@@ -2,11 +2,14 @@ global:
2
2
ingress :
3
3
internal :
4
4
enabled : false
5
- annotations : {}
5
+ annotations :
6
+ nginx.ingress.kubernetes.io/backend-protocol : HTTPS
7
+ nginx.ingress.kubernetes.io/ssl-passthrough : " true"
8
+ nginx.ingress.kubernetes.io/ssl-redirect : " true"
6
9
ingressClassName : " nginx-internal"
7
10
# -- Possibility to override backend service name for ingress. If not set default vcluster backend service will be used
8
- backendService : {}
9
- # backendService :
11
+ backendServiceOverride : {}
12
+ # backendServiceOverride :
10
13
# name: "interceptor-service"
11
14
# port: 80
12
15
host :
@@ -16,11 +19,14 @@ global:
16
19
enabled : false
17
20
ingressClassName : " nginx-public"
18
21
# -- Possibility to override backend service name for ingress. If not set default vcluster backend service will be used
19
- backendService : {}
20
- # backendService :
22
+ backendServiceOverride : {}
23
+ # backendServiceOverride :
21
24
# name: "interceptor-service"
22
25
# port: 80
23
- annotations : {}
26
+ annotations :
27
+ nginx.ingress.kubernetes.io/backend-protocol : HTTPS
28
+ nginx.ingress.kubernetes.io/ssl-passthrough : " true"
29
+ nginx.ingress.kubernetes.io/ssl-redirect : " true"
24
30
host :
25
31
name : " {{ .Release.Name }}"
26
32
domain : example.com
@@ -32,7 +38,6 @@ vcluster:
32
38
- " {{ tpl (printf \" %s.%s.%s\" .Release.Name .Release.Namespace \" .cluster.svc.local\" ) . }}"
33
39
- " {{ tpl (printf \" %s.%s\" .Values.global.ingress.internal.host.name .Values.global.ingress.internal.host.domain) . }}"
34
40
- " {{ tpl (printf \" %s.%s\" .Values.global.ingress.public.host.name .Values.global.ingress.public.host.domain) . }}"
35
-
36
41
distro :
37
42
k8s :
38
43
enabled : true
@@ -42,3 +47,87 @@ vcluster:
42
47
- --oidc-client-id=vcluster-login
43
48
- --oidc-username-claim=email
44
49
- --oidc-groups-claim=groups
50
+ sync :
51
+ toHost :
52
+ ingresses :
53
+ enabled : true
54
+ serviceAccounts :
55
+ enabled : true
56
+ storageClasses :
57
+ enabled : true
58
+ persistentVolumeClaims :
59
+ enabled : true
60
+ persistentVolumes :
61
+ enabled : true
62
+ fromHost :
63
+ ingressClasses :
64
+ enabled : true
65
+ nodes :
66
+ enabled : true
67
+ experimental :
68
+ deploy :
69
+ vcluster :
70
+ manifests : |-
71
+ ---
72
+ kind: ClusterRoleBinding
73
+ apiVersion: rbac.authorization.k8s.io/v1
74
+ metadata:
75
+ name: oidc-cluster-admin
76
+ roleRef:
77
+ apiGroup: rbac.authorization.k8s.io
78
+ kind: ClusterRole
79
+ name: cluster-admin
80
+ subjects:
81
+ - kind: Group
82
+
83
+ ---
84
+ kind: ClusterRoleBinding
85
+ apiVersion: rbac.authorization.k8s.io/v1
86
+ metadata:
87
+ name: oidc-cluster-admin-octopus
88
+ roleRef:
89
+ apiGroup: rbac.authorization.k8s.io
90
+ kind: ClusterRole
91
+ name: cluster-admin
92
+ subjects:
93
+ - kind: Group
94
+ name: 787d1a9a-e488-4a77-bb6c-f4b2fdfd8cea # Codefresh R&D Team
95
+ - kind: Group
96
+ name: 607a9f67-422c-4ca2-b8c4-d0be213b9650 # Codefresh SA Team
97
+ - kind: Group
98
+ name: f8de82e2-cdb6-480a-8f37-9f958ea5fef5 # Codefresh Support Team
99
+ - kind: Group
100
+ name: 16b3fb37-58f2-4786-8ca8-6f58d0410687 # Codefresh OSS Team
101
+ - kind: Group
102
+ name: dc35779f-57d5-4dff-90c0-34c6e93fe7e7 # Codefresh OSS Team
103
+ ---
104
+ apiVersion: v1
105
+ kind: ServiceAccount
106
+ metadata:
107
+ name: codefresh-pipelines-integration-cluster-admin
108
+ namespace: kube-system
109
+ ---
110
+ apiVersion: v1
111
+ kind: Secret
112
+ metadata:
113
+ name: codefresh-pipelines-integration-cluster-admin-token
114
+ namespace: kube-system
115
+ annotations:
116
+ kubernetes.io/service-account.name: codefresh-pipelines-integration-cluster-admin
117
+ type: kubernetes.io/service-account-token
118
+ ---
119
+ kind: ClusterRoleBinding
120
+ apiVersion: rbac.authorization.k8s.io/v1
121
+ metadata:
122
+ name: codefresh-pipelines-integration-cluster-admin
123
+ roleRef:
124
+ apiGroup: rbac.authorization.k8s.io
125
+ kind: ClusterRole
126
+ name: cluster-admin
127
+ subjects:
128
+ - kind: ServiceAccount
129
+ name: codefresh-pipelines-integration-cluster-admin
130
+ namespace: kube-system
131
+ rbac :
132
+ clusterRole :
133
+ enabled : true
0 commit comments