|
1 | 1 | ## Codefresh gitops runtime
|
2 |
| -  |
| 2 | +  |
3 | 3 |
|
4 | 4 | ## Prerequisites
|
5 | 5 |
|
@@ -27,7 +27,7 @@ We have created a helper utility to resolve this issue:
|
27 | 27 | The utility is packaged in a container image. Below are instructions on executing the utility using Docker:
|
28 | 28 |
|
29 | 29 | ```
|
30 |
| -docker run -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.4.2 <local_registry> |
| 30 | +docker run -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.4.3 <local_registry> |
31 | 31 | ```
|
32 | 32 | `output_dir` - is a local directory where the utility will output files. <br>
|
33 | 33 | `local_registry` - is your local registry where you want to mirror the images to
|
@@ -223,43 +223,32 @@ sealed-secrets:
|
223 | 223 | | gitops-operator.crds.annotations | object | `{}` | Annotations on gitops operator CRDs |
|
224 | 224 | | gitops-operator.crds.install | bool | `true` | Whether or not to install CRDs |
|
225 | 225 | | gitops-operator.crds.keep | bool | `false` | Keep CRDs if gitops runtime release is uninstalled |
|
| 226 | +| gitops-operator.enabled | bool | `true` | | |
226 | 227 | | gitops-operator.env | object | `{}` | |
|
227 | 228 | | gitops-operator.fullnameOverride | string | `""` | |
|
228 | 229 | | gitops-operator.image.pullPolicy | string | `"IfNotPresent"` | |
|
229 |
| -| gitops-operator.image.repository | string | `"quay.io/codefresh/codefresh-gitops-operator"` | | |
230 |
| -| gitops-operator.image.tag | string | `"v0.1.0-alpha.5"` | | |
| 230 | +| gitops-operator.image.registry | string | `"quay.io"` | | |
| 231 | +| gitops-operator.image.repository | string | `"codefresh/codefresh-gitops-operator"` | | |
231 | 232 | | gitops-operator.imagePullSecrets | list | `[]` | |
|
232 | 233 | | gitops-operator.kube-rbac-proxy.image.pullPolicy | string | `"IfNotPresent"` | |
|
233 |
| -| gitops-operator.kube-rbac-proxy.image.repository | string | `"gcr.io/kubebuilder/kube-rbac-proxy"` | | |
| 234 | +| gitops-operator.kube-rbac-proxy.image.registry | string | `"gcr.io"` | | |
| 235 | +| gitops-operator.kube-rbac-proxy.image.repository | string | `"kubebuilder/kube-rbac-proxy"` | | |
234 | 236 | | gitops-operator.kube-rbac-proxy.image.tag | string | `"v0.14.1"` | |
|
235 | 237 | | gitops-operator.kube-rbac-proxy.resources.limits.cpu | string | `"500m"` | |
|
236 | 238 | | gitops-operator.kube-rbac-proxy.resources.limits.memory | string | `"128Mi"` | |
|
237 | 239 | | gitops-operator.kube-rbac-proxy.resources.requests.cpu | string | `"100m"` | |
|
238 | 240 | | gitops-operator.kube-rbac-proxy.resources.requests.memory | string | `"64Mi"` | |
|
239 | 241 | | gitops-operator.kube-rbac-proxy.securityContext.allowPrivilegeEscalation | bool | `false` | |
|
240 | 242 | | gitops-operator.kube-rbac-proxy.securityContext.capabilities.drop[0] | string | `"ALL"` | |
|
241 |
| -| gitops-operator.livenessProbe.failureThreshold | int | `10` | | |
242 |
| -| gitops-operator.livenessProbe.initialDelaySeconds | int | `10` | | |
243 |
| -| gitops-operator.livenessProbe.periodSeconds | int | `10` | | |
244 |
| -| gitops-operator.livenessProbe.successThreshold | int | `1` | | |
245 |
| -| gitops-operator.livenessProbe.timeoutSeconds | int | `10` | | |
246 | 243 | | gitops-operator.nameOverride | string | `""` | |
|
247 | 244 | | gitops-operator.nodeSelector | object | `{}` | |
|
248 | 245 | | gitops-operator.podAnnotations | object | `{}` | |
|
249 | 246 | | gitops-operator.podLabels | object | `{}` | |
|
250 |
| -| gitops-operator.podSecurityContext.runAsNonRoot | bool | `true` | | |
251 |
| -| gitops-operator.readinessProbe.failureThreshold | int | `3` | | |
252 |
| -| gitops-operator.readinessProbe.initialDelaySeconds | int | `10` | | |
253 |
| -| gitops-operator.readinessProbe.periodSeconds | int | `10` | | |
254 |
| -| gitops-operator.readinessProbe.successThreshold | int | `1` | | |
255 |
| -| gitops-operator.readinessProbe.timeoutSeconds | int | `10` | | |
256 | 247 | | gitops-operator.replicaCount | int | `1` | |
|
257 | 248 | | gitops-operator.resources.limits.cpu | string | `"500m"` | |
|
258 | 249 | | gitops-operator.resources.limits.memory | string | `"128Mi"` | |
|
259 | 250 | | gitops-operator.resources.requests.cpu | string | `"100m"` | |
|
260 | 251 | | gitops-operator.resources.requests.memory | string | `"64Mi"` | |
|
261 |
| -| gitops-operator.securityContext.allowPrivilegeEscalation | bool | `false` | | |
262 |
| -| gitops-operator.securityContext.capabilities.drop[0] | string | `"ALL"` | | |
263 | 252 | | gitops-operator.serviceAccount.annotations | object | `{}` | |
|
264 | 253 | | gitops-operator.serviceAccount.create | bool | `true` | |
|
265 | 254 | | gitops-operator.serviceAccount.name | string | `"gitops-operator-controller-manager"` | |
|
|
0 commit comments