From 0c56665636e58c9e848ed57a0934abdb9aeb6114 Mon Sep 17 00:00:00 2001 From: Ivan P <2119240+i5okie@users.noreply.github.com> Date: Mon, 7 Oct 2024 09:11:19 -0700 Subject: [PATCH 1/8] Do not specify existing secret for postgresql chart Signed-off-by: Ivan P <2119240+i5okie@users.noreply.github.com> --- charts/traction/values.yaml | 9 --------- 1 file changed, 9 deletions(-) diff --git a/charts/traction/values.yaml b/charts/traction/values.yaml index 99c401673..21feb8f7f 100644 --- a/charts/traction/values.yaml +++ b/charts/traction/values.yaml @@ -863,15 +863,6 @@ postgresql: ## @param postgresql.auth.enablePostgresUser Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user ## enablePostgresUser: true - ## @param postgresql.auth.existingSecret Name of existing secret to use for PostgreSQL credentials. `postgresql.auth.postgresPassword`, `postgresql.auth.password`, and `postgresql.auth.replicationPassword` will be ignored and picked up from this secret. The secret might also contains the key `ldap-password` if LDAP is enabled. `ldap.bind_password` will be ignored and picked from this secret in this case. - ## - existingSecret: '{{ include "global.fullname" . }}' - ## @param postgresql.auth.secretKeys.adminPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set. - ## @param postgresql.auth.secretKeys.userPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set. - ## - secretKeys: - adminPasswordKey: admin-password - userPasswordKey: database-password ## @param postgresql.auth.database Name for a custom database to create ## database: traction From c71dfbd0385b74e24946de6919740b0af2271085 Mon Sep 17 00:00:00 2001 From: Ivan P <2119240+i5okie@users.noreply.github.com> Date: Mon, 7 Oct 2024 09:12:01 -0700 Subject: [PATCH 2/8] Do not create database secret Signed-off-by: Ivan P <2119240+i5okie@users.noreply.github.com> --- charts/traction/templates/_helpers.tpl | 9 --------- .../templates/acapy/database_secret.yaml | 16 ---------------- 2 files changed, 25 deletions(-) delete mode 100644 charts/traction/templates/acapy/database_secret.yaml diff --git a/charts/traction/templates/_helpers.tpl b/charts/traction/templates/_helpers.tpl index 1094943f6..c318f6ca8 100755 --- a/charts/traction/templates/_helpers.tpl +++ b/charts/traction/templates/_helpers.tpl @@ -79,15 +79,6 @@ it randomly. {{- end -}} {{- end }} -{{/* -Return true if a database secret should be created -*/}} -{{- define "acapy.database.createSecret" -}} -{{- if not .Values.acapy.walletStorageCredentials.existingSecret -}} -{{- true -}} -{{- end -}} -{{- end -}} - {{/* Return true if a api secret should be created */}} diff --git a/charts/traction/templates/acapy/database_secret.yaml b/charts/traction/templates/acapy/database_secret.yaml deleted file mode 100644 index 21f37877e..000000000 --- a/charts/traction/templates/acapy/database_secret.yaml +++ /dev/null @@ -1,16 +0,0 @@ -{{- if (include "acapy.database.createSecret" .) -}} -apiVersion: v1 -kind: Secret -metadata: - annotations: - "helm.sh/resource-policy": keep - name: {{ template "acapy.database.secret.name" . }} - labels: - {{- include "common.selectorLabels" . | nindent 4 }} - namespace: {{ .Release.Namespace }} -type: Opaque -data: - admin-password: {{ include "getOrGeneratePass" (dict "Namespace" .Release.Namespace "Kind" "Secret" "Name" (include "acapy.database.secret.name" .) "Key" (include "acapy.database.adminPasswordKey" .)) }} - database-user: {{ .Values.acapy.walletStorageCredentials.account | b64enc }} - database-password: {{ include "getOrGeneratePass" (dict "Namespace" .Release.Namespace "Kind" "Secret" "Name" (include "acapy.database.secret.name" .) "Key" (include "acapy.database.userPasswordKey" .)) }} -{{- end -}} From adb7d3d42468a51e62b54985d3539c7c61240d5e Mon Sep 17 00:00:00 2001 From: Ivan P <2119240+i5okie@users.noreply.github.com> Date: Mon, 7 Oct 2024 09:28:50 -0700 Subject: [PATCH 3/8] Update values Signed-off-by: Ivan P <2119240+i5okie@users.noreply.github.com> --- charts/traction/values.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/charts/traction/values.yaml b/charts/traction/values.yaml index 21feb8f7f..ff67d8b0a 100644 --- a/charts/traction/values.yaml +++ b/charts/traction/values.yaml @@ -1,6 +1,6 @@ -## @param nameOverride +## @param nameOverride String to override the helm chart name, second part of the prefix nameOverride: "" -## @param fullnameOverride +## @param fullnameOverride String to fully override the helm chart name, full prefix. *Must be provided if using a custom release name.* fullnameOverride: "" ## @param ingressSuffix Domain suffix to be used for default hostpaths in ingress ingressSuffix: -dev.example.com @@ -173,8 +173,8 @@ acapy: ## @param acapy.walletStorageCredentials.admin_account Database account with CREATEDB role used to create additional databases per wallet. ## @param acapy.walletStorageCredentials.admin_password Database password for admin account. ## @param acapy.walletStorageCredentials.existingSecret Name of an existing secret containing database user, password, and admin password. - ## @param acapy.walletStorageCredentials.secretKeys.adminPasswordKey Key in existing secret containing admin password. - ## @param acapy.walletStorageCredentials.secretKeys.userPasswordKey Key in existing secret containing password . + ## @param acapy.walletStorageCredentials.secretKeys.adminPasswordKey Key in existing secret containing admin account password. + ## @param acapy.walletStorageCredentials.secretKeys.userPasswordKey Key in existing secret containing account password. ## walletStorageCredentials: json: '' @@ -182,8 +182,8 @@ acapy: admin_account: postgres existingSecret: "" secretKeys: - adminPasswordKey: admin-password - userPasswordKey: database-password + adminPasswordKey: postgres-password + userPasswordKey: password ## @section Acapy Plugins ## ## Specify the plugins to enable. From 569e9dfe4ce5612411da02b6c585d165e11b7325 Mon Sep 17 00:00:00 2001 From: Ivan P <2119240+i5okie@users.noreply.github.com> Date: Mon, 7 Oct 2024 09:28:57 -0700 Subject: [PATCH 4/8] Update Readme Signed-off-by: Ivan P <2119240+i5okie@users.noreply.github.com> --- charts/traction/README.md | 32 ++++++++++++++++++-------------- 1 file changed, 18 insertions(+), 14 deletions(-) diff --git a/charts/traction/README.md b/charts/traction/README.md index 350ead8f1..3a43e10d6 100644 --- a/charts/traction/README.md +++ b/charts/traction/README.md @@ -52,6 +52,12 @@ kubectl delete secret,pvc --selector "app.kubernetes.io/instance"=my-release ## Parameters +| Name | Description | Value | +| ------------------ | -------------------------------------------------------------------------------------------------------------- | ------------------ | +| `nameOverride` | String to override the helm chart name, second part of the prefix | '""' | +| `fullnameOverride` | String to fully override the helm chart name, full prefix. ***Must be set when using a custom release name.*** | '""' | +| `ingressSuffix` | Domain suffix to be used for default hostpaths in ingress | `-dev.example.com` | + ### Acapy Configuration | Name | Description | Value | @@ -126,14 +132,16 @@ kubectl delete secret,pvc --selector "app.kubernetes.io/instance"=my-release ### Wallet Storage Credentials -| Name | Description | Value | -| ----------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------- | -| `acapy.walletStorageCredentials.json` | Raw json with database credentials. Overrides all other values including postgres subchart values. e.g.: '{"account":"postgres","password":"mysecretpassword","admin_account":"postgres","admin_password":"mysecretpassword"}' | `""` | -| `acapy.walletStorageCredentials.account` | Database account name. | `""` | -| `acapy.walletStorageCredentials.password` | Database password. | `""` | -| `acapy.walletStorageCredentials.admin_account` | Database account with CREATEDB role used to create additional databases per wallet. | `postgres` | -| `acapy.walletStorageCredentials.admin_password` | Database password for admin account. | `""` | -| `acapy.walletStorageCredentials.existingSecret` | Name of an existing secret containing 'database-user', 'database-password', 'admin-password' keys. | `""` | +| Name | Description | Value | +| ------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------- | +| `acapy.walletStorageCredentials.json` | Raw json with database credentials. Overrides all other values including postgres subchart values. e.g.: '{"account":"postgres","password":"mysecretpassword","admin_account":"postgres","admin_password":"mysecretpassword"}' | `""` | +| `acapy.walletStorageCredentials.account` | Database account name. | `""` | +| `acapy.walletStorageCredentials.password` | Database password. | `""` | +| `acapy.walletStorageCredentials.admin_account` | Database account with CREATEDB role used to create additional databases per wallet. | `postgres` | +| `acapy.walletStorageCredentials.admin_password` | Database password for admin account. | `""` | +| `acapy.walletStorageCredentials.existingSecret` | Name of an existing secret containing database user, password, and admin password. | `""` | +| `acapy.walletStorageCredentials.secretKeys.adminPasswordKey` | Key in existing secret containing admin account password. | `postgres-password` | +| `acapy.walletStorageCredentials.secretKeys.userPasswordKey` | Key in existing secret containing account password. | `password` | ### Acapy Plugins @@ -326,7 +334,7 @@ kubectl delete secret,pvc --selector "app.kubernetes.io/instance"=my-release | `ui.oidc.extraQueryParams` | OIDC client login additional parameters | `{}` | | `ui.smtp.server` | SMTP server | `""` | | `ui.smtp.port` | SMTP port | `25` | -| `ui.smtp.secure` | if true the connection will use TLS when connecting to server. If false (the default) then TLS is used if server supports the STARTTLS extension. In most cases set this value to true if you are connecting to port 465. For port 587 or 25 keep it false | `false` | +| `ui.smtp.secure` | If true the connection will use TLS when connecting to server. If false (the default) then TLS is used if server supports the STARTTLS extension. In most cases set this value to true if you are connecting to port 465. For port 587 or 25 keep it false | `false` | | `ui.smtp.user` | SMTP user (Requires setting `ui.existingSecret` with the name of a secret containing `SERVER_SMTP_PASSWORD`) | `""` | | `ui.smtp.senderAddress` | SMTP sender address | `""` | | `ui.smtp.innkeeperInbox` | innkeeper notification inbox | `""` | @@ -387,9 +395,6 @@ kubectl delete secret,pvc --selector "app.kubernetes.io/instance"=my-release | `postgresql.fullnameOverride` | When overriding fullnameOverride, you must override this to match. | `""` | | `postgresql.architecture` | PostgreSQL architecture (`standalone` or `replication`) | `standalone` | | `postgresql.auth.enablePostgresUser` | Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user | `true` | -| `postgresql.auth.existingSecret` | Name of existing secret to use for PostgreSQL credentials. `postgresql.auth.postgresPassword`, `postgresql.auth.password`, and `postgresql.auth.replicationPassword` will be ignored and picked up from this secret. The secret might also contains the key `ldap-password` if LDAP is enabled. `ldap.bind_password` will be ignored and picked from this secret in this case. | `{{ include "global.fullname" . }}` | -| `postgresql.auth.secretKeys.adminPasswordKey` | Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set. | `admin-password` | -| `postgresql.auth.secretKeys.userPasswordKey` | Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set. | `database-password` | | `postgresql.auth.database` | Name for a custom database to create | `traction` | | `postgresql.auth.username` | Name for a custom user to create | `acapy` | | `postgresql.primary.persistence.enabled` | Enable PostgreSQL Primary data persistence using PVC | `true` | @@ -401,8 +406,7 @@ kubectl delete secret,pvc --selector "app.kubernetes.io/instance"=my-release | `postgresql.primary.resources.requests.memory` | The requested memory for the PostgreSQL Primary containers | `1300Mi` | | `postgresql.primary.resources.requests.cpu` | The requested cpu for the PostgreSQL Primary containers | `300m` | | `postgresql.primary.service.ports.postgresql` | PostgreSQL service port | `5432` | -| `postgresql.primary.extendedConfiguration` | Extended PostgreSQL Primary configuration (appended to main or default configuration) | `max_connections = 500 | -| ` | +| `postgresql.primary.extendedConfiguration` | Extended PostgreSQL Primary configuration (appended to main or default configuration) | `max_connections = 500` | | `postgresql-ha.enabled` | Deploy HA PostgreSQL chart. Not currently supported, provided for future use. | `false` | ## Maintainers From e50880aa823e3a9c33717bd943317a6bfe809af7 Mon Sep 17 00:00:00 2001 From: Ivan P <2119240+i5okie@users.noreply.github.com> Date: Mon, 7 Oct 2024 09:59:39 -0700 Subject: [PATCH 5/8] Do not hard code values Signed-off-by: Ivan P <2119240+i5okie@users.noreply.github.com> --- charts/traction/templates/_helpers.tpl | 26 +++++++++----------------- 1 file changed, 9 insertions(+), 17 deletions(-) diff --git a/charts/traction/templates/_helpers.tpl b/charts/traction/templates/_helpers.tpl index c318f6ca8..531d5d3b5 100755 --- a/charts/traction/templates/_helpers.tpl +++ b/charts/traction/templates/_helpers.tpl @@ -122,14 +122,10 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this Get the admin-password key. */}} {{- define "acapy.database.adminPasswordKey" -}} -{{- if .Values.acapy.walletStorageCredentials.existingSecret -}} - {{- if .Values.acapy.walletStorageCredentials.secretKeys.adminPasswordKey -}} - {{- printf "%s" (tpl .Values.acapy.walletStorageCredentials.secretKeys.adminPasswordKey $) -}} - {{- else if .Values.postgresql.auth.secretKeys.adminPasswordKey -}} - {{- printf "%s" (tpl .Values.postgresql.auth.secretKeys.adminPasswordKey $) -}} - {{- end -}} -{{- else -}} - {{- "admin-password" -}} +{{- if .Values.acapy.walletStorageCredentials.secretKeys.adminPasswordKey -}} + {{- printf "%s" (tpl .Values.acapy.walletStorageCredentials.secretKeys.adminPasswordKey $) -}} +{{- else if .Values.postgresql.auth.secretKeys.adminPasswordKey -}} + {{- printf "%s" (tpl .Values.postgresql.auth.secretKeys.adminPasswordKey $) -}} {{- end -}} {{- end -}} @@ -137,16 +133,12 @@ Get the admin-password key. Get the user-password key. */}} {{- define "acapy.database.userPasswordKey" -}} -{{- if .Values.acapy.walletStorageCredentials.existingSecret -}} - {{- if or (empty .Values.acapy.walletStorageCredentials.account) (eq .Values.acapy.walletStorageCredentials.account "postgres") -}} - {{- printf "%s" (include "acapy.database.adminPasswordKey" .) -}} - {{- else -}} - {{- if .Values.acapy.walletStorageCredentials.secretKeys.userPasswordKey -}} - {{- printf "%s" (tpl .Values.acapy.walletStorageCredentials.secretKeys.userPasswordKey $) -}} - {{- end -}} - {{- end -}} +{{- if or (empty .Values.acapy.walletStorageCredentials.account) (eq .Values.acapy.walletStorageCredentials.account "postgres") -}} + {{- printf "%s" (include "acapy.database.adminPasswordKey" .) -}} {{- else -}} - {{- "database-password" -}} + {{- if .Values.acapy.walletStorageCredentials.secretKeys.userPasswordKey -}} + {{- printf "%s" (tpl .Values.acapy.walletStorageCredentials.secretKeys.userPasswordKey $) -}} + {{- end -}} {{- end -}} {{- end -}} From 70ea1cdb831f16da5b89e8875723b0299944aed0 Mon Sep 17 00:00:00 2001 From: Ivan P <2119240+i5okie@users.noreply.github.com> Date: Wed, 9 Oct 2024 07:20:27 -0700 Subject: [PATCH 6/8] Update language Signed-off-by: Ivan P <2119240+i5okie@users.noreply.github.com> --- charts/traction/README.md | 10 +++++----- charts/traction/values.yaml | 2 +- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/charts/traction/README.md b/charts/traction/README.md index 3a43e10d6..4e190c718 100644 --- a/charts/traction/README.md +++ b/charts/traction/README.md @@ -52,11 +52,11 @@ kubectl delete secret,pvc --selector "app.kubernetes.io/instance"=my-release ## Parameters -| Name | Description | Value | -| ------------------ | -------------------------------------------------------------------------------------------------------------- | ------------------ | -| `nameOverride` | String to override the helm chart name, second part of the prefix | '""' | -| `fullnameOverride` | String to fully override the helm chart name, full prefix. ***Must be set when using a custom release name.*** | '""' | -| `ingressSuffix` | Domain suffix to be used for default hostpaths in ingress | `-dev.example.com` | +| Name | Description | Value | +| ------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------ | +| `nameOverride` | String to override the helm chart name, second part of the prefix | '""' | +| `fullnameOverride` | String to fully override the helm chart name, full prefix. ***Must be set when using a custom release name that does not include the word traction.*** | '""' | +| `ingressSuffix` | Domain suffix to be used for default hostpaths in ingress | `-dev.example.com` | ### Acapy Configuration diff --git a/charts/traction/values.yaml b/charts/traction/values.yaml index ff67d8b0a..9b0ed6d62 100644 --- a/charts/traction/values.yaml +++ b/charts/traction/values.yaml @@ -1,6 +1,6 @@ ## @param nameOverride String to override the helm chart name, second part of the prefix nameOverride: "" -## @param fullnameOverride String to fully override the helm chart name, full prefix. *Must be provided if using a custom release name.* +## @param fullnameOverride String to fully override the helm chart name, full prefix. *Must be provided if using a custom release name that does not include the word traction.* fullnameOverride: "" ## @param ingressSuffix Domain suffix to be used for default hostpaths in ingress ingressSuffix: -dev.example.com From ea48b2325932aac18ffa03f2268ffc144190cb36 Mon Sep 17 00:00:00 2001 From: Ivan P <2119240+i5okie@users.noreply.github.com> Date: Wed, 9 Oct 2024 12:01:02 -0700 Subject: [PATCH 7/8] update documentation Signed-off-by: Ivan P <2119240+i5okie@users.noreply.github.com> --- charts/traction/README.md | 38 ++++++++++++++++++------------------- charts/traction/values.yaml | 4 ++-- 2 files changed, 21 insertions(+), 21 deletions(-) diff --git a/charts/traction/README.md b/charts/traction/README.md index 4e190c718..3f7b756fc 100644 --- a/charts/traction/README.md +++ b/charts/traction/README.md @@ -389,25 +389,25 @@ kubectl delete secret,pvc --selector "app.kubernetes.io/instance"=my-release ### PostgreSQL parameters -| Name | Description | Value | -| ----------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ----------------------------------- | -| `postgresql.enabled` | Deploy Bitnami PostgreSQL chart. | `true` | -| `postgresql.fullnameOverride` | When overriding fullnameOverride, you must override this to match. | `""` | -| `postgresql.architecture` | PostgreSQL architecture (`standalone` or `replication`) | `standalone` | -| `postgresql.auth.enablePostgresUser` | Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user | `true` | -| `postgresql.auth.database` | Name for a custom database to create | `traction` | -| `postgresql.auth.username` | Name for a custom user to create | `acapy` | -| `postgresql.primary.persistence.enabled` | Enable PostgreSQL Primary data persistence using PVC | `true` | -| `postgresql.primary.persistence.size` | PVC Storage Request for PostgreSQL volume | `1Gi` | -| `postgresql.primary.containerSecurityContext.enabled` | Enable container security context | `false` | -| `postgresql.primary.podSecurityContext.enabled` | Enable security context | `false` | -| `postgresql.primary.resources.limits.memory` | The memory limit for the PostgreSQL Primary containers | `2600Mi` | -| `postgresql.primary.resources.limits.cpu` | The cpu limit for the PostgreSQL Primary containers | `600m` | -| `postgresql.primary.resources.requests.memory` | The requested memory for the PostgreSQL Primary containers | `1300Mi` | -| `postgresql.primary.resources.requests.cpu` | The requested cpu for the PostgreSQL Primary containers | `300m` | -| `postgresql.primary.service.ports.postgresql` | PostgreSQL service port | `5432` | -| `postgresql.primary.extendedConfiguration` | Extended PostgreSQL Primary configuration (appended to main or default configuration) | `max_connections = 500` | -| `postgresql-ha.enabled` | Deploy HA PostgreSQL chart. Not currently supported, provided for future use. | `false` | +| Name | Description | Value | +| ----------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------- | +| `postgresql.enabled` | Deploy Bitnami PostgreSQL chart. | `true` | +| `postgresql.fullnameOverride` | When overriding fullnameOverride, you must override this to match. | `""` | +| `postgresql.architecture` | PostgreSQL architecture (`standalone` or `replication`) | `standalone` | +| `postgresql.auth.enablePostgresUser` | Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user. Not recommended for production deployment. | `true` | +| `postgresql.auth.database` | Name for a custom database to create | `traction` | +| `postgresql.auth.username` | Name for a custom user to create | `acapy` | +| `postgresql.primary.persistence.enabled` | Enable PostgreSQL Primary data persistence using PVC | `true` | +| `postgresql.primary.persistence.size` | PVC Storage Request for PostgreSQL volume | `1Gi` | +| `postgresql.primary.containerSecurityContext.enabled` | Enable container security context | `false` | +| `postgresql.primary.podSecurityContext.enabled` | Enable security context | `false` | +| `postgresql.primary.resources.limits.memory` | The memory limit for the PostgreSQL Primary containers | `2600Mi` | +| `postgresql.primary.resources.limits.cpu` | The cpu limit for the PostgreSQL Primary containers | `600m` | +| `postgresql.primary.resources.requests.memory` | The requested memory for the PostgreSQL Primary containers | `1300Mi` | +| `postgresql.primary.resources.requests.cpu` | The requested cpu for the PostgreSQL Primary containers | `300m` | +| `postgresql.primary.service.ports.postgresql` | PostgreSQL service port | `5432` | +| `postgresql.primary.extendedConfiguration` | Extended PostgreSQL Primary configuration (appended to main or default configuration) | `max_connections = 500` | +| `postgresql-ha.enabled` | Deploy HA PostgreSQL chart. Not currently supported, provided for future use. | `false` | ## Maintainers diff --git a/charts/traction/values.yaml b/charts/traction/values.yaml index 9b0ed6d62..6c063afe0 100644 --- a/charts/traction/values.yaml +++ b/charts/traction/values.yaml @@ -860,12 +860,12 @@ postgresql: ## ref: https://github.com/bitnami/containers/tree/main/bitnami/postgresql#creating-a-database-user-on-first-run ## auth: - ## @param postgresql.auth.enablePostgresUser Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user + ## @param postgresql.auth.enablePostgresUser Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user. Not recommended for production deployment. ## enablePostgresUser: true ## @param postgresql.auth.database Name for a custom database to create ## - database: traction + database: askar-wallet ## @param postgresql.auth.username Name for a custom user to create ## username: acapy From cd35af9094ba6d4a5dd279503905a265adc7c174 Mon Sep 17 00:00:00 2001 From: Ivan P <2119240+i5okie@users.noreply.github.com> Date: Wed, 9 Oct 2024 12:02:35 -0700 Subject: [PATCH 8/8] bump chart version Signed-off-by: Ivan P <2119240+i5okie@users.noreply.github.com> --- charts/traction/Chart.yaml | 2 +- charts/traction/README.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/charts/traction/Chart.yaml b/charts/traction/Chart.yaml index 53d4e178a..d95daba9f 100644 --- a/charts/traction/Chart.yaml +++ b/charts/traction/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: traction description: The Traction service allows organizations to verify, hold, and issue verifiable credentials. The Traction Tenant UI allows tenants to manage their agent. type: application -version: 0.3.3 +version: 0.3.4 appVersion: 0.5.1 home: "https://github.com/bcgov/traction" sources: ["https://github.com/bcgov/traction"] diff --git a/charts/traction/README.md b/charts/traction/README.md index 3f7b756fc..cead9cd71 100644 --- a/charts/traction/README.md +++ b/charts/traction/README.md @@ -1,6 +1,6 @@ # Traction -![version: 0.3.3](https://img.shields.io/badge/Version-0.3.3-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.5.1](https://img.shields.io/badge/AppVersion-0.5.1-informational?style=flat-square) +![version: 0.3.4](https://img.shields.io/badge/Version-0.3.4-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.5.1](https://img.shields.io/badge/AppVersion-0.5.1-informational?style=flat-square) The Traction service allows organizations to verify, hold, and issue verifiable credentials.