1
1
# builder
2
2
3
- ![ Version: 1.4 .0] ( https://img.shields.io/badge/Version-1.4 .0-informational?style=flat-square )
3
+ ![ Version: 2.0 .0] ( https://img.shields.io/badge/Version-2.0 .0-informational?style=flat-square )
4
4
5
5
Helm Chart for default system/root runtime Builder (onprem)
6
6
@@ -23,33 +23,28 @@ Helm Chart for default system/root runtime Builder (onprem)
23
23
| Key | Type | Default | Description |
24
24
| -----| ------| ---------| -------------|
25
25
| affinity | object | ` {} ` | |
26
- | cleaner.image.pullPolicy | string | ` "IfNotPresent" ` | |
27
- | cleaner.image.registry | string | ` "quay.io" ` | |
28
- | cleaner.image.repository | string | ` "codefresh/docker-cleaner" ` | |
29
- | cleaner.image.tag | string | ` "24.0" ` | |
30
26
| configMaps.config.data."daemon.json" | string | `"{\n \" hosts\" : [ \" unix:///var/run/docker.sock\" ,\n \" tcp://0.0.0.0:{{ .Values.service.main.ports.dind.port }}\" ] ,\n \" storage-driver\" : \" overlay2\" ,\n \" tlsverify\" : true,\n \" tls\" : true,\n \" tlscacert\" : \" /etc/ssl/cf/ca.pem\" ,\n \" tlscert\" : \" /etc/ssl/cf/cert.pem\" ,\n \" tlskey\" : \" /etc/ssl/cf/key.pem\" ,\n \" insecure-registries\" : [ {{- range $i, $e := .Values.insecureRegistries }} {{- if $i }},{{ end }} {{ $e | quote }} {{- end }} ] \n}\n"` | |
31
- | configMaps.config.data.docker-cleaner | string | `"#!/bin/sh\necho \" $0 - $(date)\" | tee -a /var/log/cleaner.log\nCLEANER_IMAGE={{ include (printf \" cf-common-%s.image.name\" (index .Subcharts \" cf-common\" ).Chart.Version ) (dict \" image\" .Values.cleaner.image \" context\" .) }}\ndocker pull $CLEANER_IMAGE\ndocker run --rm --name rt-cleaner -v /var/run/docker.sock:/var/run/docker.sock: rw --label io.codefresh.owner=codefresh -e GRACE_PERIOD_SECONDS=86400 --cpu-shares=10 $CLEANER_IMAGE ./docker-gc >> /var/log/cleaner.log 2>&1\n"` | |
32
27
| configMaps.config.data.register | string | `"#!/bin/sh\nset -e\nNODE_NAME=\"$1\"\nSUBDOMAIN=\"$2\"\nNODE_ADDRESS=\"$1.$2\"\nCONSUL={{ include (printf \"cf-common-%s.classic.calculateConsulUri\" (index .Subcharts \"cf-common\").Chart.Version ) . }}\nACCOUNT=codefresh\nROLE=builder\nPROVIDER='\n{\n \"name\": \"kube-nodes\",\n \"type\": \"internal\"\n}'\nSYSTEM_DATA='{\"os_name\": \"dind\"}'\nNODE_SERVICE='\n{\n \"Node\": \"'${NODE_NAME}'\",\n \"Address\": \"'${NODE_ADDRESS}'\",\n \"Service\": {\n \"Service\": \"docker-node\",\n \"Tags\": [\n \"dind\",\n \"noagent\",\n \"account_codefresh\",\n \"type_builder\"\n ],\n \"Address\": \"'${NODE_ADDRESS}'\",\n \"Port\": {{ .Values.service.main.ports.dind.port }}\n },\n \"Check\": {\n \"Node\": \"\",\n \"CheckID\": \"service:docker-node\",\n \"Name\": \"Remote Node Check\",\n \"Notes\": \"Check builder is up and running\",\n \"Output\": \"Builder alive and reachable\",\n \"Status\": \"passing\",\n \"ServiceID\": \"docker-node\"\n }\n}'\necho \"Registering dind node ($NODE_NAME) in consul. Configuration: ${NODE_SERVICE}\"\ncurl -X PUT -d \"${NODE_SERVICE}\" ${CONSUL}/v1/catalog/register\ncurl -X PUT -d \"${NODE_ADDRESS}\" ${CONSUL}/v1/kv/services/docker-node/${NODE_NAME}/publicAddress\ncurl -X PUT -d \"${ACCOUNT}\" ${CONSUL}/v1/kv/services/docker-node/${NODE_NAME}/account\ncurl -X PUT -d \"${ROLE}\" ${CONSUL}/v1/kv/services/docker-node/${NODE_NAME}/role\ncurl -X PUT -d \"${PROVIDER}\" ${CONSUL}/v1/kv/services/docker-node/${NODE_NAME}/systemData\ncurl -X PUT -d \"${SYSTEM_DATA}\" ${CONSUL}/v1/kv/services/docker-node/${NODE_NAME}/provider\n"` | |
33
28
| configMaps.config.enabled | bool | ` true ` | |
34
29
| container.command[ 0] | string | ` "/bin/sh" ` | |
35
30
| container.command[ 1] | string | ` "-c" ` | |
36
- | container.command[ 2] | string | ` "rm -fv /var/run/docker.pid\nmkdir -p /var/ run/codefresh\n# Adding cleaner\ncp -L /opt/dind/docker-cleaner .sh /usr/local/bin/ && chmod +x /usr/local/bin/docker-cleaner.sh\nif [[ -n \"${DOCKER_CLEANER_CRON}\" ]]; then\n echo \"Set /etc/crontabs/root - ${DOCKER_CLEANER_CRON} /usr/local/bin/docker-cleaner.sh\"\n echo \"${DOCKER_CLEANER_CRON} /usr/local/bin/docker-cleaner.sh \" >> /etc/crontabs/root\n crond\nfi\ndockerd \n" ` | |
31
+ | container.command[ 2] | string | ` "./ run.sh\n" ` | |
37
32
| container.containerSecurityContext.privileged | bool | ` true ` | |
38
- | container.env.DOCKER_CLEANER_CRON | string | ` "0 0 * * * " ` | |
33
+ | container.env.CLEAN_DOCKER | string | ` "true " ` | |
39
34
| container.image.pullPolicy | string | ` "IfNotPresent" ` | |
40
- | container.image.registry | string | ` "docker .io" ` | |
41
- | container.image.repository | string | ` "docker " ` | |
42
- | container.image.tag | string | ` "24.0-dind " ` | |
35
+ | container.image.registry | string | ` "quay .io" ` | |
36
+ | container.image.repository | string | ` "codefresh/dind " ` | |
37
+ | container.image.tag | string | ` "26.1.4-1.28.8 " ` | |
43
38
| container.resources.limits | object | ` {} ` | |
44
39
| container.resources.requests | object | ` {} ` | |
45
40
| container.volumeMounts.cf-certs.path[ 0] .mountPath | string | ` "/etc/ssl/cf" ` | |
46
41
| container.volumeMounts.cf-certs.path[ 0] .readOnly | bool | ` true ` | |
47
42
| container.volumeMounts.config.path[ 0] .mountPath | string | ` "/etc/docker/daemon.json" ` | |
48
43
| container.volumeMounts.config.path[ 0] .readOnly | bool | ` true ` | |
49
44
| container.volumeMounts.config.path[ 0] .subPath | string | ` "daemon.json" ` | |
50
- | container.volumeMounts.config.path [ 1 ] .mountPath | string | ` "/opt/dind/docker-cleaner.sh" ` | |
51
- | container.volumeMounts.config.path [ 1 ] .subPath | string | ` "docker-cleaner" ` | |
52
- | controller | object | ` {"enabled":true,"replicas":1,"type":" statefulset"} ` | --------------------------------------------------------------------------------------------------------------------- |
45
+ | controller.enabled | bool | ` true ` | |
46
+ | controller.replicas | int | ` 1 ` | |
47
+ | controller.type | string | ` " statefulset"` | |
53
48
| global.consulHost | string | ` "" ` | |
54
49
| global.consulHttpPort | int | ` 8500 ` | |
55
50
| global.consulService | string | ` "consul-headless" ` | |
@@ -68,7 +63,7 @@ Helm Chart for default system/root runtime Builder (onprem)
68
63
| initContainers.register.image.tag | string | ` "8.4.0" ` | |
69
64
| initContainers.register.volumeMounts.config.path[ 0] .mountPath | string | ` "/opt/dind/register" ` | |
70
65
| initContainers.register.volumeMounts.config.path[ 0] .subPath | string | ` "register" ` | |
71
- | insecureRegistries | list | ` [] ` | --------------------------------------------------------------------------------------------------------------------- Backward compatibility with values/templates in cf-helm |
66
+ | insecureRegistries | list | ` [] ` | |
72
67
| nodeSelector | object | ` {} ` | |
73
68
| pdb | object | ` {} ` | |
74
69
| podAnnotations.checksum/config | string | `"{{ include (print .Template.BasePath \" /configmap.yaml\" ) . | sha256sum }}"` | |
@@ -83,6 +78,7 @@ Helm Chart for default system/root runtime Builder (onprem)
83
78
| tolerations | list | ` [] ` | |
84
79
| topologySpreadConstraints | list | ` [] ` | |
85
80
| varLibDockerVolume.accessMode | string | ` nil ` | |
81
+ | varLibDockerVolume.storageClass | string | ` nil ` | |
86
82
| varLibDockerVolume.storageSize | string | ` nil ` | |
87
83
| volumeClaimTemplates.varlibdocker.accessMode | string | ` "ReadWriteOnce" ` | |
88
84
| volumeClaimTemplates.varlibdocker.mountPath | string | ` "/var/lib/docker" ` | |
0 commit comments