|
| 1 | +# cf-vcluster |
| 2 | + |
| 3 | +   |
| 4 | + |
| 5 | +Umbrella chart over vCluster adjusted for Codefresh use cases - mainly in Crossplane compositions |
| 6 | + |
| 7 | +## Maintainers |
| 8 | + |
| 9 | +| Name | Email | Url | |
| 10 | +| ---- | ------ | --- | |
| 11 | +| codefresh | | <https://codefresh-io.github.io/> | |
| 12 | + |
| 13 | +## Requirements |
| 14 | + |
| 15 | +| Repository | Name | Version | |
| 16 | +|------------|------|---------| |
| 17 | +| | vcluster | 0.28.0 | |
| 18 | + |
| 19 | +## Values |
| 20 | + |
| 21 | +| Key | Type | Default | Description | |
| 22 | +|-----|------|---------|-------------| |
| 23 | +| global.ingress.internal.annotations."nginx.ingress.kubernetes.io/backend-protocol" | string | `"HTTPS"` | | |
| 24 | +| global.ingress.internal.annotations."nginx.ingress.kubernetes.io/ssl-passthrough" | string | `"true"` | | |
| 25 | +| global.ingress.internal.annotations."nginx.ingress.kubernetes.io/ssl-redirect" | string | `"true"` | | |
| 26 | +| global.ingress.internal.backendServiceOverride | object | `{}` | Possibility to override backend service name for ingress. If not set default vcluster backend service will be used | |
| 27 | +| global.ingress.internal.enabled | bool | `false` | | |
| 28 | +| global.ingress.internal.host.domain | string | `"corp.local"` | | |
| 29 | +| global.ingress.internal.host.name | string | `"{{ .Release.Name }}"` | | |
| 30 | +| global.ingress.internal.ingressClassName | string | `"nginx-internal"` | | |
| 31 | +| global.ingress.public.annotations."nginx.ingress.kubernetes.io/backend-protocol" | string | `"HTTPS"` | | |
| 32 | +| global.ingress.public.annotations."nginx.ingress.kubernetes.io/ssl-passthrough" | string | `"true"` | | |
| 33 | +| global.ingress.public.annotations."nginx.ingress.kubernetes.io/ssl-redirect" | string | `"true"` | | |
| 34 | +| global.ingress.public.backendServiceOverride | object | `{}` | Possibility to override backend service name for ingress. If not set default vcluster backend service will be used | |
| 35 | +| global.ingress.public.enabled | bool | `false` | | |
| 36 | +| global.ingress.public.host.domain | string | `"example.com"` | | |
| 37 | +| global.ingress.public.host.name | string | `"{{ .Release.Name }}"` | | |
| 38 | +| global.ingress.public.ingressClassName | string | `"nginx-public"` | | |
| 39 | +| vcluster.controlPlane.distro.k8s.apiServer.extraArgs[0] | string | `"--oidc-issuer-url=https://dexidp.shared-services.cf-infra.com"` | | |
| 40 | +| vcluster.controlPlane.distro.k8s.apiServer.extraArgs[1] | string | `"--oidc-client-id=vcluster-login"` | | |
| 41 | +| vcluster.controlPlane.distro.k8s.apiServer.extraArgs[2] | string | `"--oidc-username-claim=email"` | | |
| 42 | +| vcluster.controlPlane.distro.k8s.apiServer.extraArgs[3] | string | `"--oidc-groups-claim=groups"` | | |
| 43 | +| vcluster.controlPlane.distro.k8s.enabled | bool | `true` | | |
| 44 | +| vcluster.controlPlane.proxy.extraSANs[0] | string | `"{{ tpl (printf \"%s.%s.%s\" .Release.Name .Release.Namespace \".cluster.svc.local\") . }}"` | | |
| 45 | +| vcluster.controlPlane.proxy.extraSANs[1] | string | `"{{ tpl (printf \"%s.%s\" .Values.global.ingress.internal.host.name .Values.global.ingress.internal.host.domain) . }}"` | | |
| 46 | +| vcluster.controlPlane.proxy.extraSANs[2] | string | `"{{ tpl (printf \"%s.%s\" .Values.global.ingress.public.host.name .Values.global.ingress.public.host.domain) . }}"` | | |
| 47 | +| vcluster.experimental.deploy.vcluster.manifests | string | `"---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: oidc-cluster-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: cluster-admin\nsubjects:\n- kind: Group\n name: [email protected]\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: oidc-cluster-admin-octopus\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: cluster-admin\nsubjects:\n- kind: Group\n name: 787d1a9a-e488-4a77-bb6c-f4b2fdfd8cea # Codefresh R&D Team\n- kind: Group\n name: 607a9f67-422c-4ca2-b8c4-d0be213b9650 # Codefresh SA Team\n- kind: Group\n name: f8de82e2-cdb6-480a-8f37-9f958ea5fef5 # Codefresh Support Team\n- kind: Group\n name: 16b3fb37-58f2-4786-8ca8-6f58d0410687 # Codefresh OSS Team\n- kind: Group\n name: dc35779f-57d5-4dff-90c0-34c6e93fe7e7 # Codefresh OSS Team\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: codefresh-pipelines-integration-cluster-admin\n namespace: kube-system\n---\napiVersion: v1\nkind: Secret\nmetadata:\n name: codefresh-pipelines-integration-cluster-admin-token\n namespace: kube-system\n annotations:\n kubernetes.io/service-account.name: codefresh-pipelines-integration-cluster-admin\ntype: kubernetes.io/service-account-token\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: codefresh-pipelines-integration-cluster-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: cluster-admin\nsubjects:\n- kind: ServiceAccount\n name: codefresh-pipelines-integration-cluster-admin\n namespace: kube-system"` | | |
| 48 | +| vcluster.rbac.clusterRole.enabled | bool | `true` | | |
| 49 | +| vcluster.sync.fromHost.ingressClasses.enabled | bool | `true` | | |
| 50 | +| vcluster.sync.fromHost.nodes.enabled | bool | `true` | | |
| 51 | +| vcluster.sync.toHost.ingresses.enabled | bool | `true` | | |
| 52 | +| vcluster.sync.toHost.persistentVolumeClaims.enabled | bool | `true` | | |
| 53 | +| vcluster.sync.toHost.persistentVolumes.enabled | bool | `true` | | |
| 54 | +| vcluster.sync.toHost.serviceAccounts.enabled | bool | `true` | | |
| 55 | +| vcluster.sync.toHost.storageClasses.enabled | bool | `true` | | |
| 56 | + |
| 57 | +---------------------------------------------- |
| 58 | +Autogenerated from chart metadata using [helm-docs v1.9.1](https://github.com/norwoodj/helm-docs/releases/v1.9.1) |
0 commit comments