|
| 1 | +# builder |
| 2 | + |
| 3 | + |
| 4 | + |
| 5 | +Helm Chart for default system/root runtime Builder (onprem) |
| 6 | + |
| 7 | +**Homepage:** <https://codefresh.io/> |
| 8 | + |
| 9 | +## Maintainers |
| 10 | + |
| 11 | +| Name | Email | Url | |
| 12 | +| ---- | ------ | --- | |
| 13 | +| codefresh | | <https://codefresh-io.github.io/> | |
| 14 | + |
| 15 | +## Requirements |
| 16 | + |
| 17 | +| Repository | Name | Version | |
| 18 | +|------------|------|---------| |
| 19 | +| oci://quay.io/codefresh/charts | cf-common | 0.16.0 | |
| 20 | + |
| 21 | +## Values |
| 22 | + |
| 23 | +| Key | Type | Default | Description | |
| 24 | +|-----|------|---------|-------------| |
| 25 | +| affinity | object | `{}` | | |
| 26 | +| cleaner.image.pullPolicy | string | `"IfNotPresent"` | | |
| 27 | +| cleaner.image.registry | string | `"quay.io"` | | |
| 28 | +| cleaner.image.repository | string | `"codefresh/docker-cleaner"` | | |
| 29 | +| cleaner.image.tag | string | `"24.0"` | | |
| 30 | +| configMaps.config.data."daemon.json" | string | `"{\n \"hosts\": [ \"unix:///var/run/docker.sock\",\n \"tcp://0.0.0.0:{{ .Values.service.main.ports.dind.port }}\"],\n \"storage-driver\": \"overlay2\",\n \"tlsverify\": true,\n \"tls\": true,\n \"tlscacert\": \"/etc/ssl/cf/ca.pem\",\n \"tlscert\": \"/etc/ssl/cf/cert.pem\",\n \"tlskey\": \"/etc/ssl/cf/key.pem\",\n \"insecure-registries\" : [ {{- range $i, $e := .Values.insecureRegistries }} {{- if $i }},{{ end }} {{ $e | quote }} {{- end }} ]\n}\n"` | | |
| 31 | +| configMaps.config.data.docker-cleaner | string | `"#!/bin/sh\necho \"$0 - $(date)\" | tee -a /var/log/cleaner.log\nCLEANER_IMAGE={{ include (printf \"cf-common-%s.image.name\" (index .Subcharts \"cf-common\").Chart.Version ) (dict \"image\" .Values.cleaner.image \"context\" .) }}\ndocker pull $CLEANER_IMAGE\ndocker run --rm --name rt-cleaner -v /var/run/docker.sock:/var/run/docker.sock:rw --label io.codefresh.owner=codefresh -e GRACE_PERIOD_SECONDS=86400 --cpu-shares=10 $CLEANER_IMAGE ./docker-gc >> /var/log/cleaner.log 2>&1\n"` | | |
| 32 | +| configMaps.config.data.register | string | `"#!/bin/sh\nset -e\nNODE_NAME=\"$1\"\nSUBDOMAIN=\"$2\"\nNODE_ADDRESS=\"$1.$2\"\nCONSUL={{ include (printf \"cf-common-%s.classic.calculateConsulUri\" (index .Subcharts \"cf-common\").Chart.Version ) . }}\nACCOUNT=codefresh\nROLE=builder\nPROVIDER='\n{\n \"name\": \"kube-nodes\",\n \"type\": \"internal\"\n}'\nSYSTEM_DATA='{\"os_name\": \"dind\"}'\nNODE_SERVICE='\n{\n \"Node\": \"'${NODE_NAME}'\",\n \"Address\": \"'${NODE_ADDRESS}'\",\n \"Service\": {\n \"Service\": \"docker-node\",\n \"Tags\": [\n \"dind\",\n \"noagent\",\n \"account_codefresh\",\n \"type_builder\"\n ],\n \"Address\": \"'${NODE_ADDRESS}'\",\n \"Port\": {{ .Values.service.main.ports.dind.port }}\n },\n \"Check\": {\n \"Node\": \"\",\n \"CheckID\": \"service:docker-node\",\n \"Name\": \"Remote Node Check\",\n \"Notes\": \"Check builder is up and running\",\n \"Output\": \"Builder alive and reachable\",\n \"Status\": \"passing\",\n \"ServiceID\": \"docker-node\"\n }\n}'\necho \"Registering dind node ($NODE_NAME) in consul. Configuration: ${NODE_SERVICE}\"\ncurl -X PUT -d \"${NODE_SERVICE}\" ${CONSUL}/v1/catalog/register\ncurl -X PUT -d \"${NODE_ADDRESS}\" ${CONSUL}/v1/kv/services/docker-node/${NODE_NAME}/publicAddress\ncurl -X PUT -d \"${ACCOUNT}\" ${CONSUL}/v1/kv/services/docker-node/${NODE_NAME}/account\ncurl -X PUT -d \"${ROLE}\" ${CONSUL}/v1/kv/services/docker-node/${NODE_NAME}/role\ncurl -X PUT -d \"${PROVIDER}\" ${CONSUL}/v1/kv/services/docker-node/${NODE_NAME}/systemData\ncurl -X PUT -d \"${SYSTEM_DATA}\" ${CONSUL}/v1/kv/services/docker-node/${NODE_NAME}/provider\n"` | | |
| 33 | +| configMaps.config.enabled | bool | `true` | | |
| 34 | +| container.command[0] | string | `"/bin/sh"` | | |
| 35 | +| container.command[1] | string | `"-c"` | | |
| 36 | +| container.command[2] | string | `"rm -fv /var/run/docker.pid\nmkdir -p /var/run/codefresh\n# Adding cleaner\ncp -L /opt/dind/docker-cleaner.sh /usr/local/bin/ && chmod +x /usr/local/bin/docker-cleaner.sh\nif [[ -n \"${DOCKER_CLEANER_CRON}\" ]]; then\n echo \"Set /etc/crontabs/root - ${DOCKER_CLEANER_CRON} /usr/local/bin/docker-cleaner.sh\"\n echo \"${DOCKER_CLEANER_CRON} /usr/local/bin/docker-cleaner.sh \" >> /etc/crontabs/root\n crond\nfi\ndockerd\n"` | | |
| 37 | +| container.containerSecurityContext.privileged | bool | `true` | | |
| 38 | +| container.env.DOCKER_CLEANER_CRON | string | `"0 0 * * *"` | | |
| 39 | +| container.image.pullPolicy | string | `"IfNotPresent"` | | |
| 40 | +| container.image.registry | string | `"docker.io"` | | |
| 41 | +| container.image.repository | string | `"docker"` | | |
| 42 | +| container.image.tag | string | `"24.0-dind"` | | |
| 43 | +| container.resources.limits | object | `{}` | | |
| 44 | +| container.resources.requests | object | `{}` | | |
| 45 | +| container.volumeMounts.cf-certs.path[0].mountPath | string | `"/etc/ssl/cf"` | | |
| 46 | +| container.volumeMounts.cf-certs.path[0].readOnly | bool | `true` | | |
| 47 | +| container.volumeMounts.config.path[0].mountPath | string | `"/etc/docker/daemon.json"` | | |
| 48 | +| container.volumeMounts.config.path[0].readOnly | bool | `true` | | |
| 49 | +| container.volumeMounts.config.path[0].subPath | string | `"daemon.json"` | | |
| 50 | +| container.volumeMounts.config.path[1].mountPath | string | `"/opt/dind/docker-cleaner.sh"` | | |
| 51 | +| container.volumeMounts.config.path[1].subPath | string | `"docker-cleaner"` | | |
| 52 | +| controller | object | `{"enabled":true,"replicas":1,"type":"statefulset"}` | --------------------------------------------------------------------------------------------------------------------- | |
| 53 | +| global.consulHost | string | `""` | | |
| 54 | +| global.consulHttpPort | int | `8500` | | |
| 55 | +| global.consulService | string | `"consul-headless"` | | |
| 56 | +| global.imageRegistry | string | `""` | | |
| 57 | +| hpa | object | `{}` | | |
| 58 | +| imagePullSecrets[0] | string | `"{{ .Release.Name }}-{{ .Values.global.codefresh }}-registry"` | | |
| 59 | +| initContainers.register.command[0] | string | `"/bin/sh"` | | |
| 60 | +| initContainers.register.command[1] | string | `"-c"` | | |
| 61 | +| initContainers.register.command[2] | string | `"cp -L /opt/dind/register /usr/local/bin/\nchmod +x /usr/local/bin/register\n/usr/local/bin/register ${POD_NAME} {{ template \"builder.fullname\" . }}.{{ .Release.Namespace}}.svc\n"` | | |
| 62 | +| initContainers.register.enabled | bool | `true` | | |
| 63 | +| initContainers.register.env.POD_NAME.valueFrom.fieldRef.apiVersion | string | `"v1"` | | |
| 64 | +| initContainers.register.env.POD_NAME.valueFrom.fieldRef.fieldPath | string | `"metadata.name"` | | |
| 65 | +| initContainers.register.image.pullPolicy | string | `"IfNotPresent"` | | |
| 66 | +| initContainers.register.image.registry | string | `"quay.io"` | | |
| 67 | +| initContainers.register.image.repository | string | `"codefresh/curl"` | | |
| 68 | +| initContainers.register.image.tag | string | `"8.4.0"` | | |
| 69 | +| initContainers.register.volumeMounts.config.path[0].mountPath | string | `"/opt/dind/register"` | | |
| 70 | +| initContainers.register.volumeMounts.config.path[0].subPath | string | `"register"` | | |
| 71 | +| insecureRegistries | list | `[]` | --------------------------------------------------------------------------------------------------------------------- Backward compatibility with values/templates in cf-helm | |
| 72 | +| nodeSelector | object | `{}` | | |
| 73 | +| pdb | object | `{}` | | |
| 74 | +| podAnnotations.checksum/config | string | `"{{ include (print .Template.BasePath \"/configmap.yaml\") . | sha256sum }}"` | | |
| 75 | +| podSecurityContext | object | `{}` | | |
| 76 | +| rbac.enabled | bool | `false` | | |
| 77 | +| service.main.clusterIP | string | `"None"` | | |
| 78 | +| service.main.enabled | bool | `true` | | |
| 79 | +| service.main.ports.dind.port | int | `1300` | | |
| 80 | +| service.main.ports.dind.protocol | string | `"TCP"` | | |
| 81 | +| service.main.type | string | `"ClusterIP"` | | |
| 82 | +| serviceAccount.enabled | bool | `false` | | |
| 83 | +| tolerations | list | `[]` | | |
| 84 | +| topologySpreadConstraints | list | `[]` | | |
| 85 | +| varLibDockerVolume.accessMode | string | `nil` | | |
| 86 | +| varLibDockerVolume.storageSize | string | `nil` | | |
| 87 | +| volumeClaimTemplates.varlibdocker.accessMode | string | `"ReadWriteOnce"` | | |
| 88 | +| volumeClaimTemplates.varlibdocker.mountPath | string | `"/var/lib/docker"` | | |
| 89 | +| volumeClaimTemplates.varlibdocker.size | string | `"100Gi"` | | |
| 90 | +| volumeClaimTemplates.varlibdocker.storageClass | string | `nil` | | |
| 91 | +| volumes.cf-certs.enabled | bool | `true` | | |
| 92 | +| volumes.cf-certs.nameOverride | string | `"{{ .Release.Name }}-{{ .Values.global.codefresh }}-certs-client"` | | |
| 93 | +| volumes.cf-certs.type | string | `"secret"` | | |
| 94 | +| volumes.config.enabled | bool | `true` | | |
| 95 | +| volumes.config.type | string | `"configMap"` | | |
| 96 | +| volumes.varlibdocker.enabled | bool | `false` | | |
| 97 | +| volumes.varlibdocker.nameOverride | string | `nil` | | |
| 98 | +| volumes.varlibdocker.type | string | `"pvc"` | | |
| 99 | + |
| 100 | +---------------------------------------------- |
| 101 | +Autogenerated from chart metadata using [helm-docs v1.9.1](https://github.com/norwoodj/helm-docs/releases/v1.9.1) |
0 commit comments