11## Codefresh gitops runtime
2- ![ Version: 0.2.18 ] ( https://img.shields.io/badge/Version-0.2.18 -informational?style=flat-square ) ![ AppVersion: 0.1.35] ( https://img.shields.io/badge/AppVersion-0.1.35-informational?style=flat-square )
2+ ![ Version: 0.2.19 ] ( https://img.shields.io/badge/Version-0.2.19 -informational?style=flat-square ) ![ AppVersion: 0.1.35] ( https://img.shields.io/badge/AppVersion-0.1.35-informational?style=flat-square )
33
44## Codefresh official documentation:
55Prior to running the installation please see the official documentation at: https://codefresh.io/docs/docs/installation/gitops/hybrid-gitops-helm-installation/
@@ -15,7 +15,7 @@ We have created a helper utility to resolve this issue:
1515The utility is packaged in a container image. Below are instructions on executing the utility using Docker:
1616
1717```
18- docker run -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.2.18 <local_registry>
18+ docker run -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.2.19 <local_registry>
1919```
2020` output_dir ` - is a local directory where the utility will output files. <br >
2121` local_registry ` - is your local registry where you want to mirror the images to
@@ -161,6 +161,47 @@ sealed-secrets:
161161| event-reporters.workflow.sensor.replicas | int | `1` | |
162162| event-reporters.workflow.sensor.resources | object | `{}` | |
163163| event-reporters.workflow.serviceAccount.create | bool | `true` | |
164+ | gitops-operator.affinity | object | `{}` | |
165+ | gitops-operator.fullnameOverride | string | `""` | |
166+ | gitops-operator.image.pullPolicy | string | `"IfNotPresent"` | |
167+ | gitops-operator.image.repository | string | `"quay.io/codefresh/codefresh-gitops-operator"` | |
168+ | gitops-operator.image.tag | string | `"v0.0.1"` | |
169+ | gitops-operator.imagePullSecrets | list | `[]` | |
170+ | gitops-operator.kube-rbac-proxy.image.pullPolicy | string | `"IfNotPresent"` | |
171+ | gitops-operator.kube-rbac-proxy.image.repository | string | `"gcr.io/kubebuilder/kube-rbac-proxy"` | |
172+ | gitops-operator.kube-rbac-proxy.image.tag | string | `"v0.14.1"` | |
173+ | gitops-operator.kube-rbac-proxy.resources.limits.cpu | string | `"500m"` | |
174+ | gitops-operator.kube-rbac-proxy.resources.limits.memory | string | `"128Mi"` | |
175+ | gitops-operator.kube-rbac-proxy.resources.requests.cpu | string | `"100m"` | |
176+ | gitops-operator.kube-rbac-proxy.resources.requests.memory | string | `"64Mi"` | |
177+ | gitops-operator.kube-rbac-proxy.securityContext.allowPrivilegeEscalation | bool | `false` | |
178+ | gitops-operator.kube-rbac-proxy.securityContext.capabilities.drop[0] | string | `"ALL"` | |
179+ | gitops-operator.livenessProbe.failureThreshold | int | `10` | |
180+ | gitops-operator.livenessProbe.initialDelaySeconds | int | `10` | |
181+ | gitops-operator.livenessProbe.periodSeconds | int | `10` | |
182+ | gitops-operator.livenessProbe.successThreshold | int | `1` | |
183+ | gitops-operator.livenessProbe.timeoutSeconds | int | `10` | |
184+ | gitops-operator.nameOverride | string | `""` | |
185+ | gitops-operator.nodeSelector | object | `{}` | |
186+ | gitops-operator.podAnnotations | object | `{}` | |
187+ | gitops-operator.podLabels | object | `{}` | |
188+ | gitops-operator.podSecurityContext.runAsNonRoot | bool | `true` | |
189+ | gitops-operator.readinessProbe.failureThreshold | int | `3` | |
190+ | gitops-operator.readinessProbe.initialDelaySeconds | int | `10` | |
191+ | gitops-operator.readinessProbe.periodSeconds | int | `10` | |
192+ | gitops-operator.readinessProbe.successThreshold | int | `1` | |
193+ | gitops-operator.readinessProbe.timeoutSeconds | int | `10` | |
194+ | gitops-operator.replicaCount | int | `1` | |
195+ | gitops-operator.resources.limits.cpu | string | `"500m"` | |
196+ | gitops-operator.resources.limits.memory | string | `"128Mi"` | |
197+ | gitops-operator.resources.requests.cpu | string | `"100m"` | |
198+ | gitops-operator.resources.requests.memory | string | `"64Mi"` | |
199+ | gitops-operator.securityContext.allowPrivilegeEscalation | bool | `false` | |
200+ | gitops-operator.securityContext.capabilities.drop[0] | string | `"ALL"` | |
201+ | gitops-operator.serviceAccount.annotations | object | `{}` | |
202+ | gitops-operator.serviceAccount.create | bool | `true` | |
203+ | gitops-operator.serviceAccount.name | string | `"controller-manager"` | |
204+ | gitops-operator.tolerations | list | `[]` | |
164205| global.codefresh | object | `{"accountId":"","apiEventsPath":"/2.0/api/events","tls":{"caCerts":{"secret":{"annotations":{},"content":"","create":false,"key":"ca-bundle.crt"},"secretKeyRef":{}},"workflowPipelinesGitWebhooks":{"annotatins":{},"certificates":{}}},"url":"https://g.codefresh.io","userToken":{"secretKeyRef":{},"token":""}}` | Codefresh platform and account-related settings |
165206| global.codefresh.accountId | string | `""` | Codefresh Account ID. |
166207| global.codefresh.apiEventsPath | string | `"/2.0/api/events"` | Events API endpoint URL suffix. |
0 commit comments