{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":726267984,"defaultBranch":"master","name":"datahub-helm","ownerLogin":"travis-cook-sfdc","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2023-12-01T22:46:38.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/119886245?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1706304990.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"f2517ae490cdbfaef46e3b5e6635d29c46520308","ref":"refs/heads/fix-api-version-for-configmap","pushedAt":"2024-01-26T21:36:30.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"fix: fix bug in configmap api version\n\napi version should be `v1` for configmap\nobjects, not `batch/v1`.","shortMessageHtmlLink":"fix: fix bug in configmap api version"}},{"before":"5366a379c57f39b594d837eeb063d2e4b0253797","after":"f04bcdeced701edca2e7fe5bfc5a8095415bab6e","ref":"refs/heads/master","pushedAt":"2024-01-26T21:34:14.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"fix(kafka-setup-job): allow global.kafka.zookeeper.server to be unset (#426)","shortMessageHtmlLink":"fix(kafka-setup-job): allow global.kafka.zookeeper.server to be unset ("}},{"before":"38577cf9dc6c74cad40dfd101427966b39e79cca","after":"8a0ad3fc6380e16b1d64daac9774a0cecabbb582","ref":"refs/heads/fix-nil-pointer-in-ingestion","pushedAt":"2024-01-10T00:05:06.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"bump global chart version","shortMessageHtmlLink":"bump global chart version"}},{"before":null,"after":"38577cf9dc6c74cad40dfd101427966b39e79cca","ref":"refs/heads/fix-nil-pointer-in-ingestion","pushedAt":"2024-01-10T00:03:04.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"fix(ingestion): Fix scope of `.Values.globals` in ingestion\n\nBecause we're in a `range` inside `datahub-ingestion-cron`,\nwe can't access global values via `{{ .Values.global...`\nInstead, we need `{{ $.Values...`. Otherwise, we get\nan error:\n\n```\nError: template: datahub/charts/datahub-ingestion-cron/templates/cron.yaml:78:34: executing \"datahub/charts/datahub-ingestion-cron/templates/cron.yaml\" at <.Values.global.nodeSelector>: nil pointer evaluating interface {}.global\nhelm.go:84: [debug] template: datahub/charts/datahub-ingestion-cron/templates/cron.yaml:78:34: executing \"datahub/charts/datahub-ingestion-cron/templates/cron.yaml\" at <.Values.global.nodeSelector>: nil pointer evaluating interface {}.global\n```\n\nFix so that it uses globals or the cron specific `nodeSelector`\nand `tolerations` instead of triggering a nil pointer error","shortMessageHtmlLink":"fix(ingestion): Fix scope of .Values.globals in ingestion"}},{"before":"9e3524fffeef3fd4c3c5d771762358f6e031d4f8","after":"5366a379c57f39b594d837eeb063d2e4b0253797","ref":"refs/heads/master","pushedAt":"2024-01-09T23:57:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: add ingestion config map in values (#423)\n\n* feat: add ingestion config map in values\r\n\r\nAdd support for providing the ingestion recipe's\r\ndefinition in `datahub-ingestion-cron`'s `values.yaml`.\r\n\r\nThe current datahub helm implementation relies on an\r\nexternally managed config map to specify an ingestion\r\nrecipe. This necessarily requires production k8s access\r\nor a separate management system for k8s config maps.\r\n\r\nNow, helm can manage the config map for datahub.\r\n\r\nThis is backwards compatible - if `fileContent` is not\r\nprovided, it assumes the config map is managed externally\r\n\r\n* fix: improve some of the commented out examples in values.yaml\r\n\r\n---------\r\n\r\nCo-authored-by: Travis Cook ","shortMessageHtmlLink":"feat: add ingestion config map in values (acryldata#423)"}},{"before":"e67c36872651f1e1a7fa60a8e0caeb5f30e0f4cf","after":"ae5eda3b414483e52f13a3895759d49bc2ea7565","ref":"refs/heads/feat-add-ingestion-config-map-in-values","pushedAt":"2024-01-05T00:29:49.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"fix: improve some of the commented out examples in values.yaml","shortMessageHtmlLink":"fix: improve some of the commented out examples in values.yaml"}},{"before":null,"after":"e67c36872651f1e1a7fa60a8e0caeb5f30e0f4cf","ref":"refs/heads/feat-add-ingestion-config-map-in-values","pushedAt":"2024-01-05T00:27:27.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: add ingestion config map in values\n\nAdd support for providing the ingestion recipe's\ndefinition in `datahub-ingestion-cron`'s `values.yaml`.\n\nThe current datahub helm implementation relies on an\nexternally managed config map to specify an ingestion\nrecipe. This necessarily requires production k8s access\nor a separate management system for k8s config maps.\n\nNow, helm can manage the config map for datahub.\n\nThis is backwards compatible - if `fileContent` is not\nprovided, it assumes the config map is managed externally","shortMessageHtmlLink":"feat: add ingestion config map in values"}},{"before":"782e147651799a862320198a9daa41af14962e5c","after":"9e3524fffeef3fd4c3c5d771762358f6e031d4f8","ref":"refs/heads/master","pushedAt":"2024-01-04T21:02:50.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"fix: fix custom command & args behavior (#422)\n\n* fix: fix custom command & args behavior\r\n\r\nFix two issues with the custom command & args behavior\r\nadded in #408:\r\n\r\n1. Change custom command & args to use `toRawJson` instead of\r\n`toJson`. Previously, this resulted in special character would\r\nbe escaped.\r\n\r\nFor example, this value:\r\n```\r\nargs: [ \"source setup.sh && /datahub/datahub-gms/scripts/start.sh\" ]\r\n```\r\n\r\nWould get rendered as:\r\n\r\n```\r\nargs: [ \"source setup.sh \\u0026\\u0026 /datahub/datahub-gms/scripts/start.sh\" ]\r\n```\r\n\r\nUse `toRawJson` to force special values to not be escaped\r\n\r\n2. Add custom command & args to all other containers that do not\r\nsupport it:\r\n - Datahub cleanup job\r\n - Datahub Nocode Migration Job\r\n - Datahub Restore Indices Job\r\n - Datahub System Update Job\r\n - Datahub Actions\r\n - Elastic Search Setup\r\n - Kafka Setup\r\n - Mysql Setup\r\n - Postgres setup\r\n\r\n* fix lint issues\r\n\r\n---------\r\n\r\nCo-authored-by: Travis Cook ","shortMessageHtmlLink":"fix: fix custom command & args behavior (acryldata#422)"}},{"before":"82982199a0a6810fa781b5e97e6e56c3bcc19e84","after":"9c2ef0d0baf41059c432cafe76ee200634142a6d","ref":"refs/heads/fix-custom-commands-and-args","pushedAt":"2024-01-04T18:20:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"fix lint issues","shortMessageHtmlLink":"fix lint issues"}},{"before":null,"after":"82982199a0a6810fa781b5e97e6e56c3bcc19e84","ref":"refs/heads/fix-custom-commands-and-args","pushedAt":"2024-01-04T00:41:35.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"fix: fix custom command & args behavior\n\nFix two issues with the custom command & args behavior\nadded in #408:\n\n1. Change custom command & args to use `toRawJson` instead of\n`toJson`. Previously, this resulted in special character would\nbe escaped.\n\nFor example, this value:\n```\nargs: [ \"source setup.sh && /datahub/datahub-gms/scripts/start.sh\" ]\n```\n\nWould get rendered as:\n\n```\nargs: [ \"source setup.sh \\u0026\\u0026 /datahub/datahub-gms/scripts/start.sh\" ]\n```\n\nUse `toRawJson` to force special values to not be escaped\n\n2. Add custom command & args to all other containers that do not\nsupport it:\n - Datahub cleanup job\n - Datahub Nocode Migration Job\n - Datahub Restore Indices Job\n - Datahub System Update Job\n - Datahub Actions\n - Elastic Search Setup\n - Kafka Setup\n - Mysql Setup\n - Postgres setup","shortMessageHtmlLink":"fix: fix custom command & args behavior"}},{"before":"ceb3a26ef9f8c2275de4438c46952697d011952b","after":"782e147651799a862320198a9daa41af14962e5c","ref":"refs/heads/master","pushedAt":"2024-01-03T23:53:14.000Z","pushType":"push","commitsCount":7,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"Allow nodeSelector and tolerations to be applied to all components globally (#421)","shortMessageHtmlLink":"Allow nodeSelector and tolerations to be applied to all components gl…"}},{"before":"6f733401e633830dfa15587bfaaeb0caaa67eaba","after":"ceb3a26ef9f8c2275de4438c46952697d011952b","ref":"refs/heads/master","pushedAt":"2023-12-15T04:50:53.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"V0.12.1 release (#409)\n\n* bump(chart): bump chart for v0.12.1","shortMessageHtmlLink":"V0.12.1 release (acryldata#409)"}},{"before":"b969ce18a5ed005f3c40e8d0b8ef1e369d678348","after":"6f733401e633830dfa15587bfaaeb0caaa67eaba","ref":"refs/heads/master","pushedAt":"2023-12-11T22:02:16.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: add custom image commands and arguments (#408)\n\n* feat: add custom image commands and arguments\r\n\r\nAdd support for customizing an image's command or arguments. In our setup, we have\r\nsome custom startup & shutdown behavior that need to run before the main process\r\nstarts for things like enabling / disabling networking or injecting secrets. These\r\ncannot be configured with init containers since they need to run in the same place\r\nthat the main process is going to run. If command / args are empty or not present,\r\nthey will be excluded from helm, allowing the default command of the image to be used\r\n\r\n---------\r\n\r\nCo-authored-by: Travis Cook ","shortMessageHtmlLink":"feat: add custom image commands and arguments (acryldata#408)"}},{"before":"7b09d72351cad2b2930d929bb4ed1dd7fbc945e1","after":"77fc4c0bdfc9f4aced53390fc2cf930c91802066","ref":"refs/heads/feat/add-custom-image-commands-and-args","pushedAt":"2023-12-11T20:57:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: bump chart version","shortMessageHtmlLink":"feat: bump chart version"}},{"before":null,"after":"7b09d72351cad2b2930d929bb4ed1dd7fbc945e1","ref":"refs/heads/feat/add-custom-image-commands-and-args","pushedAt":"2023-12-11T20:55:13.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: add custom image commands and arguments\n\nAdd support for customizing an image's command or arguments. In our setup, we have\nsome custom startup & shutdown behavior that need to run before the main process\nstarts for things like enabling / disabling networking or injecting secrets. These\ncannot be configured with init containers since they need to run in the same place\nthat the main process is going to run. If command / args are empty or not present,\nthey will be excluded from helm, allowing the default command of the image to be used","shortMessageHtmlLink":"feat: add custom image commands and arguments"}},{"before":"d07a71d27513f3c398c8b3072a608c7e1e31c166","after":"b969ce18a5ed005f3c40e8d0b8ef1e369d678348","ref":"refs/heads/master","pushedAt":"2023-12-11T20:54:12.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: add `monitoring.portName` in values.yaml (#407)\n\n* feat: add `monitoring.portName` in values.yaml\r\nAdd support for customizing the `portName` for monitoring. It is currently hardcoded\r\nto `jmx`. In our setup, the prometheus scraper is looking for ports that are called\r\n`prometheus`. This change allows this value to be customized to any value that is\r\nneeded for a specific environment. If no value is provided, it remains `jmx`.\r\n\r\n---------\r\n\r\nCo-authored-by: Travis Cook ","shortMessageHtmlLink":"feat: add monitoring.portName in values.yaml (acryldata#407)"}},{"before":"3476563e8e4dc733f82d255b45a949bf4b6d3890","after":null,"ref":"refs/heads/feat-add-custom-image-commands-and-args","pushedAt":"2023-12-11T20:40:12.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"}},{"before":"4bf2e33224cd599fa37657abae6d287995b5cf88","after":null,"ref":"refs/heads/patch-2","pushedAt":"2023-12-11T20:40:09.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"}},{"before":"78f03d1e07df2f76605e8b373b4d7e6f4c3da40c","after":null,"ref":"refs/heads/patch-1","pushedAt":"2023-12-11T20:40:07.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"}},{"before":"8dcb51961e44654edf125a2444dba96d7b114ffd","after":null,"ref":"refs/heads/add-gms-host-to-values","pushedAt":"2023-12-11T20:40:05.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"}},{"before":null,"after":"23b2f1e1dcf4ad02765d02982412c71d1fc59643","ref":"refs/heads/feat-add-custom-commands","pushedAt":"2023-12-11T20:39:55.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: add custom image commands and arguments\n\nAdd support for customizing an image's command or arguments. In our setup, we have\nsome custom startup & shutdown behavior that need to run before the main process\nstarts for things like enabling / disabling networking or injecting secrets. These\ncannot be configured with init containers since they need to run in the same place\nthat the main process is going to run. If command / args are empty or not present,\nthey will be excluded from helm, allowing the default command of the image to be used","shortMessageHtmlLink":"feat: add custom image commands and arguments"}},{"before":"5d60d3d037e99db22d5b5d228f8983c961a72e0b","after":"3476563e8e4dc733f82d255b45a949bf4b6d3890","ref":"refs/heads/feat-add-custom-image-commands-and-args","pushedAt":"2023-12-11T20:38:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: add custom image commands and arguments\n\nAdd support for customizing an image's command or arguments. In our setup, we have\nsome custom startup & shutdown behavior that need to run before the main process\nstarts for things like enabling / disabling networking or injecting secrets. These\ncannot be configured with init containers since they need to run in the same place\nthat the main process is going to run. If command / args are empty or not present,\nthey will be excluded from helm, allowing the default command of the image to be used","shortMessageHtmlLink":"feat: add custom image commands and arguments"}},{"before":"cd09c4d12b279da8663c7e4779e21f6c8df6d7dd","after":"d07a71d27513f3c398c8b3072a608c7e1e31c166","ref":"refs/heads/master","pushedAt":"2023-12-11T20:36:55.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"Merge branch 'acryldata:master' into master","shortMessageHtmlLink":"Merge branch 'acryldata:master' into master"}},{"before":null,"after":"5d60d3d037e99db22d5b5d228f8983c961a72e0b","ref":"refs/heads/feat-add-custom-image-commands-and-args","pushedAt":"2023-12-11T20:36:35.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: add custom image commands and arguments\n\nAdd support for customizing an image's command or arguments. In our setup, we have\nsome custom startup & shutdown behavior that need to run before the main process\nstarts for things like enabling / disabling networking or injecting secrets. These\ncannot be configured with init containers since they need to run in the same place\nthat the main process is going to run. If command / args are empty or not present,\nthey will be excluded from helm, allowing the default command of the image to be used","shortMessageHtmlLink":"feat: add custom image commands and arguments"}},{"before":"f2b5a3e43ca35ac1651846236b49fd6048665eac","after":"cd09c4d12b279da8663c7e4779e21f6c8df6d7dd","ref":"refs/heads/master","pushedAt":"2023-12-11T18:27:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: bump versions","shortMessageHtmlLink":"feat: bump versions"}},{"before":"9e6d90557b5b6b8cdfd2d46d8f92990600e58fca","after":"f2b5a3e43ca35ac1651846236b49fd6048665eac","ref":"refs/heads/master","pushedAt":"2023-12-11T18:05:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: remove defaults and fix default portName","shortMessageHtmlLink":"feat: remove defaults and fix default portName"}},{"before":"cbf1cabad123ba42e2904403e29fa89387b2e71d","after":"9e6d90557b5b6b8cdfd2d46d8f92990600e58fca","ref":"refs/heads/master","pushedAt":"2023-12-11T18:02:05.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: add `monitoring.portName` in values.yaml\n\nAdd support for customizing the `portName` for monitoring. It is currently hardcoded\nto `jmx`. In our setup, the prometheus scraper is looking for ports that are called\n`prometheus`. This change allows this value to be customized to any value that is\nneeded for a specific environment. If no value is provided, it remains `jmx`.","shortMessageHtmlLink":"feat: add monitoring.portName in values.yaml"}},{"before":"79f70a5e4bad59d94bbce5e22589f261165acab6","after":"cbf1cabad123ba42e2904403e29fa89387b2e71d","ref":"refs/heads/master","pushedAt":"2023-12-07T22:46:50.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat(misc): misc updates (#406)\n\n* add termination grace period\r\n* allow global and chart local gms host\r\n* adjust actions pod hook order","shortMessageHtmlLink":"feat(misc): misc updates (acryldata#406)"}},{"before":null,"after":"8dcb51961e44654edf125a2444dba96d7b114ffd","ref":"refs/heads/add-gms-host-to-values","pushedAt":"2023-12-02T00:27:54.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"feat: add gms hostname\n\nWhy?\nHelm charts rely on Pod DNS. However, if pods need\nto communicate with GMS another way, it's not\npossible. Currently, te gms hostname is controlled\nvia `{{ printf \"%s-%s\" .Release.Name \"datahub-gms\" }}`\n\nWhat?\n- Define `datahub.gms.host` in `_helpers.tpl`. It\n is `.Values.global.datahub.gms.host` if exists.\n Else, fallback `{{ printf \"%s-%s\" .Release.Name \"datahub-gms\" }}`\n\n- Update references of the GMS host name across\ncharts to use the helper","shortMessageHtmlLink":"feat: add gms hostname"}},{"before":"3bd8b9eeeb7acf1b6083e833e86a22303b706c90","after":"78f03d1e07df2f76605e8b373b4d7e6f4c3da40c","ref":"refs/heads/patch-1","pushedAt":"2023-12-02T00:20:24.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"travis-cook-sfdc","name":null,"path":"/travis-cook-sfdc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/119886245?s=80&v=4"},"commit":{"message":"Add GMS Host to values\n\n## Why?\nThe helm charts currently rely on Pod DNS. However,\nif you'd like your pods to communicate with the GMS\nvia some other means, it's not possible to configure\nthis since the GMS Host is automatically configured\nvia `{{ printf \"%s-%s\" .Release.Name \"datahub-gms\" }}`\n\n## What?\nAdd a template to helpers to define `datahub.gms.host`\nas the contents of `.Values.global.datahub.gms.host`\nif it exists. Otherwise, fallback to the current\n`{{ printf \"%s-%s\" .Release.Name \"datahub-gms\" }}`\n\nUpdate all references of the GMS host name across\ncontainers to use this new helper","shortMessageHtmlLink":"Add GMS Host to values"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAD6j_tPwA","startCursor":null,"endCursor":null}},"title":"Activity · travis-cook-sfdc/datahub-helm"}