ci(bump): bump secretOperator image version for prod to snapshot-941145e
This commit is contained in:
parent
36a33dfe13
commit
153763d680
@ -1,27 +1,20 @@
|
|||||||
# Default values for freeleaps-secret-operator
|
|
||||||
replicaCount: 1
|
replicaCount: 1
|
||||||
|
|
||||||
secretOperator:
|
secretOperator:
|
||||||
image:
|
image:
|
||||||
registry: docker.io
|
registry: docker.io
|
||||||
repository: freeleaps/secret-operator
|
repository: null
|
||||||
pullPolicy: IfNotPresent
|
pullPolicy: IfNotPresent
|
||||||
tag: "snapshot-36e5cf0"
|
tag: snapshot-941145e
|
||||||
name: "secret-operator"
|
name: secret-operator
|
||||||
|
|
||||||
imagePullSecrets: []
|
imagePullSecrets: []
|
||||||
nameOverride: ""
|
nameOverride: ''
|
||||||
fullnameOverride: ""
|
fullnameOverride: ''
|
||||||
|
|
||||||
serviceAccount:
|
serviceAccount:
|
||||||
create: true
|
create: true
|
||||||
annotations: {}
|
annotations: {}
|
||||||
name: "freeleaps-secret-operator"
|
name: freeleaps-secret-operator
|
||||||
|
|
||||||
podAnnotations: {}
|
podAnnotations: {}
|
||||||
|
|
||||||
podSecurityContext: {}
|
podSecurityContext: {}
|
||||||
|
|
||||||
securityContext:
|
securityContext:
|
||||||
allowPrivilegeEscalation: false
|
allowPrivilegeEscalation: false
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
@ -29,8 +22,7 @@ securityContext:
|
|||||||
runAsUser: 1000
|
runAsUser: 1000
|
||||||
capabilities:
|
capabilities:
|
||||||
drop:
|
drop:
|
||||||
- ALL
|
- ALL
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
cpu: 500m
|
cpu: 500m
|
||||||
@ -38,72 +30,43 @@ resources:
|
|||||||
requests:
|
requests:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
memory: 128Mi
|
memory: 128Mi
|
||||||
|
|
||||||
nodeSelector: {}
|
nodeSelector: {}
|
||||||
|
|
||||||
tolerations: []
|
tolerations: []
|
||||||
|
|
||||||
affinity: {}
|
affinity: {}
|
||||||
|
|
||||||
# Operator specific configuration
|
|
||||||
operator:
|
operator:
|
||||||
# General Configuration
|
|
||||||
debug: false
|
debug: false
|
||||||
apiServerPort: 8080
|
apiServerPort: 8080
|
||||||
watchedNamespaces: "" # Empty means watch all namespaces
|
watchedNamespaces: ''
|
||||||
k8sClusterDomain: "kubernetes.default.svc.freeleaps.cluster"
|
k8sClusterDomain: kubernetes.default.svc.freeleaps.cluster
|
||||||
autoDiscoverK8sClusterDomainMaxRetries: 5
|
autoDiscoverK8sClusterDomainMaxRetries: 5
|
||||||
|
kopfPeeringName: freeleaps-secret-operator
|
||||||
# Kopf Configuration
|
|
||||||
kopfPeeringName: "freeleaps-secret-operator"
|
|
||||||
leaderElection:
|
leaderElection:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
namespace: freeleaps-devops-system
|
||||||
# Namespace where the operator will be deployed
|
|
||||||
namespace: "freeleaps-devops-system"
|
|
||||||
|
|
||||||
# Azure Key Vault Configuration
|
|
||||||
# These values should be provided through a secret
|
|
||||||
azureKeyVault:
|
azureKeyVault:
|
||||||
# If true, will create a secret for Azure Key Vault credentials
|
|
||||||
createSecret: true
|
createSecret: true
|
||||||
# Reference to existing secret containing Azure credentials
|
existingSecret: ''
|
||||||
existingSecret: ""
|
|
||||||
# Values used if createSecret is true
|
|
||||||
credentials:
|
credentials:
|
||||||
tenantId: "cf151ee8-5c2c-4fe7-a1c4-809ba43c9f24"
|
tenantId: cf151ee8-5c2c-4fe7-a1c4-809ba43c9f24
|
||||||
clientId: "7cd1df19-24ea-46d7-acd3-5336283139e0"
|
clientId: 7cd1df19-24ea-46d7-acd3-5336283139e0
|
||||||
clientSecret: "XMy8Q~XbsgiXC6Yrm7vCRCsHdLhQpIMYCSRvgcLH"
|
clientSecret: XMy8Q~XbsgiXC6Yrm7vCRCsHdLhQpIMYCSRvgcLH
|
||||||
vaultUrl: "https://freeleaps-vault-service.vault.azure.net/"
|
vaultUrl: https://freeleaps-vault-service.vault.azure.net/
|
||||||
vaultName: "freeleaps-vault-service"
|
vaultName: freeleaps-vault-service
|
||||||
subscriptionId: "0a280068-dec4-4bf0-9f04-65b64f412b50"
|
subscriptionId: 0a280068-dec4-4bf0-9f04-65b64f412b50
|
||||||
resourceGroup: "k8s"
|
resourceGroup: k8s
|
||||||
|
|
||||||
# JWT Configuration
|
|
||||||
jwt:
|
jwt:
|
||||||
# If true, will create a secret for JWT configuration
|
|
||||||
createSecret: true
|
createSecret: true
|
||||||
# Reference to existing secret containing JWT configuration
|
existingSecret: ''
|
||||||
existingSecret: ""
|
|
||||||
# Values used if createSecret is true
|
|
||||||
config:
|
config:
|
||||||
secretKey: "ea84edf152976b2fcec12b78aa8e45bc26a5cf0ef61bf16f5c317ae33b3fd8b0"
|
secretKey: ea84edf152976b2fcec12b78aa8e45bc26a5cf0ef61bf16f5c317ae33b3fd8b0
|
||||||
algorithm: "HS256"
|
algorithm: HS256
|
||||||
|
|
||||||
# HMAC Configuration
|
|
||||||
hmac:
|
hmac:
|
||||||
# If true, will create a secret for HMAC configuration
|
|
||||||
createSecret: true
|
createSecret: true
|
||||||
# Reference to existing secret containing HMAC configuration
|
existingSecret: ''
|
||||||
existingSecret: ""
|
|
||||||
# Values used if createSecret is true
|
|
||||||
config:
|
config:
|
||||||
secretKey: "ea84edf152976b2fcec12b78aa8e45bc26a5cf0ef61bf16f5c317ae33b3fd8b0"
|
secretKey: ea84edf152976b2fcec12b78aa8e45bc26a5cf0ef61bf16f5c317ae33b3fd8b0
|
||||||
|
|
||||||
# CRDs configuration
|
|
||||||
crds:
|
crds:
|
||||||
install: false # Set to false if you want to manage CRDs separately
|
install: false
|
||||||
|
|
||||||
apiServerService:
|
apiServerService:
|
||||||
enabled: true
|
enabled: true
|
||||||
service:
|
service:
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user