Skip to content
Open
36 changes: 5 additions & 31 deletions charts/gitops-runtime/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,41 +13,15 @@ maintainers:
url: https://codefresh-io.github.io/
annotations:
artifacthub.io/alternativeName: "codefresh-gitops-runtime"
artifacthub.io/changes: |
- kind: added
description: 'Multi-runtime installation support (#939, #946)'
- kind: added
description: 'Checksum annotations for improved change detection (#942)'
- kind: added
description: 'Namespace-scoped Argo Workflows support (#917)'
- kind: added
description: 'Telemetry configuration support (#848)'
artifacthub.io/changes: |-
- kind: changed
description: 'Migrated to OSS Argo CD and Argo Helm charts (#823)'
description: 'updated gitops-operator with security fixes: CVE-2025-5187'
- kind: changed
description: 'Moved Argo CD auth values to global.integrations.argo-cd.server.auth (#768)'
description: 'updated Argo Rollouts to v1.7.2 with security fixes: CVE-2025-5187'
- kind: changed
description: 'Refactored event-reporters: replaced argo-events runtime and cluster event-reporters, renamed sources-server to argo-gateway (#744)'
description: 'updated cli-v2 to v0.2.14 in runtime-installer with fixes: CVE-2024-25621'
- kind: changed
description: 'Updated app-proxy with improvements: default-git-source initialization, autoDetectArgoCd values structure update, branch data in pull request info, git-source permissions for fine-grained tokens, and git process management fixes (#956, #943, #932, #737, #902, #901, #878, #804, #802, #795, #760)'
- kind: changed
description: 'Updated cf-argocd-extras: fixed resource attribute keys, unified event reporter values, removed sharding logic (#930, #845, #819)'
- kind: changed
description: 'Updated Argo CD version constraint for compatibility (#941)'
- kind: changed
description: 'Updated installer with latest CLI v2 and kubectl versions (#849, #697)'
- kind: changed
description: 'Disabled Argo Rollouts by default (#917)'
- kind: security
description: 'Fixed security vulnerabilities in app-proxy, cf-argocd-extras, argo-rollouts, argo-events, argo-workflows, and enrichment images (#702, #725, #730, #716, #788)'
- kind: changed
description: 'Updated Argo Rollouts chart to 2.37.3-7-v1.7.2-cap-OSS-697 (#730)'
- kind: changed
description: 'Updated Argo Events chart to 2.4.9-cap-CR-30841 (#716)'
- kind: changed
description: 'Updated Argo Workflows chart to 0.45.16-v3.6.7-cap-CR-30835 (#716)'
- kind: changed
description: 'Updated codefresh-tunnel-client chart to 0.1.22 (#693)'
description: 'updated cap-app-proxy with security fixes'
dependencies:
- name: argo-cd
repository: https://argoproj.github.io/argo-helm
Expand Down
14 changes: 7 additions & 7 deletions charts/gitops-runtime/README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
## Codefresh gitops runtime
![Version: 0.26.0](https://img.shields.io/badge/Version-0.26.0-informational?style=flat-square) ![AppVersion: 0.2.0](https://img.shields.io/badge/AppVersion-0.2.0-informational?style=flat-square)
![Version: 0.26.1](https://img.shields.io/badge/Version-0.26.1-informational?style=flat-square) ![AppVersion: 0.2.0](https://img.shields.io/badge/AppVersion-0.2.0-informational?style=flat-square)

## Table of Content

Expand Down Expand Up @@ -222,7 +222,7 @@ We have created a helper utility to resolve this issue:
The utility is packaged in a container image. Below are instructions on executing the utility using Docker:

```
docker run -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.26.0 <local_registry>
docker run -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.26.1 <local_registry>
```
`output_dir` - is a local directory where the utility will output files. <br>
`local_registry` - is your local registry where you want to mirror the images to
Expand All @@ -235,7 +235,7 @@ The utility will output 4 files into the folder:

For usage with external ArgoCD run the utility with `EXTERNAL_ARGOCD` environment variable set to `true`.
```
docker run -e EXTERNAL_ARGOCD=true -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.26.0 <local_registry>
docker run -e EXTERNAL_ARGOCD=true -v <output_dir>:/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.26.1 <local_registry>
```

## Openshift
Expand Down Expand Up @@ -546,14 +546,14 @@ global:
| app-proxy.image-enrichment.serviceAccount.name | string | `"codefresh-image-enrichment-sa"` | Name of the service account to create or the name of the existing one to use |
| app-proxy.image.pullPolicy | string | `"IfNotPresent"` | |
| app-proxy.image.repository | string | `"quay.io/codefresh/cap-app-proxy"` | |
| app-proxy.image.tag | string | `"28608a6"` | |
| app-proxy.image.tag | string | `"ada904f"` | |
| app-proxy.imagePullSecrets | list | `[]` | |
| app-proxy.initContainer.command[0] | string | `"./init.sh"` | |
| app-proxy.initContainer.env | object | `{}` | |
| app-proxy.initContainer.extraVolumeMounts | list | `[]` | Extra volume mounts for init container |
| app-proxy.initContainer.image.pullPolicy | string | `"IfNotPresent"` | |
| app-proxy.initContainer.image.repository | string | `"quay.io/codefresh/cap-app-proxy-init"` | |
| app-proxy.initContainer.image.tag | string | `"28608a6"` | |
| app-proxy.initContainer.image.tag | string | `"ada904f"` | |
| app-proxy.initContainer.resources.limits | object | `{}` | |
| app-proxy.initContainer.resources.requests.cpu | string | `"0.2"` | |
| app-proxy.initContainer.resources.requests.memory | string | `"256Mi"` | |
Expand Down Expand Up @@ -700,7 +700,7 @@ global:
| gitops-operator.env.<<[0].OTEL_TRACES_SAMPLER | string | `"parentbased_always_on"` | OTel sampler to be used for traces. Ref: https://opentelemetry.io/docs/specs/otel/configuration/sdk-environment-variables/ |
| gitops-operator.env.GITOPS_OPERATOR_VERSION | string | `"0.11.1"` | |
| gitops-operator.fullnameOverride | string | `""` | |
| gitops-operator.image | object | `{"registry":"quay.io","repository":"codefresh/codefresh-gitops-operator","tag":"8cbca33"}` | GitOps operator image |
| gitops-operator.image | object | `{"registry":"quay.io","repository":"codefresh/codefresh-gitops-operator","tag":"0.26-de28d8b"}` | GitOps operator image |
| gitops-operator.imagePullSecrets | list | `[]` | |
| gitops-operator.nameOverride | string | `""` | |
| gitops-operator.nodeSelector | object | `{}` | |
Expand Down Expand Up @@ -831,7 +831,7 @@ global:
| redis-ha.redis.config.save | string | `'""'` | Will save the DB if both the given number of seconds and the given number of write operations against the DB occurred. `""` is disabled |
| redis-ha.redis.masterGroupName | string | `"gitops-runtime"` | Redis convention for naming the cluster group: must match `^[\\w-\\.]+$` and can be templated |
| redis-ha.tolerations | list | `[]` | [Tolerations] for use with node taints for Redis pods. |
| redis-ha.topologySpreadConstraints | object | `{"enabled":false,"maxSkew":"","topologyKey":"","whenUnsatisfiable":""}` | Assign custom [TopologySpreadConstraints] rules to the Redis pods. # https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/ |
| redis-ha.topologySpreadConstraints | object | `{"enabled":false,"maxSkew":"","topologyKey":"","whenUnsatisfiable":""}` | Assign custom [TopologySpreadConstraints] rules to the Redis pods. |
| redis-ha.topologySpreadConstraints.enabled | bool | `false` | Enable Redis HA topology spread constraints |
| redis-ha.topologySpreadConstraints.maxSkew | string | `""` (defaults to `1`) | Max skew of pods tolerated |
| redis-ha.topologySpreadConstraints.topologyKey | string | `""` (defaults to `topology.kubernetes.io/zone`) | Topology key for spread |
Expand Down