diff --git a/charts/gitops-runtime/Chart.yaml b/charts/gitops-runtime/Chart.yaml index bce2b6ea..209a9195 100644 --- a/charts/gitops-runtime/Chart.yaml +++ b/charts/gitops-runtime/Chart.yaml @@ -1,8 +1,8 @@ apiVersion: v2 -appVersion: 0.0.0 +appVersion: 0.0.1 description: A Helm chart for Codefresh gitops runtime name: gitops-runtime -version: 0.0.0 +version: 0.11.0 home: https://github.com/codefresh-io/gitops-runtime-helm icon: https://avatars1.githubusercontent.com/u/11412079?v=3 keywords: @@ -13,31 +13,38 @@ maintainers: url: https://codefresh-io.github.io/ annotations: artifacthub.io/alternativeName: "codefresh-gitops-runtime" + artifacthub.io/changes: |- + - type: changed + description: 'feat: update argo-cd again (#12)' + - type: changed + description: cleanup changelog + - type: changed + description: 'feat: update argo-cd (#11)' dependencies: -- name: argo-cd - repository: https://codefresh-io.github.io/argo-helm - version: 6.7.18-3-cap-2.10-2024.5.14-9315e75e1 -- name: argo-events - repository: https://codefresh-io.github.io/argo-helm - version: 2.0.9-1-cap-CR-19893 -- name: argo-workflows - repository: https://codefresh-io.github.io/argo-helm - version: 0.40.9-1-v3.5.4-cap-CR-22243 - condition: argo-workflows.enabled -- name: argo-rollouts - repository: https://codefresh-io.github.io/argo-helm - version: 2.32.5-4-additional-logs - condition: argo-rollouts.enabled -- name: sealed-secrets - repository: https://bitnami-labs.github.io/sealed-secrets/ - version: 2.14.1 -- name: codefresh-tunnel-client - repository: oci://quay.io/codefresh/charts - version: 0.1.15 - alias: tunnel-client - condition: tunnel-client.enabled -- name: codefresh-gitops-operator - repository: oci://quay.io/codefresh/charts - version: 1.0.13 - alias: gitops-operator - condition: gitops-operator.enabled + - name: argo-cd + repository: https://codefresh-io.github.io/argo-helm + version: 6.7.18-3-cap-2.10-2024.5.14-9315e75e1 + - name: argo-events + repository: https://codefresh-io.github.io/argo-helm + version: 2.0.9-1-cap-CR-19893 + - name: argo-workflows + repository: https://codefresh-io.github.io/argo-helm + version: 0.40.9-1-v3.5.4-cap-CR-22243 + condition: argo-workflows.enabled + - name: argo-rollouts + repository: https://codefresh-io.github.io/argo-helm + version: 2.32.5-4-additional-logs + condition: argo-rollouts.enabled + - name: sealed-secrets + repository: https://bitnami-labs.github.io/sealed-secrets/ + version: 2.14.1 + - name: codefresh-tunnel-client + repository: oci://quay.io/codefresh/charts + version: 0.1.15 + alias: tunnel-client + condition: tunnel-client.enabled + - name: codefresh-gitops-operator + repository: oci://quay.io/codefresh/charts + version: 1.0.13 + alias: gitops-operator + condition: gitops-operator.enabled diff --git a/charts/gitops-runtime/README.md b/charts/gitops-runtime/README.md index bfdb0af3..a8fb0c61 100644 --- a/charts/gitops-runtime/README.md +++ b/charts/gitops-runtime/README.md @@ -1,5 +1,5 @@ ## Codefresh gitops runtime -![Version: 0.7.0](https://img.shields.io/badge/Version-0.7.0-informational?style=flat-square) ![AppVersion: 0.1.48](https://img.shields.io/badge/AppVersion-0.1.48-informational?style=flat-square) +![Version: 0.11.0](https://img.shields.io/badge/Version-0.11.0-informational?style=flat-square) ![AppVersion: 0.0.1](https://img.shields.io/badge/AppVersion-0.0.1-informational?style=flat-square) ## Prerequisites @@ -27,7 +27,7 @@ We have created a helper utility to resolve this issue: The utility is packaged in a container image. Below are instructions on executing the utility using Docker: ``` -docker run -v :/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.7.0 +docker run -v :/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.11.0 ``` `output_dir` - is a local directory where the utility will output files.
`local_registry` - is your local registry where you want to mirror the images to @@ -71,6 +71,7 @@ sealed-secrets: | Key | Type | Default | Description | |-----|------|---------|-------------| +| alice | string | `"bob"` | | | app-proxy.affinity | object | `{}` | | | app-proxy.config.argoCdUrl | string | `nil` | ArgoCD Url. determined by chart logic. Do not change unless you are certain you need to | | app-proxy.config.argoCdUsername | string | `"admin"` | ArgoCD user to be used by app-proxy | @@ -144,37 +145,16 @@ sealed-secrets: | app-proxy.serviceAccount.create | bool | `true` | | | app-proxy.serviceAccount.name | string | `"cap-app-proxy"` | | | app-proxy.tolerations | list | `[]` | | +| argo-cd | object | `{"applicationVersioning":{"enabled":true,"useApplicationConfiguration":true},"configs":{"cm":{"accounts.admin":"apiKey,login","application.resourceTrackingMethod":"annotation+label","timeout.reconciliation":"20s"},"params":{"application.namespaces":"cf-*","server.insecure":true}},"crds":{"install":true},"eventReporter":{"enabled":true,"replicas":3,"version":"v2"},"fullnameOverride":"argo-cd","notifications":{"bots":{"slack":{}},"enabled":true,"notifiers":{"service.webhook.cf-promotion-app-revision-changed-notifier":"url: http://gitops-operator:8082/app-revision-changed\nheaders:\n- name: Content-Type\n value: application/json\n"},"subscriptions":[{"recipients":["cf-promotion-app-revision-changed-notifier"],"triggers":["cf-promotion-on-deployed-trigger"]},{"recipients":["cf-promotion-app-revision-changed-notifier"],"triggers":["cf-promotion-on-out-of-sync-trigger"]}],"templates":{"template.cf-promotion-app-revision-changed-template":"webhook:\n cf-promotion-app-revision-changed-notifier:\n method: POST\n body: |\n {\n \"APP_NAMESPACE\": {{ .app.metadata.namespace | quote }},\n \"APP_NAME\": {{ .app.metadata.name | quote }},\n \"REPO_URL\": {{ call .repo.RepoURLToHTTPS .app.spec.source.repoURL | quote }},\n \"BRANCH\": {{ .app.spec.source.targetRevision | quote }},\n \"PATH\": {{ .app.spec.source.path | quote }},\n \"PREV_COMMIT_SHA\": {{ (index .app.status.history (sub (len .app.status.history) 2)).revision | quote }},\n \"CURRENT_COMMIT_SHA\": {{ .app.status.operationState.syncResult.revision | quote }}\n }\n"},"triggers":{"trigger.cf-promotion-on-deployed-trigger":"- description: Application is synced and healthy. Triggered once per commit.\n when: get(app.spec.syncPolicy, \"automated\") != nil && app.status.sync.status == \"Synced\" && app.status.health.status == \"Healthy\" && app.status.operationState.syncResult.revision != nil\n oncePer: app.status.operationState.syncResult.revision\n send:\n - cf-promotion-app-revision-changed-template\n","trigger.cf-promotion-on-out-of-sync-trigger":"- description: Application is out of sync (when autoHeal is off). Triggered once per commit.\n when: get(app.spec.syncPolicy, \"automated\") == nil && app.status.sync.status == \"OutOfSync\" && app.status.operationState.syncResult.revision != nil\n oncePer: app.status.operationState.syncResult.revision\n send:\n - cf-promotion-app-revision-changed-template\n"}}}` | ------------------------------------------------------------------------------------------------------------------- | | argo-cd.applicationVersioning.enabled | bool | `true` | Enable application versioning | | argo-cd.applicationVersioning.useApplicationConfiguration | bool | `true` | Extract application version based on ApplicationConfiguration CRD | -| argo-cd.configs.cm."accounts.admin" | string | `"apiKey,login"` | | -| argo-cd.configs.cm."application.resourceTrackingMethod" | string | `"annotation+label"` | | -| argo-cd.configs.cm."timeout.reconciliation" | string | `"20s"` | | -| argo-cd.configs.params."application.namespaces" | string | `"cf-*"` | | -| argo-cd.configs.params."server.insecure" | bool | `true` | | -| argo-cd.crds.install | bool | `true` | | | argo-cd.eventReporter.enabled | bool | `true` | Installs new event reporter component to cluster | | argo-cd.eventReporter.replicas | int | `3` | Amount of shards to handle applications events | | argo-cd.eventReporter.version | string | `"v2"` | Switches between old and new reporter version. Possible values: v1, v2. For v2 `argo-cd.eventReporter.enabled=true` is required | -| argo-cd.fullnameOverride | string | `"argo-cd"` | | -| argo-cd.notifications.bots.slack | object | `{}` | | -| argo-cd.notifications.enabled | bool | `true` | | -| argo-cd.notifications.notifiers."service.webhook.cf-promotion-app-revision-changed-notifier" | string | `"url: http://gitops-operator:8082/app-revision-changed\nheaders:\n- name: Content-Type\n value: application/json\n"` | | -| argo-cd.notifications.subscriptions[0].recipients[0] | string | `"cf-promotion-app-revision-changed-notifier"` | | -| argo-cd.notifications.subscriptions[0].triggers[0] | string | `"cf-promotion-on-deployed-trigger"` | | -| argo-cd.notifications.subscriptions[1].recipients[0] | string | `"cf-promotion-app-revision-changed-notifier"` | | -| argo-cd.notifications.subscriptions[1].triggers[0] | string | `"cf-promotion-on-out-of-sync-trigger"` | | -| argo-cd.notifications.templates."template.cf-promotion-app-revision-changed-template" | string | `"webhook:\n cf-promotion-app-revision-changed-notifier:\n method: POST\n body: |\n {\n \"APP_NAMESPACE\": {{ .app.metadata.namespace | quote }},\n \"APP_NAME\": {{ .app.metadata.name | quote }},\n \"REPO_URL\": {{ call .repo.RepoURLToHTTPS .app.spec.source.repoURL | quote }},\n \"BRANCH\": {{ .app.spec.source.targetRevision | quote }},\n \"PATH\": {{ .app.spec.source.path | quote }},\n \"PREV_COMMIT_SHA\": {{ (index .app.status.history (sub (len .app.status.history) 2)).revision | quote }},\n \"CURRENT_COMMIT_SHA\": {{ .app.status.operationState.syncResult.revision | quote }}\n }\n"` | | -| argo-cd.notifications.triggers."trigger.cf-promotion-on-deployed-trigger" | string | `"- description: Application is synced and healthy. Triggered once per commit.\n when: get(app.spec.syncPolicy, \"automated\") != nil && app.status.sync.status == \"Synced\" && app.status.health.status == \"Healthy\" && app.status.operationState.syncResult.revision != nil\n oncePer: app.status.operationState.syncResult.revision\n send:\n - cf-promotion-app-revision-changed-template\n"` | | -| argo-cd.notifications.triggers."trigger.cf-promotion-on-out-of-sync-trigger" | string | `"- description: Application is out of sync (when autoHeal is off). Triggered once per commit.\n when: get(app.spec.syncPolicy, \"automated\") == nil && app.status.sync.status == \"OutOfSync\" && app.status.operationState.syncResult.revision != nil\n oncePer: app.status.operationState.syncResult.revision\n send:\n - cf-promotion-app-revision-changed-template\n"` | | -| argo-events.crds.install | bool | `false` | | -| argo-events.fullnameOverride | string | `"argo-events"` | | -| argo-rollouts.controller.replicas | int | `1` | | -| argo-rollouts.enabled | bool | `true` | | -| argo-rollouts.fullnameOverride | string | `"argo-rollouts"` | | -| argo-rollouts.installCRDs | bool | `true` | | +| argo-events | object | `{"crds":{"install":false},"fullnameOverride":"argo-events"}` | ------------------------------------------------------------------------------------------------------------------- | +| argo-rollouts | object | `{"controller":{"replicas":1},"enabled":true,"fullnameOverride":"argo-rollouts","installCRDs":true}` | ------------------------------------------------------------------------------------------------------------------- | +| argo-workflows | object | `{"crds":{"install":true},"enabled":true,"fullnameOverride":"argo","server":{"authModes":["client"],"baseHref":"/workflows/"}}` | ------------------------------------------------------------------------------------------------------------------- | | argo-workflows.crds.install | bool | `true` | Install and upgrade CRDs | -| argo-workflows.enabled | bool | `true` | | -| argo-workflows.fullnameOverride | string | `"argo"` | | | argo-workflows.server.authModes | list | `["client"]` | auth-mode needs to be set to client to be able to see workflow logs from Codefresh UI | | argo-workflows.server.baseHref | string | `"/workflows/"` | Do not change. Workflows UI is only accessed through internal router, changing this values will break routing to workflows native UI from Codefresh. | | event-reporters.events.argoCDServerServiceName | string | `nil` | LEAVE EMPTY and let the chart logic determine the name. Change only if you are totally sure you need to override ArgoCD service name. | @@ -233,37 +213,13 @@ sealed-secrets: | event-reporters.workflow.sensor.retryStrategy.steps | int | `3` | Number of retries | | event-reporters.workflow.sensor.tolerations | list | `[]` | | | event-reporters.workflow.serviceAccount.create | bool | `true` | | -| gitops-operator.affinity | object | `{}` | | +| foo | string | `"bar"` | | +| gitops-operator | object | `{"affinity":{},"crds":{"additionalLabels":{},"annotations":{},"install":true,"keep":false},"enabled":true,"env":{},"fullnameOverride":"","image":{},"imagePullSecrets":[],"kube-rbac-proxy":{"image":{},"resources":{"limits":{"cpu":"500m","memory":"128Mi"},"requests":{"cpu":"100m","memory":"64Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}}},"nameOverride":"","nodeSelector":{},"podAnnotations":{},"podLabels":{},"replicaCount":1,"resources":{"limits":{"cpu":"500m","memory":"128Mi"},"requests":{"cpu":"100m","memory":"64Mi"}},"serviceAccount":{"annotations":{},"create":true,"name":"gitops-operator-controller-manager"},"tolerations":[]}` | ------------------------------------------------------------------------------------------------------------------- | | gitops-operator.crds | object | `{"additionalLabels":{},"annotations":{},"install":true,"keep":false}` | Codefresh gitops operator crds | | gitops-operator.crds.additionalLabels | object | `{}` | Additional labels for gitops operator CRDs | | gitops-operator.crds.annotations | object | `{}` | Annotations on gitops operator CRDs | | gitops-operator.crds.install | bool | `true` | Whether or not to install CRDs | | gitops-operator.crds.keep | bool | `false` | Keep CRDs if gitops runtime release is uninstalled | -| gitops-operator.enabled | bool | `true` | | -| gitops-operator.env | object | `{}` | | -| gitops-operator.fullnameOverride | string | `""` | | -| gitops-operator.image | object | `{}` | | -| gitops-operator.imagePullSecrets | list | `[]` | | -| gitops-operator.kube-rbac-proxy.image | object | `{}` | | -| gitops-operator.kube-rbac-proxy.resources.limits.cpu | string | `"500m"` | | -| gitops-operator.kube-rbac-proxy.resources.limits.memory | string | `"128Mi"` | | -| gitops-operator.kube-rbac-proxy.resources.requests.cpu | string | `"100m"` | | -| gitops-operator.kube-rbac-proxy.resources.requests.memory | string | `"64Mi"` | | -| gitops-operator.kube-rbac-proxy.securityContext.allowPrivilegeEscalation | bool | `false` | | -| gitops-operator.kube-rbac-proxy.securityContext.capabilities.drop[0] | string | `"ALL"` | | -| gitops-operator.nameOverride | string | `""` | | -| gitops-operator.nodeSelector | object | `{}` | | -| gitops-operator.podAnnotations | object | `{}` | | -| gitops-operator.podLabels | object | `{}` | | -| gitops-operator.replicaCount | int | `1` | | -| gitops-operator.resources.limits.cpu | string | `"500m"` | | -| gitops-operator.resources.limits.memory | string | `"128Mi"` | | -| gitops-operator.resources.requests.cpu | string | `"100m"` | | -| gitops-operator.resources.requests.memory | string | `"64Mi"` | | -| gitops-operator.serviceAccount.annotations | object | `{}` | | -| gitops-operator.serviceAccount.create | bool | `true` | | -| gitops-operator.serviceAccount.name | string | `"gitops-operator-controller-manager"` | | -| gitops-operator.tolerations | list | `[]` | | | global.codefresh | object | `{"accountId":"","apiEventsPath":"/2.0/api/events","tls":{"caCerts":{"secret":{"annotations":{},"content":"","create":false,"key":"ca-bundle.crt"},"secretKeyRef":{}},"workflowPipelinesGitWebhooks":{"annotatins":{},"certificates":{}}},"url":"https://g.codefresh.io","userToken":{"secretKeyRef":{},"token":""}}` | Codefresh platform and account-related settings | | global.codefresh.accountId | string | `""` | Codefresh Account ID. | | global.codefresh.apiEventsPath | string | `"/2.0/api/events"` | Events API endpoint URL suffix. | @@ -329,7 +285,8 @@ sealed-secrets: | internal-router.serviceAccount.create | bool | `true` | | | internal-router.serviceAccount.name | string | `""` | | | internal-router.tolerations | list | `[]` | | -| sealed-secrets | object | `{"fullnameOverride":"sealed-secrets-controller","image":{"registry":"quay.io","repository":"codefresh/sealed-secrets-controller","tag":"v0.24.5"},"keyrenewperiod":"720h","resources":{"limits":{"cpu":"500m","memory":"1Gi"},"requests":{"cpu":"200m","memory":"512Mi"}}}` | --------------------------------------------------------------------------------------------------------------------- | -| tunnel-client | object | `{"enabled":true,"libraryMode":true,"tunnelServer":{"host":"register-tunnels.cf-cd.com","subdomainHost":"tunnels.cf-cd.com"}}` | Tunnel based runtime. Not supported for on-prem platform. In on-prem use ingress based runtimes. | +| key | string | `"value"` | | +| sealed-secrets | object | `{"fullnameOverride":"sealed-secrets-controller","image":{"registry":"quay.io","repository":"codefresh/sealed-secrets-controller","tag":"v0.24.5"},"keyrenewperiod":"720h","resources":{"limits":{"cpu":"500m","memory":"1Gi"},"requests":{"cpu":"200m","memory":"512Mi"}}}` | ------------------------------------------------------------------------------------------------------------------- | +| tunnel-client | object | `{"enabled":true,"libraryMode":true,"tunnelServer":{"host":"register-tunnels.cf-cd.com","subdomainHost":"tunnels.cf-cd.com"}}` | ------------------------------------------------------------------------------------------------------------------- | | tunnel-client.enabled | bool | `true` | Will only be used if global.runtime.ingress.enabled = false | | tunnel-client.libraryMode | bool | `true` | Do not change this value! Breaks chart logic | diff --git a/charts/gitops-runtime/values.yaml b/charts/gitops-runtime/values.yaml index 2989f438..6eee373c 100644 --- a/charts/gitops-runtime/values.yaml +++ b/charts/gitops-runtime/values.yaml @@ -13,7 +13,6 @@ global: token: "" # -- User token that references an existing secret containing the token. secretKeyRef: {} - tls: # -- Custom CA certificates bundle for platform access with ssl caCerts: @@ -32,18 +31,16 @@ global: # -----BEGIN CERTIFICATE----- # ... encoded certificate data here ... # -----END CERTIFICATE----- - # -- Certificates to be used in argo workflows pipelines created in Codefresh UI. # -- Those will be merged with the certificats defined in argo-cd.configs.tls.certificates - so if the certificates are already provided for ArgoCD, there is no need to provide them again. workflowPipelinesGitWebhooks: # Annotations on the secret resource annotatins: {} certificates: {} - # server.example.com: | - # -----BEGIN CERTIFICATE----- - # ... - # -----END CERTIFICATE----- - + # server.example.com: | + # -----BEGIN CERTIFICATE----- + # ... + # -----END CERTIFICATE----- # -- Runtime level settings runtime: # -- Runtime name. Must be unique per platform account. @@ -78,10 +75,9 @@ global: value: # -- secretKeyReference for Git credentials password. Provide name and key fields. secretKeyRef: {} - - # -- Runtime eventbus + # -- Runtime eventbus eventBus: - # -- Eventbus name + # -- Eventbus name name: 'codefresh-eventbus' # -- Annotations on EventBus resource annotations: {} @@ -105,7 +101,6 @@ global: cpu: 200m memory: 1Gi ephemeral-storage: 2Gi - # ------------------------------------------------------------------------------------------------------------------------- # Installer # ------------------------------------------------------------------------------------------------------------------------- @@ -117,10 +112,9 @@ installer: repository: quay.io/codefresh/gitops-runtime-installer tag: "" pullPolicy: IfNotPresent - -# ----------------------------------------------------------------------------------------------------------------------- -# Sealed secrets -# ----------------------------------------------------------------------------------------------------------------------- +# --------------------------------------------------------------------------------------------------------------------- +# DOCS: https://artifacthub.io/packages/helm/bitnami-labs/sealed-secrets/2.14.1?modal=values +# --------------------------------------------------------------------------------------------------------------------- sealed-secrets: fullnameOverride: sealed-secrets-controller keyrenewperiod: "720h" @@ -135,10 +129,9 @@ sealed-secrets: requests: cpu: 200m memory: 512Mi - -#----------------------------------------------------------------------------------------------------------------------- -# ArgoCD -#----------------------------------------------------------------------------------------------------------------------- +# --------------------------------------------------------------------------------------------------------------------- +# DOCS: https://github.com/codefresh-io/argo-helm/blob/argo-cd-6.7.18-3-cap-2.10-2024.5.14-9315e75e1/charts/argo-cd +# --------------------------------------------------------------------------------------------------------------------- argo-cd: fullnameOverride: argo-cd crds: @@ -167,17 +160,14 @@ argo-cd: useApplicationConfiguration: true notifications: enabled: true - bots: slack: {} - notifiers: service.webhook.cf-promotion-app-revision-changed-notifier: | url: http://gitops-operator:8082/app-revision-changed headers: - name: Content-Type value: application/json - subscriptions: - triggers: - cf-promotion-on-deployed-trigger @@ -187,7 +177,6 @@ argo-cd: - cf-promotion-on-out-of-sync-trigger recipients: - cf-promotion-app-revision-changed-notifier - templates: template.cf-promotion-app-revision-changed-template: | webhook: @@ -203,7 +192,6 @@ argo-cd: "PREV_COMMIT_SHA": {{ (index .app.status.history (sub (len .app.status.history) 2)).revision | quote }}, "CURRENT_COMMIT_SHA": {{ .app.status.operationState.syncResult.revision | quote }} } - triggers: trigger.cf-promotion-on-deployed-trigger: | - description: Application is synced and healthy. Triggered once per commit. @@ -217,41 +205,37 @@ argo-cd: oncePer: app.status.operationState.syncResult.revision send: - cf-promotion-app-revision-changed-template - -#----------------------------------------------------------------------------------------------------------------------- -# Argo Events -#----------------------------------------------------------------------------------------------------------------------- +# --------------------------------------------------------------------------------------------------------------------- +# DOCS: https://github.com/codefresh-io/argo-helm/blob/argo-events-2.0.9-1-cap-CR-19893/charts/argo-events +# --------------------------------------------------------------------------------------------------------------------- argo-events: fullnameOverride: argo-events crds: install: false - -#----------------------------------------------------------------------------------------------------------------------- -# Argo Workflows -#----------------------------------------------------------------------------------------------------------------------- +# --------------------------------------------------------------------------------------------------------------------- +# DOCS: https://github.com/codefresh-io/argo-helm/blob/argo-workflows-0.40.9-1-v3.5.4-cap-CR-22243/charts/argo-workflows +# --------------------------------------------------------------------------------------------------------------------- argo-workflows: fullnameOverride: argo enabled: true server: # -- auth-mode needs to be set to client to be able to see workflow logs from Codefresh UI authModes: - - client + - client # -- Do not change. Workflows UI is only accessed through internal router, changing this values will break routing to workflows native UI from Codefresh. baseHref: /workflows/ crds: # -- Install and upgrade CRDs install: true - -#----------------------------------------------------------------------------------------------------------------------- -# Argo rollouts -#----------------------------------------------------------------------------------------------------------------------- +# --------------------------------------------------------------------------------------------------------------------- +# DOCS: https://github.com/codefresh-io/argo-helm/blob/argo-rollouts-2.32.5-4-additional-logs/charts/argo-rollouts +# --------------------------------------------------------------------------------------------------------------------- argo-rollouts: enabled: true fullnameOverride: argo-rollouts controller: replicas: 1 installCRDs: true - #----------------------------------------------------------------------------------------------------------------------- # Event reporters #----------------------------------------------------------------------------------------------------------------------- @@ -353,7 +337,6 @@ event-reporters: tolerations: [] nodeSelector: {} affinity: {} - #----------------------------------------------------------------------------------------------------------------------- # Internal router #----------------------------------------------------------------------------------------------------------------------- @@ -375,29 +358,27 @@ internal-router: podSecurityContext: {} # -- Environment variables - see values.yaml inside the chart for usage env: {} - # NAMESPACE: - # valueFrom: - # fieldRef: - # fieldPath: metadata.namespace - # VAR_NAME: - # valueFrom: - # secretKeyRef: - # name: my-secret - # key: my-secret-key - # optional: true - # VAR_NAME: - # valueFrom: - # configMapKeyRef: - # name: my-config-map - # key: my-config-map-key - # optional: true - # VAR_NANE: string-value + # NAMESPACE: + # valueFrom: + # fieldRef: + # fieldPath: metadata.namespace + # VAR_NAME: + # valueFrom: + # secretKeyRef: + # name: my-secret + # key: my-secret-key + # optional: true + # VAR_NAME: + # valueFrom: + # configMapKeyRef: + # name: my-config-map + # key: my-config-map-key + # optional: true + # VAR_NANE: string-value securityContext: {} - service: type: ClusterIP port: 80 - resources: limits: memory: 256Mi @@ -405,23 +386,21 @@ internal-router: requests: memory: 128Mi cpu: "0.2" - nodeSelector: {} tolerations: [] affinity: {} # -- Internal routing settings. Do not change this unless you are absolutely certain - the values are determined by chart's logic. routing: {} # Example of values: - # workflows: - # enabled: true - # internalUrl: "https://argo-server1:2746/" - # app-proxy: - # internalUrl: "http://cap-app-proxy:3017" + # workflows: + # enabled: true + # internalUrl: "https://argo-server1:2746/" + # app-proxy: + # internalUrl: "http://cap-app-proxy:3017" dnsService: kube-dns dnsNamespace: kube-system clusterDomain: cluster.local - ## Internal-Router Pod Disruption Budget pdb: # -- Enable PDB @@ -430,11 +409,9 @@ internal-router: minAvailable: 1 # -- Set number of pods that are unavailable after eviction as number or percentage maxUnavailable: "" - -#----------------------------------------------------------------------------------------------------------------------- -# tunnel client -#----------------------------------------------------------------------------------------------------------------------- -# -- Tunnel based runtime. Not supported for on-prem platform. In on-prem use ingress based runtimes. +# --------------------------------------------------------------------------------------------------------------------- +# DOCS: https://github.com/codefresh-io/codefresh-tunnel-charts/blob/codefresh-tunnel-client-0.1.15-helm/codefresh-tunnel-client/values.yaml +# --------------------------------------------------------------------------------------------------------------------- tunnel-client: # -- Will only be used if global.runtime.ingress.enabled = false enabled: true @@ -443,7 +420,6 @@ tunnel-client: tunnelServer: host: "register-tunnels.cf-cd.com" subdomainHost: "tunnels.cf-cd.com" - #----------------------------------------------------------------------------------------------------------------------- # app-proxy #----------------------------------------------------------------------------------------------------------------------- @@ -498,7 +474,6 @@ app-proxy: pullPolicy: IfNotPresent # -- Extra volume mounts for main container extraVolumeMounts: [] - initContainer: image: repository: quay.io/codefresh/cap-app-proxy-init @@ -506,9 +481,7 @@ app-proxy: pullPolicy: IfNotPresent command: - ./init.sh - env: {} - resources: limits: memory: 512Mi @@ -516,14 +489,11 @@ app-proxy: requests: memory: 256Mi cpu: '0.2' - # -- Extra volume mounts for init container extraVolumeMounts: [] - imagePullSecrets: [] nameOverride: "" fullnameOverride: "cap-app-proxy" - config: # -- ArgoCD user to be used by app-proxy argoCdUsername: "admin" @@ -537,24 +507,18 @@ app-proxy: skipGitPermissionValidation: "false" # -- Log Level logLevel: "info" - env: {} - serviceAccount: create: true annotations: {} name: "cap-app-proxy" - podAnnotations: {} - podLabels: {} - podSecurityContext: {} - # fsGroup: 2000 + # fsGroup: 2000 securityContext: allowPrivilegeEscalation: false - readinessProbe: # -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded. failureThreshold: 3 @@ -566,7 +530,6 @@ app-proxy: successThreshold: 1 # -- Number of seconds after which the [probe] times out. timeoutSeconds: 10 - livenessProbe: # -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded. failureThreshold: 10 @@ -578,11 +541,9 @@ app-proxy: successThreshold: 1 # -- Number of seconds after which the [probe] times out. timeoutSeconds: 10 - service: type: ClusterIP port: 3017 - resources: requests: memory: '512Mi' @@ -592,13 +553,11 @@ app-proxy: memory: '1Gi' ephemeral-storage: '6Gi' cpu: '1500m' - nodeSelector: {} tolerations: [] affinity: {} # -- extra volumes extraVolumes: [] - ## App-Proxy Pod Disruption Budget pdb: # -- Enable PDB @@ -608,13 +567,12 @@ app-proxy: # -- Set number of pods that are unavailable after eviction as number or percentage maxUnavailable: "" -#----------------------------------------------------------------------------------------------------------------------- -# gitops-operator -#----------------------------------------------------------------------------------------------------------------------- +# --------------------------------------------------------------------------------------------------------------------- +# DOCS: https://github.com/codefresh-io/codefresh-gitops-operator/tree/codefresh-gitops-operator-1.0.13-helm/charts/codefresh-gitops-operator +# --------------------------------------------------------------------------------------------------------------------- gitops-operator: enabled: true replicaCount: 1 - # -- Codefresh gitops operator crds crds: # -- Whether or not to install CRDs @@ -625,29 +583,24 @@ gitops-operator: annotations: {} # -- Additional labels for gitops operator CRDs additionalLabels: {} - env: {} image: {} - # -- defaults - # repository: quay.io/codefresh/codefresh-gitops-operator - # tag: 'v{{ .Chart.AppVersion }}' + # -- defaults + # repository: quay.io/codefresh/codefresh-gitops-operator + # tag: 'v{{ .Chart.AppVersion }}' serviceAccount: create: true annotations: {} name: "gitops-operator-controller-manager" - imagePullSecrets: [] nameOverride: "" fullnameOverride: "" - podAnnotations: {} podLabels: {} - nodeSelector: {} tolerations: [] affinity: {} - resources: limits: cpu: 500m @@ -655,19 +608,17 @@ gitops-operator: requests: cpu: 100m memory: 64Mi - kube-rbac-proxy: image: {} - # -- defaults - # repository: gcr.io/kubebuilder/kube-rbac-proxy - # tag: v0.14.1 + # -- defaults + # repository: gcr.io/kubebuilder/kube-rbac-proxy + # tag: v0.14.1 securityContext: allowPrivilegeEscalation: false capabilities: drop: - "ALL" - resources: limits: cpu: 500m @@ -675,7 +626,6 @@ gitops-operator: requests: cpu: 100m memory: 64Mi - key: "value" foo: "bar" alice: "bob"