@@ -191,6 +191,20 @@ sealed-secrets:
191191
192192## Upgrading
193193
194+ ### To >=0.23.3
195+
196+ #### Manual fix in the ISC repository
197+
198+ If the ISC repository already contains the resources/app-projects/cf-runtime-app-project.yaml file it should be manually updated:
199+ ``` yaml
200+ ...
201+ spec :
202+ destinations :
203+ - namespace : ' *'
204+ server : " *" # <-- replace 'https://kubernetes.default.svc' with "*" here
205+ ...
206+ ```
207+
194208### To 0.23.x
195209
196210#### Affected values
@@ -311,13 +325,36 @@ gitops-operator:
311325| app-proxy.serviceMonitor.labels | object | `{}` | |
312326| app-proxy.serviceMonitor.name | string | `""` | |
313327| app-proxy.tolerations | list | `[]` | |
314- | argo-cd | object | `{"applicationVersioning":{"enabled":true,"useApplicationConfiguration":true},"configs":{"cm":{"accounts.admin":"apiKey,login","application.resourceTrackingMethod":"annotation+label","resource.customizations.actions.argoproj.io_Rollout":"mergeBuiltinActions: true\ndiscovery.lua: |\n actions = {}\n local fullyPromoted = obj.status.currentPodHash == obj.status.stableRS\n actions[\"pause\"] = {[\"disabled\"] = fullyPromoted or obj.spec.paused == true}\n actions[\"skip-current-step\"] = {[\"disabled\"] = obj.spec.strategy.canary == nil or obj.spec.strategy.canary.steps == nil or obj.status.currentStepIndex == table.getn(obj.spec.strategy.canary.steps)}\n return actions\ndefinitions:\n- name: pause\n action.lua: |\n obj.spec.paused = true\n return obj\n- name: skip-current-step\n action.lua: |\n if obj.status ~= nil then\n if obj.spec.strategy.canary ~= nil and obj.spec.strategy.canary.steps ~= nil and obj.status.currentStepIndex < table.getn(obj.spec.strategy.canary.steps) then\n if obj.status.pauseConditions ~= nil and table.getn(obj.status.pauseConditions) > 0 then\n obj.status.pauseConditions = nil\n end\n obj.status.currentStepIndex = obj.status.currentStepIndex + 1\n end\n end\n return obj\n","timeout.reconciliation":"20s"},"params":{"application.namespaces":"cf-*","server.insecure":true}},"crds":{"install":true},"enabled":true,"fullnameOverride":"argo-cd"}` | ------------------------------------------------------------------------------------------------------------------- |
315328| argo-cd.applicationVersioning.enabled | bool | `true` | Enable application versioning |
316329| argo-cd.applicationVersioning.useApplicationConfiguration | bool | `true` | Extract application version based on ApplicationConfiguration CRD |
317- | argo-events | object | `{"configs":{"jetstream":{"versions":[{"configReloaderImage":"natsio/nats-server-config-reloader:0.18.2","metricsExporterImage":"natsio/prometheus-nats-exporter:0.16.0","natsImage":"nats:2.11.4","startCommand":"/nats-server","version":"latest"}]},"nats":{"versions":[{"metricsExporterImage":"natsio/prometheus-nats-exporter:0.16.0","natsStreamingImage":"nats-streaming:0.25.6","version":"0.22.1"}]}},"crds":{"install":false},"fullnameOverride":"argo-events"}` | ------------------------------------------------------------------------------------------------------------------- |
318- | argo-rollouts | object | `{"controller":{"replicas":1},"enabled":true,"fullnameOverride":"argo-rollouts","installCRDs":true}` | ------------------------------------------------------------------------------------------------------------------- |
319- | argo-workflows | object | `{"crds":{"install":true},"enabled":true,"executor":{"resources":{"requests":{"ephemeral-storage":"10Mi"}}},"fullnameOverride":"argo","mainContainer":{"resources":{"requests":{"ephemeral-storage":"10Mi"}}},"server":{"authModes":["client"],"baseHref":"/workflows/"}}` | ------------------------------------------------------------------------------------------------------------------- |
330+ | argo-cd.configs.cm."accounts.admin" | string | `"apiKey,login"` | |
331+ | argo-cd.configs.cm."application.resourceTrackingMethod" | string | `"annotation+label"` | |
332+ | argo-cd.configs.cm."resource.customizations.actions.argoproj.io_Rollout" | string | `"mergeBuiltinActions: true\ndiscovery.lua: |\n actions = {}\n local fullyPromoted = obj.status.currentPodHash == obj.status.stableRS\n actions[\"pause\"] = {[\"disabled\"] = fullyPromoted or obj.spec.paused == true}\n actions[\"skip-current-step\"] = {[\"disabled\"] = obj.spec.strategy.canary == nil or obj.spec.strategy.canary.steps == nil or obj.status.currentStepIndex == table.getn(obj.spec.strategy.canary.steps)}\n return actions\ndefinitions:\n- name: pause\n action.lua: |\n obj.spec.paused = true\n return obj\n- name: skip-current-step\n action.lua: |\n if obj.status ~= nil then\n if obj.spec.strategy.canary ~= nil and obj.spec.strategy.canary.steps ~= nil and obj.status.currentStepIndex < table.getn(obj.spec.strategy.canary.steps) then\n if obj.status.pauseConditions ~= nil and table.getn(obj.status.pauseConditions) > 0 then\n obj.status.pauseConditions = nil\n end\n obj.status.currentStepIndex = obj.status.currentStepIndex + 1\n end\n end\n return obj\n"` | |
333+ | argo-cd.configs.cm."timeout.reconciliation" | string | `"20s"` | |
334+ | argo-cd.configs.params."application.namespaces" | string | `"cf-*"` | |
335+ | argo-cd.configs.params."server.insecure" | bool | `true` | |
336+ | argo-cd.crds.install | bool | `true` | |
337+ | argo-cd.enabled | bool | `true` | |
338+ | argo-cd.fullnameOverride | string | `"argo-cd"` | |
339+ | argo-events.configs.jetstream.versions[0].configReloaderImage | string | `"natsio/nats-server-config-reloader:0.18.2"` | |
340+ | argo-events.configs.jetstream.versions[0].metricsExporterImage | string | `"natsio/prometheus-nats-exporter:0.16.0"` | |
341+ | argo-events.configs.jetstream.versions[0].natsImage | string | `"nats:2.11.4"` | |
342+ | argo-events.configs.jetstream.versions[0].startCommand | string | `"/nats-server"` | |
343+ | argo-events.configs.jetstream.versions[0].version | string | `"latest"` | |
344+ | argo-events.configs.nats.versions[0].metricsExporterImage | string | `"natsio/prometheus-nats-exporter:0.16.0"` | |
345+ | argo-events.configs.nats.versions[0].natsStreamingImage | string | `"nats-streaming:0.25.6"` | |
346+ | argo-events.configs.nats.versions[0].version | string | `"0.22.1"` | |
347+ | argo-events.crds.install | bool | `false` | |
348+ | argo-events.fullnameOverride | string | `"argo-events"` | |
349+ | argo-rollouts.controller.replicas | int | `1` | |
350+ | argo-rollouts.enabled | bool | `true` | |
351+ | argo-rollouts.fullnameOverride | string | `"argo-rollouts"` | |
352+ | argo-rollouts.installCRDs | bool | `true` | |
320353| argo-workflows.crds.install | bool | `true` | Install and upgrade CRDs |
354+ | argo-workflows.enabled | bool | `true` | |
355+ | argo-workflows.executor.resources.requests.ephemeral-storage | string | `"10Mi"` | |
356+ | argo-workflows.fullnameOverride | string | `"argo"` | |
357+ | argo-workflows.mainContainer.resources.requests.ephemeral-storage | string | `"10Mi"` | |
321358| argo-workflows.server.authModes | list | `["client"]` | auth-mode needs to be set to client to be able to see workflow logs from Codefresh UI |
322359| argo-workflows.server.baseHref | string | `"/workflows/"` | Do not change. Workflows UI is only accessed through internal router, changing this values will break routing to workflows native UI from Codefresh. |
323360| cf-argocd-extras | object | `{"eventReporter":{"affinity":{},"container":{"image":{"registry":"quay.io","repository":"codefresh/cf-argocd-extras","tag":"v0.5.14"}},"enabled":true,"nodeSelector":{},"pdb":{"enabled":false,"maxUnavailable":"","minAvailable":"50%"},"resources":{"requests":{"cpu":"100m","memory":"128Mi"}},"serviceMonitor":{"main":{"enabled":false}},"tolerations":[]},"sourcesServer":{"affinity":{},"container":{"image":{"registry":"quay.io","repository":"codefresh/cf-argocd-extras","tag":"v0.5.14"}},"enabled":true,"hpa":{"enabled":false,"maxReplicas":10,"minReplicas":1,"targetCPUUtilizationPercentage":70},"nodeSelector":{},"pdb":{"enabled":false,"maxUnavailable":"","minAvailable":"50%"},"resources":{"requests":{"cpu":"100m","memory":"128Mi"}},"tolerations":[]}}` | Codefresh extra services for ArgoCD |
@@ -502,7 +539,19 @@ gitops-operator:
502539| internal-router.serviceAccount.create | bool | `true` | |
503540| internal-router.serviceAccount.name | string | `""` | |
504541| internal-router.tolerations | list | `[]` | |
505- | sealed-secrets | object | `{"fullnameOverride":"sealed-secrets-controller","image":{"registry":"quay.io","repository":"codefresh/sealed-secrets-controller","tag":"0.29.0"},"keyrenewperiod":"720h","resources":{"limits":{"cpu":"500m","memory":"1Gi"},"requests":{"cpu":"200m","memory":"512Mi"}}}` | ------------------------------------------------------------------------------------------------------------------- |
506- | tunnel-client | object | `{"affinity":{},"enabled":true,"libraryMode":true,"nodeSelector":{},"tolerations":[],"tunnelServer":{"host":"register-tunnels.cf-cd.com","subdomainHost":"tunnels.cf-cd.com"}}` | ------------------------------------------------------------------------------------------------------------------- |
542+ | sealed-secrets.fullnameOverride | string | `"sealed-secrets-controller"` | |
543+ | sealed-secrets.image.registry | string | `"quay.io"` | |
544+ | sealed-secrets.image.repository | string | `"codefresh/sealed-secrets-controller"` | |
545+ | sealed-secrets.image.tag | string | `"0.29.0"` | |
546+ | sealed-secrets.keyrenewperiod | string | `"720h"` | |
547+ | sealed-secrets.resources.limits.cpu | string | `"500m"` | |
548+ | sealed-secrets.resources.limits.memory | string | `"1Gi"` | |
549+ | sealed-secrets.resources.requests.cpu | string | `"200m"` | |
550+ | sealed-secrets.resources.requests.memory | string | `"512Mi"` | |
551+ | tunnel-client.affinity | object | `{}` | |
507552| tunnel-client.enabled | bool | `true` | Will only be used if global.runtime.ingress.enabled = false |
508553| tunnel-client.libraryMode | bool | `true` | Do not change this value! Breaks chart logic |
554+ | tunnel-client.nodeSelector | object | `{}` | |
555+ | tunnel-client.tolerations | list | `[]` | |
556+ | tunnel-client.tunnelServer.host | string | `"register-tunnels.cf-cd.com"` | |
557+ | tunnel-client.tunnelServer.subdomainHost | string | `"tunnels.cf-cd.com"` | |
0 commit comments