@@ -11,10 +11,10 @@ After that you can install TF-controller manually with Helm by:
11
11
12
12
``` shell
13
13
# Add tf-controller helm repository
14
- helm repo add tf-controller https://flux-iac.github.io/tofu-controller
14
+ helm repo add tf-controller https://flux-iac.github.io/tofu-controller/
15
15
16
16
# Install tf-controller
17
- helm upgrade -i tf -controller tf -controller/tf-controller \
17
+ helm upgrade -i tofu -controller tofu -controller/tf-controller \
18
18
--namespace flux-system
19
19
```
20
20
@@ -34,9 +34,9 @@ __Note__: If you need to use the `imagePullSecrets` it would be best to set `ser
34
34
| allowBreakTheGlass | bool | ` false ` | Argument for ` --allow-break-the-glass ` (Controller). AllowBreakTheGlass allows the controller to break the glass and modify Terraform states when the sync loop is broken. |
35
35
| allowCrossNamespaceRefs | bool | ` false ` | If ` true ` , enable cross-namespace references for controller and branch-planner |
36
36
| awsPackage.install | bool | ` true ` | |
37
- | awsPackage.repository | string | ` "ghcr.io/tf-controller /aws-primitive-modules" ` | |
37
+ | awsPackage.repository | string | ` "ghcr.io/flux-iac /aws-primitive-modules" ` | |
38
38
| awsPackage.tag | string | ` "v4.38.0-v1alpha11" ` | |
39
- | branchPlanner | object | ` {"configMap":"branch-planner","enabled":false,"image":{"pullPolicy":"IfNotPresent","repository":"ghcr.io/weaveworks /branch-planner","tag":""},"podSecurityContext":{"fsGroup":1337},"pollingInterval":"30s","resources":{"limits":{"cpu":"1000m","memory":"1Gi"},"requests":{"cpu":"200m","memory":"64Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"runAsUser":65532,"seccompProfile":{"type":"RuntimeDefault"}},"sourceInterval":"30s"} ` | Branch Planner-specific configurations |
39
+ | branchPlanner | object | ` {"configMap":"branch-planner","enabled":false,"image":{"pullPolicy":"IfNotPresent","repository":"ghcr.io/flux-iac /branch-planner","tag":""},"podSecurityContext":{"fsGroup":1337},"pollingInterval":"30s","resources":{"limits":{"cpu":"1000m","memory":"1Gi"},"requests":{"cpu":"200m","memory":"64Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"runAsUser":65532,"seccompProfile":{"type":"RuntimeDefault"}},"sourceInterval":"30s"} ` | Branch Planner-specific configurations |
40
40
| caCertValidityDuration | string | ` "168h0m" ` | Argument for ` --ca-cert-validity-duration ` (Controller) |
41
41
| certRotationCheckFrequency | string | ` "30m0s" ` | Argument for ` --cert-rotation-check-frequency ` (Controller) |
42
42
| certValidityDuration | string | ` "6h0m" ` | Argument for ` --cert-validity-duration ` (Controller) |
@@ -49,7 +49,7 @@ __Note__: If you need to use the `imagePullSecrets` it would be best to set `ser
49
49
| extraEnv | object | ` {} ` | Additional container environment variables. |
50
50
| fullnameOverride | string | ` "" ` | Provide a fullname |
51
51
| image.pullPolicy | string | ` "IfNotPresent" ` | Controller image pull policy |
52
- | image.repository | string | ` "ghcr.io/weaveworks /tf-controller" ` | Controller image repository |
52
+ | image.repository | string | ` "ghcr.io/flux-iac /tf-controller" ` | Controller image repository |
53
53
| image.tag | string | ` .Chart.AppVersion ` | Overrides the image tag whose default is the chart appVersion. |
54
54
| imagePullSecrets | list | ` [] ` | Controller image pull secret |
55
55
| installCRDs | bool | ` true ` | If ` true ` , install CRDs as part of the helm installation |
@@ -77,10 +77,10 @@ __Note__: If you need to use the `imagePullSecrets` it would be best to set `ser
77
77
| rbac.create | bool | ` true ` | If ` true ` , create and use RBAC resources |
78
78
| replicaCount | int | ` 1 ` | Number of TF-Controller pods to deploy |
79
79
| resources | object | ` {"limits":{"cpu":"1000m","memory":"1Gi"},"requests":{"cpu":"200m","memory":"64Mi"}} ` | Resource limits and requests |
80
- | runner | object | ` {"creationTimeout":"5m0s","grpc":{"maxMessageSize":4},"image":{"repository":"ghcr.io/weaveworks /tf-runner","tag":"v0.16.0-rc.3"},"serviceAccount":{"allowedNamespaces":[],"annotations":{},"create":true,"name":""}} ` | Runner-specific configurations |
80
+ | runner | object | ` {"creationTimeout":"5m0s","grpc":{"maxMessageSize":4},"image":{"repository":"ghcr.io/flux-iac /tf-runner","tag":"v0.16.0-rc.3"},"serviceAccount":{"allowedNamespaces":[],"annotations":{},"create":true,"name":""}} ` | Runner-specific configurations |
81
81
| runner.creationTimeout | string | ` "5m0s" ` | Timeout for runner-creation (Controller) |
82
82
| runner.grpc.maxMessageSize | int | ` 4 ` | Maximum GRPC message size (Controller) |
83
- | runner.image.repository | string | ` "ghcr.io/weaveworks /tf-runner" ` | Runner image repository |
83
+ | runner.image.repository | string | ` "ghcr.io/flux-iac /tf-runner" ` | Runner image repository |
84
84
| runner.image.tag | string | ` .Chart.AppVersion ` | Runner image tag |
85
85
| runner.serviceAccount.allowedNamespaces | list | ` [] ` | List of namespaces that the runner may run within |
86
86
| runner.serviceAccount.annotations | object | ` {} ` | Additional runner service Account annotations |
@@ -96,4 +96,4 @@ __Note__: If you need to use the `imagePullSecrets` it would be best to set `ser
96
96
| volumes | list | ` [] ` | Volumes properties for the TF-Controller deployment |
97
97
98
98
----------------------------------------------
99
- Autogenerated from chart metadata using [ helm-docs v1.11 .0] ( https://github.com/norwoodj/helm-docs/releases/v1.11 .0 )
99
+ Autogenerated from chart metadata using [ helm-docs v1.13 .0] ( https://github.com/norwoodj/helm-docs/releases/v1.13 .0 )
0 commit comments