From cd9b53ce5348d2c0dc2487c033abd82396d63297 Mon Sep 17 00:00:00 2001 From: kubeapps-bot Date: Fri, 1 Mar 2024 09:57:20 +0000 Subject: [PATCH 1/2] bump chart version to 14.6.0 Signed-off-by: kubeapps-bot --- chart/kubeapps/.helmignore | 2 +- chart/kubeapps/Chart.yaml | 2 +- chart/kubeapps/README.md | 11 ++++++++- .../templates/apprepository/deployment.yaml | 19 ++++++++++----- .../templates/dashboard/deployment.yaml | 11 +++++++++ .../templates/frontend/deployment.yaml | 24 ++++++++++++++++--- .../templates/kubeappsapis/deployment.yaml | 14 ++++++++--- chart/kubeapps/values.yaml | 14 +++++++++++ 8 files changed, 82 insertions(+), 15 deletions(-) diff --git a/chart/kubeapps/.helmignore b/chart/kubeapps/.helmignore index 1206beba76a..46d67d5b770 100644 --- a/chart/kubeapps/.helmignore +++ b/chart/kubeapps/.helmignore @@ -1,4 +1,4 @@ -# Copyright 2021-2024 the Kubeapps contributors. +# Copyright 2021-2022 the Kubeapps contributors. # SPDX-License-Identifier: Apache-2.0 # Patterns to ignore when building packages. diff --git a/chart/kubeapps/Chart.yaml b/chart/kubeapps/Chart.yaml index 06902d3f2cf..2878822fc9e 100644 --- a/chart/kubeapps/Chart.yaml +++ b/chart/kubeapps/Chart.yaml @@ -52,4 +52,4 @@ maintainers: name: kubeapps sources: - https://github.com/bitnami/charts/tree/main/bitnami/kubeapps -version: 14.5.3-dev +version: 14.6.0 diff --git a/chart/kubeapps/README.md b/chart/kubeapps/README.md index 28656599211..e1b0b5afbdc 100644 --- a/chart/kubeapps/README.md +++ b/chart/kubeapps/README.md @@ -1,3 +1,5 @@ + + # Bitnami package for Kubeapps Kubeapps is a web-based UI for launching and managing applications on Kubernetes. It allows users to deploy trusted applications and operators to control users access to the cluster. @@ -139,6 +141,7 @@ Once you have installed Kubeapps follow the [Getting Started Guide](https://gith | `frontend.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | | `frontend.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` | | `frontend.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `frontend.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `0` | | `frontend.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | | `frontend.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | | `frontend.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` | @@ -238,6 +241,7 @@ Once you have installed Kubeapps follow the [Getting Started Guide](https://gith | `dashboard.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | | `dashboard.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` | | `dashboard.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `dashboard.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `0` | | `dashboard.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | | `dashboard.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | | `dashboard.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` | @@ -330,6 +334,7 @@ Once you have installed Kubeapps follow the [Getting Started Guide](https://gith | `apprepository.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | | `apprepository.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` | | `apprepository.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `apprepository.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `0` | | `apprepository.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | | `apprepository.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | | `apprepository.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` | @@ -400,6 +405,7 @@ Once you have installed Kubeapps follow the [Getting Started Guide](https://gith | `authProxy.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | | `authProxy.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` | | `authProxy.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `authProxy.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `0` | | `authProxy.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | | `authProxy.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | | `authProxy.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` | @@ -439,6 +445,7 @@ Once you have installed Kubeapps follow the [Getting Started Guide](https://gith | `pinnipedProxy.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | | `pinnipedProxy.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` | | `pinnipedProxy.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `pinnipedProxy.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `0` | | `pinnipedProxy.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | | `pinnipedProxy.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | | `pinnipedProxy.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` | @@ -532,6 +539,7 @@ Once you have installed Kubeapps follow the [Getting Started Guide](https://gith | `kubeappsapis.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | | `kubeappsapis.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` | | `kubeappsapis.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `kubeappsapis.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `0` | | `kubeappsapis.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | | `kubeappsapis.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | | `kubeappsapis.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` | @@ -612,6 +620,7 @@ Once you have installed Kubeapps follow the [Getting Started Guide](https://gith | `ociCatalog.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | | `ociCatalog.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` | | `ociCatalog.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `ociCatalog.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `0` | | `ociCatalog.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | | `ociCatalog.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | | `ociCatalog.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` | @@ -1180,4 +1189,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/chart/kubeapps/templates/apprepository/deployment.yaml b/chart/kubeapps/templates/apprepository/deployment.yaml index dfcb25be5ab..d5730f13c1f 100644 --- a/chart/kubeapps/templates/apprepository/deployment.yaml +++ b/chart/kubeapps/templates/apprepository/deployment.yaml @@ -142,9 +142,13 @@ spec: - secretRef: name: {{ include "common.tplvalues.render" (dict "value" .Values.apprepository.extraEnvVarsSecret "context" $) }} {{- end }} - {{- if .Values.apprepository.extraVolumeMounts }} - volumeMounts: {{- include "common.tplvalues.render" (dict "value" .Values.apprepository.extraVolumeMounts "context" $) | nindent 12 }} - {{- end }} + volumeMounts: + - name: empty-dir + mountPath: /tmp + subPath: tmp-dir + {{- if .Values.apprepository.extraVolumeMounts }} + {{- include "common.tplvalues.render" (dict "value" .Values.apprepository.extraVolumeMounts "context" $) | nindent 12 }} + {{- end }} {{- if .Values.apprepository.resources }} resources: {{- toYaml .Values.apprepository.resources | nindent 12 }} {{- else if ne .Values.apprepository.resourcesPreset "none" }} @@ -153,7 +157,10 @@ spec: {{- if .Values.apprepository.sidecars }} {{- include "common.tplvalues.render" (dict "value" .Values.apprepository.sidecars "context" $) | trim | nindent 8 }} {{- end }} - {{- if .Values.apprepository.extraVolumes }} - volumes: {{- include "common.tplvalues.render" (dict "value" .Values.apprepository.extraVolumes "context" $) | nindent 8 }} - {{- end }} + volumes: + - name: empty-dir + emptyDir: {} + {{- if .Values.apprepository.extraVolumes }} + {{- include "common.tplvalues.render" (dict "value" .Values.apprepository.extraVolumes "context" $) | nindent 8 }} + {{- end }} {{- end }} diff --git a/chart/kubeapps/templates/dashboard/deployment.yaml b/chart/kubeapps/templates/dashboard/deployment.yaml index 6f9db974dc2..0ae26a9f22f 100644 --- a/chart/kubeapps/templates/dashboard/deployment.yaml +++ b/chart/kubeapps/templates/dashboard/deployment.yaml @@ -140,6 +140,15 @@ spec: volumeMounts: - name: vhost mountPath: /opt/bitnami/nginx/conf/server_blocks + - name: empty-dir + mountPath: /tmp + subPath: tmp-dir + - name: empty-dir + mountPath: /opt/bitnami/nginx/tmp + subPath: app-tmp-dir + - name: empty-dir + mountPath: /opt/bitnami/nginx/logs + subPath: app-logs-dir - name: config mountPath: /app/config.json subPath: config.json @@ -156,6 +165,8 @@ spec: {{- include "common.tplvalues.render" (dict "value" .Values.dashboard.sidecars "context" $) | nindent 8 }} {{- end }} volumes: + - name: empty-dir + emptyDir: {} - name: vhost configMap: name: {{ template "kubeapps.dashboard-config.fullname" . }} diff --git a/chart/kubeapps/templates/frontend/deployment.yaml b/chart/kubeapps/templates/frontend/deployment.yaml index 3ebf4f4fe24..3a03768bb3b 100644 --- a/chart/kubeapps/templates/frontend/deployment.yaml +++ b/chart/kubeapps/templates/frontend/deployment.yaml @@ -137,6 +137,15 @@ spec: resources: {{- include "common.resources.preset" (dict "type" .Values.frontend.resourcesPreset) | nindent 12 }} {{- end }} volumeMounts: + - name: empty-dir + mountPath: /tmp + subPath: tmp-dir + - name: empty-dir + mountPath: /opt/bitnami/nginx/tmp + subPath: app-tmp-dir + - name: empty-dir + mountPath: /opt/bitnami/nginx/logs + subPath: app-logs-dir - name: vhost mountPath: /opt/bitnami/nginx/conf/server_blocks {{- if .Values.frontend.extraVolumeMounts }} @@ -225,9 +234,13 @@ spec: {{- else if ne .Values.authProxy.resourcesPreset "none" }} resources: {{- include "common.resources.preset" (dict "type" .Values.authProxy.resourcesPreset) | nindent 12 }} {{- end }} - {{- if .Values.authProxy.extraVolumeMounts }} - volumeMounts: {{- include "common.tplvalues.render" (dict "value" .Values.authProxy.extraVolumeMounts "context" $) | nindent 12 }} - {{- end }} + volumeMounts: + - name: empty-dir + mountPath: /tmp + subPath: tmp-dir + {{- if .Values.authProxy.extraVolumeMounts }} + {{- include "common.tplvalues.render" (dict "value" .Values.authProxy.extraVolumeMounts "context" $) | nindent 12 }} + {{- end }} {{- end }} {{- if and (gt (len .Values.clusters) 1) (not .Values.authProxy.enabled) }} {{ fail "clusters can be configured only when using an auth proxy for cluster oidc authentication." }} @@ -292,6 +305,9 @@ spec: resources: {{- include "common.resources.preset" (dict "type" .Values.pinnipedProxy.resourcesPreset) | nindent 12 }} {{- end }} volumeMounts: + - name: empty-dir + mountPath: /tmp + subPath: tmp-dir {{- if .Values.pinnipedProxy.tls.existingSecret }} - name: pinniped-tls-secret mountPath: "/etc/pinniped-tls" @@ -305,6 +321,8 @@ spec: {{- include "common.tplvalues.render" (dict "value" .Values.frontend.sidecars "context" $) | nindent 8 }} {{- end }} volumes: + - name: empty-dir + emptyDir: {} - name: vhost configMap: name: {{ template "kubeapps.frontend-config.fullname" . }} diff --git a/chart/kubeapps/templates/kubeappsapis/deployment.yaml b/chart/kubeapps/templates/kubeappsapis/deployment.yaml index 133edc01032..c30a076277a 100644 --- a/chart/kubeapps/templates/kubeappsapis/deployment.yaml +++ b/chart/kubeapps/templates/kubeappsapis/deployment.yaml @@ -213,6 +213,9 @@ spec: resources: {{- include "common.resources.preset" (dict "type" .Values.kubeappsapis.resourcesPreset) | nindent 12 }} {{- end }} volumeMounts: + - name: empty-dir + mountPath: /tmp + subPath: tmp-dir {{- if .Values.clusters }} - name: clusters-config mountPath: /config @@ -310,14 +313,19 @@ spec: resources: {{- include "common.resources.preset" (dict "type" .Values.ociCatalog.resourcesPreset) | nindent 12 }} {{- end }} volumeMounts: - {{- if .Values.ociCatalog.extraVolumeMounts }} - {{- include "common.tplvalues.render" (dict "value" .Values.ociCatalog.extraVolumeMounts "context" $) | nindent 12 }} - {{- end }} + - name: empty-dir + mountPath: /tmp + subPath: tmp-dir + {{- if .Values.ociCatalog.extraVolumeMounts }} + {{- include "common.tplvalues.render" (dict "value" .Values.ociCatalog.extraVolumeMounts "context" $) | nindent 12 }} + {{- end }} {{- end }} {{- if .Values.kubeappsapis.sidecars }} {{- include "common.tplvalues.render" (dict "value" .Values.kubeappsapis.sidecars "context" $) | trim | nindent 8 }} {{- end }} volumes: + - name: empty-dir + emptyDir: {} {{- if .Values.clusters }} - name: clusters-config configMap: diff --git a/chart/kubeapps/values.yaml b/chart/kubeapps/values.yaml index cc0c078bbf4..d39b6f5d523 100644 --- a/chart/kubeapps/values.yaml +++ b/chart/kubeapps/values.yaml @@ -301,6 +301,7 @@ frontend: ## @param frontend.containerSecurityContext.enabled Enabled containers' Security Context ## @param frontend.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container ## @param frontend.containerSecurityContext.runAsUser Set containers' Security Context runAsUser + ## @param frontend.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup ## @param frontend.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## @param frontend.containerSecurityContext.privileged Set container's Security Context privileged ## @param frontend.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem @@ -312,6 +313,7 @@ frontend: enabled: true seLinuxOptions: null runAsUser: 1001 + runAsGroup: 0 runAsNonRoot: true privileged: false readOnlyRootFilesystem: false @@ -678,6 +680,7 @@ dashboard: ## @param dashboard.containerSecurityContext.enabled Enabled containers' Security Context ## @param dashboard.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container ## @param dashboard.containerSecurityContext.runAsUser Set containers' Security Context runAsUser + ## @param dashboard.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup ## @param dashboard.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## @param dashboard.containerSecurityContext.privileged Set container's Security Context privileged ## @param dashboard.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem @@ -689,6 +692,7 @@ dashboard: enabled: true seLinuxOptions: null runAsUser: 1001 + runAsGroup: 0 runAsNonRoot: true privileged: false readOnlyRootFilesystem: false @@ -1051,6 +1055,7 @@ apprepository: ## @param apprepository.containerSecurityContext.enabled Enabled containers' Security Context ## @param apprepository.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container ## @param apprepository.containerSecurityContext.runAsUser Set containers' Security Context runAsUser + ## @param apprepository.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup ## @param apprepository.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## @param apprepository.containerSecurityContext.privileged Set container's Security Context privileged ## @param apprepository.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem @@ -1062,6 +1067,7 @@ apprepository: enabled: true seLinuxOptions: null runAsUser: 1001 + runAsGroup: 0 runAsNonRoot: true privileged: false readOnlyRootFilesystem: false @@ -1315,6 +1321,7 @@ authProxy: ## @param authProxy.containerSecurityContext.enabled Enabled containers' Security Context ## @param authProxy.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container ## @param authProxy.containerSecurityContext.runAsUser Set containers' Security Context runAsUser + ## @param authProxy.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup ## @param authProxy.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## @param authProxy.containerSecurityContext.privileged Set container's Security Context privileged ## @param authProxy.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem @@ -1326,6 +1333,7 @@ authProxy: enabled: true seLinuxOptions: null runAsUser: 1001 + runAsGroup: 0 runAsNonRoot: true privileged: false readOnlyRootFilesystem: false @@ -1444,6 +1452,7 @@ pinnipedProxy: ## @param pinnipedProxy.containerSecurityContext.enabled Enabled containers' Security Context ## @param pinnipedProxy.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container ## @param pinnipedProxy.containerSecurityContext.runAsUser Set containers' Security Context runAsUser + ## @param pinnipedProxy.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup ## @param pinnipedProxy.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## @param pinnipedProxy.containerSecurityContext.privileged Set container's Security Context privileged ## @param pinnipedProxy.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem @@ -1455,6 +1464,7 @@ pinnipedProxy: enabled: true seLinuxOptions: null runAsUser: 1001 + runAsGroup: 0 runAsNonRoot: true privileged: false readOnlyRootFilesystem: false @@ -1781,6 +1791,7 @@ kubeappsapis: ## @param kubeappsapis.containerSecurityContext.enabled Enabled containers' Security Context ## @param kubeappsapis.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container ## @param kubeappsapis.containerSecurityContext.runAsUser Set containers' Security Context runAsUser + ## @param kubeappsapis.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup ## @param kubeappsapis.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## @param kubeappsapis.containerSecurityContext.privileged Set container's Security Context privileged ## @param kubeappsapis.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem @@ -1792,6 +1803,7 @@ kubeappsapis: enabled: true seLinuxOptions: null runAsUser: 1001 + runAsGroup: 0 runAsNonRoot: true privileged: false readOnlyRootFilesystem: false @@ -2057,6 +2069,7 @@ ociCatalog: ## @param ociCatalog.containerSecurityContext.enabled Enabled containers' Security Context ## @param ociCatalog.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container ## @param ociCatalog.containerSecurityContext.runAsUser Set containers' Security Context runAsUser + ## @param ociCatalog.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup ## @param ociCatalog.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## @param ociCatalog.containerSecurityContext.privileged Set container's Security Context privileged ## @param ociCatalog.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem @@ -2068,6 +2081,7 @@ ociCatalog: enabled: true seLinuxOptions: null runAsUser: 1001 + runAsGroup: 0 runAsNonRoot: true privileged: false readOnlyRootFilesystem: false From 9b40fbf8f50e3d490ea33c5988523bdb1e1a6939 Mon Sep 17 00:00:00 2001 From: Antonio Gamez Diaz Date: Fri, 1 Mar 2024 11:07:37 +0100 Subject: [PATCH 2/2] Bring dev changes back Signed-off-by: Antonio Gamez Diaz --- chart/kubeapps/.helmignore | 2 +- chart/kubeapps/Chart.yaml | 2 +- chart/kubeapps/README.md | 4 +--- 3 files changed, 3 insertions(+), 5 deletions(-) diff --git a/chart/kubeapps/.helmignore b/chart/kubeapps/.helmignore index 46d67d5b770..1206beba76a 100644 --- a/chart/kubeapps/.helmignore +++ b/chart/kubeapps/.helmignore @@ -1,4 +1,4 @@ -# Copyright 2021-2022 the Kubeapps contributors. +# Copyright 2021-2024 the Kubeapps contributors. # SPDX-License-Identifier: Apache-2.0 # Patterns to ignore when building packages. diff --git a/chart/kubeapps/Chart.yaml b/chart/kubeapps/Chart.yaml index 2878822fc9e..62d6e3d543d 100644 --- a/chart/kubeapps/Chart.yaml +++ b/chart/kubeapps/Chart.yaml @@ -52,4 +52,4 @@ maintainers: name: kubeapps sources: - https://github.com/bitnami/charts/tree/main/bitnami/kubeapps -version: 14.6.0 +version: 14.6.1-dev diff --git a/chart/kubeapps/README.md b/chart/kubeapps/README.md index e1b0b5afbdc..ac9332a9052 100644 --- a/chart/kubeapps/README.md +++ b/chart/kubeapps/README.md @@ -1,5 +1,3 @@ - - # Bitnami package for Kubeapps Kubeapps is a web-based UI for launching and managing applications on Kubernetes. It allows users to deploy trusted applications and operators to control users access to the cluster. @@ -1189,4 +1187,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. \ No newline at end of file +limitations under the License.