@@ -30,6 +30,21 @@ const INSTALLATION_DEFAULTS = {
30
30
COMPONENTS_FOLDER : 'components' ,
31
31
} ;
32
32
33
+ const RUNTIME_IMAGES = {
34
+ DOCKER_PUSHER_IMAGE : 'codefresh/cf-docker-pusher:v5' ,
35
+ DOCKER_PULLER_IMAGE : 'codefresh/cf-docker-puller:v7' ,
36
+ DOCKER_TAG_PUSHER_IMAGE : 'codefresh/cf-docker-tag-pusher:v2' ,
37
+ DOCKER_BUILDER_IMAGE : 'codefresh/cf-docker-builder:v16' ,
38
+ GC_BUILDER_IMAGE : 'codefresh/cf-gc-builder:0.4.0' ,
39
+ CONTAINER_LOGGER_IMAGE : 'codefresh/cf-container-logger:1.4.2' ,
40
+ GIT_CLONE_IMAGE : 'codefresh/cf-git-cloner:10.0.1' ,
41
+ COMPOSE_IMAGE : 'docker/compose:1.11.2' ,
42
+ KUBE_DEPLOY : 'codefresh/cf-deploy-kubernetes:latest' ,
43
+ FS_OPS_IMAGE : 'codefresh/fs-ops:latest' ,
44
+ TEMPLATE_ENGINE : 'codefresh/pikolo:latest' ,
45
+ PIPELINE_DEBUGGER_IMAGE : 'codefresh/cf-debugger:1.1.2' ,
46
+ } ;
47
+
33
48
const maxRuntimeNameLength = 63 ;
34
49
const DefaultLogFormatter = 'plain' ;
35
50
@@ -549,6 +564,9 @@ async function installRuntime({
549
564
if ( storageClassName ) {
550
565
cmd . push ( `--storage-class=${ storageClassName } ` ) ;
551
566
}
567
+ if ( process . env . NODE_TLS_REJECT_UNAUTHORIZED === '0' ) {
568
+ cmd . push ( '--insecure' ) ;
569
+ }
552
570
553
571
await componentRunner . run ( components . venona , cmd ) ;
554
572
}
@@ -690,6 +708,13 @@ function detectProxy() {
690
708
} ;
691
709
}
692
710
711
+ function getRuntimeImagesWithRegistryUrl ( registry ) {
712
+ return Object . keys ( RUNTIME_IMAGES ) . reduce ( ( acc , cur ) => {
713
+ acc [ cur ] = `${ registry } /${ RUNTIME_IMAGES [ cur ] } ` ;
714
+ return acc ;
715
+ } , { } ) ;
716
+ }
717
+
693
718
module . exports = {
694
719
getRelatedAgents,
695
720
createErrorHandler,
@@ -718,6 +743,7 @@ module.exports = {
718
743
runUpgrade,
719
744
detectProxy,
720
745
serealizeToKeyValuePairs,
746
+ getRuntimeImagesWithRegistryUrl,
721
747
INSTALLATION_DEFAULTS ,
722
748
DefaultLogFormatter,
723
749
} ;
0 commit comments