ||||
|       value: registry.example.local/path/special/prometheus-fail2ban-exporter:0.1.0 | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test custom imagePullPolicy | ||||
|   set: | ||||
| @@ -195,7 +153,6 @@ tests: | ||||
|   - equal: | ||||
|       path: spec.template.spec.containers[0].imagePullPolicy | ||||
|       value: Always | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test config.webConfig.existingSecret | ||||
|   set: | ||||
| @@ -209,7 +166,6 @@ tests: | ||||
|         name: socket | ||||
|       - mountPath: /etc/prometheus-fail2ban-exporter/config.d | ||||
|         name: config-d | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.volumes | ||||
|       value: | ||||
| @@ -220,7 +176,6 @@ tests: | ||||
|       - name: config-d | ||||
|         secret: | ||||
|           secretName: web-config-secret | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test custom resource limits and requests | ||||
|   set: | ||||
| @@ -240,7 +195,6 @@ tests: | ||||
|           resourceFieldRef: | ||||
|             divisor: "1" | ||||
|             resource: limits.cpu | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.containers[0].resources | ||||
|       value: | ||||
| @@ -250,7 +204,6 @@ tests: | ||||
|         requests: | ||||
|           cpu: 25m | ||||
|           memory: 100MB | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test custom securityContext | ||||
|   set: | ||||
| @@ -277,7 +230,6 @@ tests: | ||||
|         readOnlyRootFilesystem: true | ||||
|         runAsNonRoot: true | ||||
|         runAsUser: 1000 | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test dnsConfig | ||||
|   set: | ||||
| @@ -292,7 +244,6 @@ tests: | ||||
|         nameservers: | ||||
|         - "8.8.8.8" | ||||
|         - "8.8.4.4" | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test dnsPolicy | ||||
|   set: | ||||
| @@ -301,7 +252,6 @@ tests: | ||||
|   - equal: | ||||
|       path: spec.template.spec.dnsPolicy | ||||
|       value: ClusterFirst | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test hostNetwork, hostname, subdomain | ||||
|   set: | ||||
| @@ -312,15 +262,12 @@ tests: | ||||
|   - equal: | ||||
|       path: spec.template.spec.hostNetwork | ||||
|       value: true | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.hostname | ||||
|       value: pg-exporter | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.subdomain | ||||
|       value: exporters.internal | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test imagePullSecrets | ||||
|   set: | ||||
| @@ -333,7 +280,6 @@ tests: | ||||
|       value: | ||||
|       - name: my-pull-secret | ||||
|       - name: my-special-secret | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test nodeSelector | ||||
|   set: | ||||
| @@ -344,7 +290,6 @@ tests: | ||||
|       path: spec.template.spec.nodeSelector | ||||
|       value: | ||||
|         foo: bar | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test priorityClassName | ||||
|   set: | ||||
| @@ -353,7 +298,6 @@ tests: | ||||
|   - equal: | ||||
|       path: spec.template.spec.priorityClassName | ||||
|       value: my-priority | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test restartPolicy | ||||
|   set: | ||||
| @@ -362,7 +306,6 @@ tests: | ||||
|   - equal: | ||||
|       path: spec.template.spec.restartPolicy | ||||
|       value: Always | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test terminationGracePeriodSeconds | ||||
|   set: | ||||
| @@ -371,7 +314,6 @@ tests: | ||||
|   - equal: | ||||
|       path: spec.template.spec.terminationGracePeriodSeconds | ||||
|       value: 120 | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test tolerations | ||||
|   set: | ||||
| @@ -388,7 +330,6 @@ tests: | ||||
|         operator: Equal | ||||
|         value: fail2ban | ||||
|         effect: NoSchedule | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test topologySpreadConstraints | ||||
|   set: | ||||
| @@ -407,7 +348,6 @@ tests: | ||||
|         labelSelector: | ||||
|           matchLabels: | ||||
|             app.kubernetes.io/instance: prometheus-fail2ban-exporter | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|  | ||||
| - it: Test additional volumeMounts and volumes | ||||
|   set: | ||||
| @@ -426,7 +366,6 @@ tests: | ||||
|         mountPath: /usr/lib/prometheus-fail2ban-exporter/data | ||||
|       - name: config-d | ||||
|         mountPath: /etc/prometheus-fail2ban-exporter/config.d | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|   - equal: | ||||
|       path: spec.template.spec.volumes | ||||
|       value: | ||||
| @@ -435,5 +374,4 @@ tests: | ||||
|           path: /usr/lib/prometheus-fail2ban-exporter/data | ||||
|       - name: config-d | ||||
|         secret: | ||||
|           secretName: prometheus-fail2ban-exporter-unittest-web-config | ||||
|     template: templates/prometheus-fail2ban-exporter/daemonSet.yaml | ||||
|           secretName: prometheus-fail2ban-exporter-unittest-web-config | ||||
		Reference in New Issue
	
	Block a user