logo
0
0
WeChat Login
zuowenping<zuowenping@qianxin.com>
提交源文件

Bitnami Common Library Chart

A Helm Library Chart for grouping common logic between Bitnami charts.

TL;DR

dependencies: - name: common version: 2.x.x repository: oci://registry-1.docker.io/bitnamicharts
helm dependency update
apiVersion: v1 kind: ConfigMap metadata: name: {{ include "common.names.fullname" . }} data: myvalue: "Hello World"

Looking to use our applications in production? Try VMware Tanzu Application Catalog, the commercial edition of the Bitnami catalog.

Introduction

This chart provides a common template helpers which can be used to develop new charts using Helm package manager.

Bitnami charts can be used with Kubeapps for deployment and management of Helm Charts in clusters.

Prerequisites

  • Kubernetes 1.23+
  • Helm 3.8.0+

Parameters

The following table lists the helpers available in the library which are scoped in different sections.

Affinities

Helper identifierDescriptionExpected Input
common.affinities.nodes.softReturn a soft nodeAffinity definitiondict "key" "FOO" "values" (list "BAR" "BAZ")
common.affinities.nodes.hardReturn a hard nodeAffinity definitiondict "key" "FOO" "values" (list "BAR" "BAZ")
common.affinities.nodesReturn a nodeAffinity definitiondict "type" "soft" "key" "FOO" "values" (list "BAR" "BAZ")
common.affinities.topologyKeyReturn a topologyKey definitiondict "topologyKey" "FOO"
common.affinities.pods.softReturn a soft podAffinity/podAntiAffinity definitiondict "component" "FOO" "context" $
common.affinities.pods.hardReturn a hard podAffinity/podAntiAffinity definitiondict "component" "FOO" "context" $
common.affinities.podsReturn a podAffinity/podAntiAffinity definitiondict "type" "soft" "key" "FOO" "values" (list "BAR" "BAZ")

Capabilities

Helper identifierDescriptionExpected Input
common.capabilities.kubeVersionReturn the target Kubernetes version (using client default if .Values.kubeVersion is not set).. Chart context
common.capabilities.apiVersions.hasReturn true if the apiVersion is supporteddict "version" "batch/v1" "context" $
common.capabilities.job.apiVersionReturn the appropriate apiVersion for job.. Chart context
common.capabilities.cronjob.apiVersionReturn the appropriate apiVersion for cronjob.. Chart context
common.capabilities.daemonset.apiVersionReturn the appropriate apiVersion for daemonset.. Chart context
common.capabilities.cronjob.apiVersionReturn the appropriate apiVersion for cronjob.. Chart context
common.capabilities.deployment.apiVersionReturn the appropriate apiVersion for deployment.. Chart context
common.capabilities.statefulset.apiVersionReturn the appropriate apiVersion for statefulset.. Chart context
common.capabilities.ingress.apiVersionReturn the appropriate apiVersion for ingress.. Chart context
common.capabilities.rbac.apiVersionReturn the appropriate apiVersion for RBAC resources.. Chart context
common.capabilities.crd.apiVersionReturn the appropriate apiVersion for CRDs.. Chart context
common.capabilities.policy.apiVersionReturn the appropriate apiVersion for podsecuritypolicy.. Chart context
common.capabilities.networkPolicy.apiVersionReturn the appropriate apiVersion for networkpolicy.. Chart context
common.capabilities.apiService.apiVersionReturn the appropriate apiVersion for APIService.. Chart context
common.capabilities.hpa.apiVersionReturn the appropriate apiVersion for Horizontal Pod Autoscaler. Chart context
common.capabilities.vpa.apiVersionReturn the appropriate apiVersion for Vertical Pod Autoscaler.. Chart context
common.capabilities.psp.supportedReturns true if PodSecurityPolicy is supported. Chart context
common.capabilities.supportsHelmVersionReturns true if the used Helm version is 3.3+. Chart context
common.capabilities.admissionConfiguration.supportedReturns true if AdmissionConfiguration is supported. Chart context
common.capabilities.admissionConfiguration.apiVersionReturn the appropriate apiVersion for AdmissionConfiguration.. Chart context
common.capabilities.podSecurityConfiguration.apiVersionReturn the appropriate apiVersion for PodSecurityConfiguration.. Chart context

Compatibility

Helper identifierDescriptionExpected Input
common.compatibility.isOpenshiftReturn true if the detected platform is Openshift. Chart context
common.compatibility.renderSecurityContextRender a compatible securityContext depending on the platform. By default it is maintained as it is. In other platforms like Openshift we remove default user/group values that do not work out of the box with the restricted-v1 SCCdict "secContext" .Values.containerSecurityContext "context" $

Errors

Helper identifierDescriptionExpected Input
common.errors.upgrade.passwords.emptyIt will ensure required passwords are given when we are upgrading a chart. If validationErrors is not empty it will throw an error and will stop the upgrade action.dict "validationErrors" (list $validationError00 $validationError01) "context" $
common.errors.insecureImagesThrow error when original container images are replaced. The error can be bypassed by setting the global.security.allowInsecureImages to true.dict "images" (list .Values.path.to.the.imageRoot) "context" $

Images

Helper identifierDescriptionExpected Input
common.images.imageReturn the proper and full image namedict "imageRoot" .Values.path.to.the.image "global" $, see ImageRoot for the structure.
common.images.pullSecretsReturn the proper Docker Image Registry Secret Names (deprecated: use common.images.renderPullSecrets instead)dict "images" (list .Values.path.to.the.image1, .Values.path.to.the.image2) "global" .Values.global
common.images.renderPullSecretsReturn the proper Docker Image Registry Secret Names (evaluates values as templates)dict "images" (list .Values.path.to.the.image1, .Values.path.to.the.image2) "context" $
common.images.versionReturn the proper image versiondict "imageRoot" .Values.path.to.the.image "chart" .Chart , see ImageRoot for the structure.

Ingress

Helper identifierDescriptionExpected Input
common.ingress.backendGenerate a proper Ingress backend entry depending on the API versiondict "serviceName" "foo" "servicePort" "bar", see the Ingress deprecation notice for the syntax differences
common.ingress.supportsPathTypePrints "true" if the pathType field is supported. Chart context
common.ingress.supportsIngressClassnamePrints "true" if the ingressClassname field is supported. Chart context
common.ingress.certManagerRequestPrints "true" if required cert-manager annotations for TLS signed certificates are set in the Ingress annotationsdict "annotations" .Values.path.to.the.ingress.annotations

Labels

Helper identifierDescriptionExpected Input
common.labels.standardReturn Kubernetes standard labels. Chart context
common.labels.matchLabelsLabels to use on deploy.spec.selector.matchLabels and svc.spec.selector. Chart context

Names

Helper identifierDescriptionExpected Input
common.names.nameExpand the name of the chart or use .Values.nameOverride. Chart context
common.names.fullnameCreate a default fully qualified app name.. Chart context
common.names.namespaceAllow the release namespace to be overridden. Chart context
common.names.fullname.namespaceCreate a fully qualified app name adding the installation's namespace. Chart context
common.names.chartChart name plus version. Chart context
common.names.dependency.fullnameCreate a default fully qualified dependency name.dict "chartName" "dependency-chart-name" "chartValues" .Values.dependency-chart "context" $

Resources

Helper identifierDescriptionExpected Input
common.resources.presetReturn a resource request/limit object based on a given preset. These presets are for basic testing and not meant to be used in production.dict "type" "nano"

Secrets

Helper identifierDescriptionExpected Input
common.secrets.nameGenerate the name of the secret.dict "existingSecret" .Values.path.to.the.existingSecret "defaultNameSuffix" "mySuffix" "context" $ see ExistingSecret for the structure.
common.secrets.keyGenerate secret key.dict "existingSecret" .Values.path.to.the.existingSecret "key" "keyName" see ExistingSecret for the structure.
common.secrets.passwords.manageGenerate secret password or retrieve one if already created.dict "secret" "secret-name" "key" "keyName" "providedValues" (list "path.to.password1" "path.to.password2") "length" 10 "strong" false "chartName" "chartName" "honorProvidedValues" false "context" $, length, strong, honorProvidedValues and chartName fields are optional.
common.secrets.existsReturns whether a previous generated secret already exists.dict "secret" "secret-name" "context" $
common.secrets.lookupReuses the value from an existing secret, otherwise sets its value to a default value.dict "secret" "secret-name" "key" "keyName" "defaultValue" .Values.myValue "context" $

Storage

Helper identifierDescriptionExpected Input
common.storage.classReturn the proper Storage Classdict "persistence" .Values.path.to.the.persistence "global" $, see Persistence for the structure.

TplValues

Helper identifierDescriptionExpected Input
common.tplvalues.renderRenders a value that contains templatedict "value" .Values.path.to.the.Value "context" $, value is the value should rendered as template, context frequently is the chart context $ or .
common.tplvalues.mergeMerge a list of values that contains template after rendering them.dict "values" (list .Values.path.to.the.Value1 .Values.path.to.the.Value2) "context" $
common.tplvalues.merge-overwriteMerge a list of values that contains template after rendering them.dict "values" (list .Values.path.to.the.Value1 .Values.path.to.the.Value2) "context" $

Utils

Helper identifierDescriptionExpected Input
common.utils.fieldToEnvVarBuild environment variable name given a field.dict "field" "my-password"
common.utils.secret.getvaluePrint instructions to get a secret value.dict "secret" "secret-name" "field" "secret-value-field" "context" $
common.utils.getValueFromKeyGets a value from .Values object given its key pathdict "key" "path.to.key" "context" $
common.utils.getKeyFromListReturns first .Values key with a defined value or first of the list if all non-defineddict "keys" (list "path.to.key1" "path.to.key2") "context" $
common.utils.checksumTemplateChecksum a template at "path" containing a single resource (ConfigMap,Secret) for use in pod annotations, excluding the metadata (see #18376)dict "path" "/configmap.yaml" "context" $

Validations

Helper identifierDescriptionExpected Input
common.validations.values.single.emptyValidate a value must not be empty.dict "valueKey" "path.to.value" "secret" "secret.name" "field" "my-password" "subchart" "subchart" "context" $ secret, field and subchart are optional. In case they are given, the helper will generate a how to get instruction. See ValidateValue
common.validations.values.multiple.emptyValidate a multiple values must not be empty. It returns a shared error for all the values.dict "required" (list $validateValueConf00 $validateValueConf01) "context" $. See ValidateValue
common.validations.values.mariadb.passwordsThis helper will ensure required password for MariaDB are not empty. It returns a shared error for all the values.dict "secret" "mariadb-secret" "subchart" "true" "context" $ subchart field is optional and could be true or false it depends on where you will use mariadb chart and the helper.

Warnings

Helper identifierDescriptionExpected Input
common.warnings.rollingTagWarning about using rolling tag.ImageRoot see ImageRoot for the structure.
common.warnings.modifiedImagesWarning about replaced images from the original.ImageRoot see ImageRoot for the structure.
common.warnings.resourcesWarning about not setting the resource object in all deployments.dict "sections" (list "path1" "path2") context $

Special input schemas

ImageRoot

registry: type: string description: Docker registry where the image is located example: docker.io repository: type: string description: Repository and image name example: bitnami/nginx tag: type: string description: image tag example: 1.16.1-debian-10-r63 pullPolicy: type: string description: Specify a imagePullPolicy.' pullSecrets: type: array items: type: string description: Optionally specify an array of imagePullSecrets (evaluated as templates). debug: type: boolean description: Set to true if you would like to see extra information on logs example: false ## An instance would be: # registry: docker.io # repository: bitnami/nginx # tag: 1.16.1-debian-10-r63 # pullPolicy: IfNotPresent # debug: false

Persistence

enabled: type: boolean description: Whether enable persistence. example: true storageClass: type: string description: Ghost data Persistent Volume Storage Class, If set to "-", storageClassName: "" which disables dynamic provisioning. example: "-" accessMode: type: string description: Access mode for the Persistent Volume Storage. example: ReadWriteOnce size: type: string description: Size the Persistent Volume Storage. example: 8Gi path: type: string description: Path to be persisted. example: /bitnami ## An instance would be: # enabled: true # storageClass: "-" # accessMode: ReadWriteOnce # size: 8Gi # path: /bitnami

ExistingSecret

name: type: string description: Name of the existing secret. example: mySecret keyMapping: description: Mapping between the expected key name and the name of the key in the existing secret. type: object ## An instance would be: # name: mySecret # keyMapping: # password: myPasswordKey

Example of use

When we store sensitive data for a deployment in a secret, some times we want to give to users the possibility of using theirs existing secrets.

# templates/secret.yaml --- apiVersion: v1 kind: Secret metadata: name: {{ include "common.names.fullname" . }} labels: app: {{ include "common.names.fullname" . }} type: Opaque data: password: {{ .Values.password | b64enc | quote }} # templates/dpl.yaml --- ... env: - name: PASSWORD valueFrom: secretKeyRef: name: {{ include "common.secrets.name" (dict "existingSecret" .Values.existingSecret "context" $) }} key: {{ include "common.secrets.key" (dict "existingSecret" .Values.existingSecret "key" "password") }} ... # values.yaml --- name: mySecret keyMapping: password: myPasswordKey

ValidateValue

NOTES.txt

{{- $validateValueConf00 := (dict "valueKey" "path.to.value00" "secret" "secretName" "field" "password-00") -}} {{- $validateValueConf01 := (dict "valueKey" "path.to.value01" "secret" "secretName" "field" "password-01") -}} {{ include "common.validations.values.multiple.empty" (dict "required" (list $validateValueConf00 $validateValueConf01) "context" $) }}

If we force those values to be empty we will see some alerts

helm install test mychart --set path.to.value00="",path.to.value01="" 'path.to.value00' must not be empty, please add '--set path.to.value00=$PASSWORD_00' to the command. To get the current value: export PASSWORD_00=$(kubectl get secret --namespace default secretName -o jsonpath="{.data.password-00}" | base64 -d) 'path.to.value01' must not be empty, please add '--set path.to.value01=$PASSWORD_01' to the command. To get the current value: export PASSWORD_01=$(kubectl get secret --namespace default secretName -o jsonpath="{.data.password-01}" | base64 -d)

Upgrading

To 1.0.0

On November 13, 2020, Helm v2 support was formally finished, this major version is the result of the required changes applied to the Helm Chart to be able to incorporate the different features added in Helm v3 and to be consistent with the Helm project itself regarding the Helm v2 EOL.

What changes were introduced in this major version?

  • Previous versions of this Helm Chart use apiVersion: v1 (installable by both Helm 2 and 3), this Helm Chart was updated to apiVersion: v2 (installable by Helm 3 only). Here you can find more information about the apiVersion field.
  • Use type: library. Here you can find more information.
  • The different fields present in the Chart.yaml file has been ordered alphabetically in a homogeneous way for all the Bitnami Helm Charts

Considerations when upgrading to this version

  • If you want to upgrade to this version from a previous one installed with Helm v3, you shouldn't face any issues
  • If you want to upgrade to this version using Helm v2, this scenario is not supported as this version doesn't support Helm v2 anymore
  • If you installed the previous version with Helm v2 and wants to upgrade to this version with Helm v3, please refer to the official Helm documentation about migrating from Helm v2 to v3

Useful links

License

Copyright © 2025 Broadcom. The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

About

No description, topics, or website provided.
Language
Markdown17.9%
Others82.1%