1
1
## Codefresh gitops runtime
2
- ![ Version: 0.2.21 ] ( https://img.shields.io/badge/Version-0.2.21 -informational?style=flat-square ) ![ AppVersion: 0.1.35 ] ( https://img.shields.io/badge/AppVersion-0.1.35 -informational?style=flat-square )
2
+ ![ Version: 0.3.0 ] ( https://img.shields.io/badge/Version-0.3.0 -informational?style=flat-square ) ![ AppVersion: 0.1.36 ] ( https://img.shields.io/badge/AppVersion-0.1.36 -informational?style=flat-square )
3
3
4
4
## Codefresh official documentation:
5
5
Prior to running the installation please see the official documentation at: https://codefresh.io/docs/docs/installation/gitops/hybrid-gitops-helm-installation/
@@ -15,7 +15,7 @@ We have created a helper utility to resolve this issue:
15
15
The utility is packaged in a container image. Below are instructions on executing the utility using Docker:
16
16
17
17
```
18
- docker run -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.2.21 <local_registry>
18
+ docker run -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.3.0 <local_registry>
19
19
```
20
20
` output_dir ` - is a local directory where the utility will output files. <br >
21
21
` local_registry ` - is your local registry where you want to mirror the images to
@@ -130,7 +130,9 @@ sealed-secrets:
130
130
| app-proxy.serviceAccount.name | string | `"cap-app-proxy"` | |
131
131
| app-proxy.tolerations | list | `[]` | |
132
132
| argo-cd.configs.cm."accounts.admin" | string | `"apiKey,login"` | |
133
+ | argo-cd.configs.cm."application.resourceTrackingMethod" | string | `"annotation+label"` | |
133
134
| argo-cd.configs.cm."timeout.reconciliation" | string | `"20s"` | |
135
+ | argo-cd.configs.params."application.namespaces" | string | `"cf-*"` | |
134
136
| argo-cd.configs.params."server.insecure" | bool | `true` | |
135
137
| argo-cd.crds.install | bool | `true` | |
136
138
| argo-cd.fullnameOverride | string | `"argo-cd"` | |
@@ -144,6 +146,7 @@ sealed-secrets:
144
146
| argo-workflows.crds.install | bool | `true` | Install and upgrade CRDs |
145
147
| argo-workflows.enabled | bool | `true` | |
146
148
| argo-workflows.fullnameOverride | string | `"argo"` | |
149
+ | argo-workflows.server.extraArgs | list | `["--auth-mode=client"]` | auth-mode needs to be set to client to be able to see workflow logs from Codefresh UI |
147
150
| event-reporters.events.argoCDServerServiceName | string | `nil` | LEAVE EMPTY and let the chart logic determine the name. Change only if you are totally sure you need to override ArgoCD service name. |
148
151
| event-reporters.events.argoCDServerServicePort | string | `nil` | LEAVE EMPTY and let the chart logic determine the name. Change only if you are totally sure you need to override ArgoCD service port. |
149
152
| event-reporters.events.eventSource.affinity | object | `{}` | |
@@ -179,6 +182,53 @@ sealed-secrets:
179
182
| event-reporters.workflow.sensor.resources | object | `{}` | |
180
183
| event-reporters.workflow.sensor.tolerations | list | `[]` | |
181
184
| event-reporters.workflow.serviceAccount.create | bool | `true` | |
185
+ | gitops-operator.affinity | object | `{}` | |
186
+ | gitops-operator.crds | object | `{"additionalLabels":{},"annotations":{},"install":true,"keep":false}` | Codefresh gitops operator crds |
187
+ | gitops-operator.crds.additionalLabels | object | `{}` | Additional labels for gitops operator CRDs |
188
+ | gitops-operator.crds.annotations | object | `{}` | Annotations on gitops operator CRDs |
189
+ | gitops-operator.crds.install | bool | `true` | Whether or not to install CRDs |
190
+ | gitops-operator.crds.keep | bool | `false` | Keep CRDs if gitops runtime release is uninstalled |
191
+ | gitops-operator.env | object | `{}` | |
192
+ | gitops-operator.fullnameOverride | string | `""` | |
193
+ | gitops-operator.image.pullPolicy | string | `"IfNotPresent"` | |
194
+ | gitops-operator.image.repository | string | `"quay.io/codefresh/codefresh-gitops-operator"` | |
195
+ | gitops-operator.image.tag | string | `"v0.1.0-alpha.3"` | |
196
+ | gitops-operator.imagePullSecrets | list | `[]` | |
197
+ | gitops-operator.kube-rbac-proxy.image.pullPolicy | string | `"IfNotPresent"` | |
198
+ | gitops-operator.kube-rbac-proxy.image.repository | string | `"gcr.io/kubebuilder/kube-rbac-proxy"` | |
199
+ | gitops-operator.kube-rbac-proxy.image.tag | string | `"v0.14.1"` | |
200
+ | gitops-operator.kube-rbac-proxy.resources.limits.cpu | string | `"500m"` | |
201
+ | gitops-operator.kube-rbac-proxy.resources.limits.memory | string | `"128Mi"` | |
202
+ | gitops-operator.kube-rbac-proxy.resources.requests.cpu | string | `"100m"` | |
203
+ | gitops-operator.kube-rbac-proxy.resources.requests.memory | string | `"64Mi"` | |
204
+ | gitops-operator.kube-rbac-proxy.securityContext.allowPrivilegeEscalation | bool | `false` | |
205
+ | gitops-operator.kube-rbac-proxy.securityContext.capabilities.drop[0] | string | `"ALL"` | |
206
+ | gitops-operator.livenessProbe.failureThreshold | int | `10` | |
207
+ | gitops-operator.livenessProbe.initialDelaySeconds | int | `10` | |
208
+ | gitops-operator.livenessProbe.periodSeconds | int | `10` | |
209
+ | gitops-operator.livenessProbe.successThreshold | int | `1` | |
210
+ | gitops-operator.livenessProbe.timeoutSeconds | int | `10` | |
211
+ | gitops-operator.nameOverride | string | `""` | |
212
+ | gitops-operator.nodeSelector | object | `{}` | |
213
+ | gitops-operator.podAnnotations | object | `{}` | |
214
+ | gitops-operator.podLabels | object | `{}` | |
215
+ | gitops-operator.podSecurityContext.runAsNonRoot | bool | `true` | |
216
+ | gitops-operator.readinessProbe.failureThreshold | int | `3` | |
217
+ | gitops-operator.readinessProbe.initialDelaySeconds | int | `10` | |
218
+ | gitops-operator.readinessProbe.periodSeconds | int | `10` | |
219
+ | gitops-operator.readinessProbe.successThreshold | int | `1` | |
220
+ | gitops-operator.readinessProbe.timeoutSeconds | int | `10` | |
221
+ | gitops-operator.replicaCount | int | `1` | |
222
+ | gitops-operator.resources.limits.cpu | string | `"500m"` | |
223
+ | gitops-operator.resources.limits.memory | string | `"128Mi"` | |
224
+ | gitops-operator.resources.requests.cpu | string | `"100m"` | |
225
+ | gitops-operator.resources.requests.memory | string | `"64Mi"` | |
226
+ | gitops-operator.securityContext.allowPrivilegeEscalation | bool | `false` | |
227
+ | gitops-operator.securityContext.capabilities.drop[0] | string | `"ALL"` | |
228
+ | gitops-operator.serviceAccount.annotations | object | `{}` | |
229
+ | gitops-operator.serviceAccount.create | bool | `true` | |
230
+ | gitops-operator.serviceAccount.name | string | `"gitops-operator-controller-manager"` | |
231
+ | gitops-operator.tolerations | list | `[]` | |
182
232
| global.codefresh | object | `{"accountId":"","apiEventsPath":"/2.0/api/events","tls":{"caCerts":{"secret":{"annotations":{},"content":"","create":false,"key":"ca-bundle.crt"},"secretKeyRef":{}},"workflowPipelinesGitWebhooks":{"annotatins":{},"certificates":{}}},"url":"https://g.codefresh.io","userToken":{"secretKeyRef":{},"token":""}}` | Codefresh platform and account-related settings |
183
233
| global.codefresh.accountId | string | `""` | Codefresh Account ID. |
184
234
| global.codefresh.apiEventsPath | string | `"/2.0/api/events"` | Events API endpoint URL suffix. |
0 commit comments