|
1 | 1 | ## Codefresh gitops runtime |
2 | | -  |
| 2 | +  |
3 | 3 |
|
4 | 4 | ## Prerequisites |
5 | 5 |
|
@@ -27,7 +27,7 @@ We have created a helper utility to resolve this issue: |
27 | 27 | The utility is packaged in a container image. Below are instructions on executing the utility using Docker: |
28 | 28 |
|
29 | 29 | ``` |
30 | | -docker run -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.4.1 <local_registry> |
| 30 | +docker run -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.4.2 <local_registry> |
31 | 31 | ``` |
32 | 32 | `output_dir` - is a local directory where the utility will output files. <br> |
33 | 33 | `local_registry` - is your local registry where you want to mirror the images to |
@@ -100,14 +100,14 @@ sealed-secrets: |
100 | 100 | | app-proxy.image-enrichment.serviceAccount.name | string | `"codefresh-image-enrichment-sa"` | Name of the service account to create or the name of the existing one to use | |
101 | 101 | | app-proxy.image.pullPolicy | string | `"IfNotPresent"` | | |
102 | 102 | | app-proxy.image.repository | string | `"quay.io/codefresh/cap-app-proxy"` | | |
103 | | -| app-proxy.image.tag | string | `"1.2585.0"` | | |
| 103 | +| app-proxy.image.tag | string | `"1.2608.0"` | | |
104 | 104 | | app-proxy.imagePullSecrets | list | `[]` | | |
105 | 105 | | app-proxy.initContainer.command[0] | string | `"./init.sh"` | | |
106 | 106 | | app-proxy.initContainer.env | object | `{}` | | |
107 | 107 | | app-proxy.initContainer.extraVolumeMounts | list | `[]` | Extra volume mounts for init container | |
108 | 108 | | app-proxy.initContainer.image.pullPolicy | string | `"IfNotPresent"` | | |
109 | 109 | | app-proxy.initContainer.image.repository | string | `"quay.io/codefresh/cap-app-proxy-init"` | | |
110 | | -| app-proxy.initContainer.image.tag | string | `"1.2585.0"` | | |
| 110 | +| app-proxy.initContainer.image.tag | string | `"1.2608.0"` | | |
111 | 111 | | app-proxy.initContainer.resources.limits.cpu | string | `"1"` | | |
112 | 112 | | app-proxy.initContainer.resources.limits.memory | string | `"512Mi"` | | |
113 | 113 | | app-proxy.initContainer.resources.requests.cpu | string | `"0.2"` | | |
@@ -325,7 +325,7 @@ sealed-secrets: |
325 | 325 | | internal-router.serviceAccount.create | bool | `true` | | |
326 | 326 | | internal-router.serviceAccount.name | string | `""` | | |
327 | 327 | | internal-router.tolerations | list | `[]` | | |
328 | | -| sealed-secrets | object | `{"fullnameOverride":"sealed-secrets-controller","image":{"registry":"quay.io","repository":"codefresh/sealed-secrets-controller","tag":"v0.19.4"},"keyrenewperiod":"720h","resources":{"limits":{"cpu":"500m","memory":"1Gi"},"requests":{"cpu":"200m","memory":"512Mi"}}}` | --------------------------------------------------------------------------------------------------------------------- | |
| 328 | +| sealed-secrets | object | `{"fullnameOverride":"sealed-secrets-controller","image":{"registry":"quay.io","repository":"codefresh/sealed-secrets-controller","tag":"v0.24.5"},"keyrenewperiod":"720h","resources":{"limits":{"cpu":"500m","memory":"1Gi"},"requests":{"cpu":"200m","memory":"512Mi"}}}` | --------------------------------------------------------------------------------------------------------------------- | |
329 | 329 | | tunnel-client | object | `{"enabled":true,"libraryMode":true,"tunnelServer":{"host":"register-tunnels.cf-cd.com","subdomainHost":"tunnels.cf-cd.com"}}` | Tunnel based runtime. Not supported for on-prem platform. In on-prem use ingress based runtimes. | |
330 | 330 | | tunnel-client.enabled | bool | `true` | Will only be used if global.runtime.ingress.enabled = false | |
331 | 331 | | tunnel-client.libraryMode | bool | `true` | Do not change this value! Breaks chart logic | |
0 commit comments