Skip to content

Commit

Permalink
chore: Set Default Value of secretManager to own for Private Reposito…
Browse files Browse the repository at this point in the history
…ries (#47)
  • Loading branch information
MykolaMarusenko committed May 16, 2024
1 parent f237c26 commit 18536d0
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion deploy-templates/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ A Helm chart for EDP CD Pipeline Operator
| resources.limits.memory | string | `"192Mi"` | |
| resources.requests.cpu | string | `"50m"` | |
| resources.requests.memory | string | `"64Mi"` | |
| secretManager | string | `"none"` | Flag indicating whether the operator should manage secrets for stages. This parameter controls the provisioning of the 'regcred' secret within deployed environments, facilitating access to private container registries. Set the parameter to "none" under the following conditions: - If 'global.dockerRegistry.type=ecr' and IRSA is enabled, or - If 'global.dockerRegistry.type=openshift'. For private registries, choose the most appropriate method to provide credentials to deployed environments. Refer to the guide for managing container registries (https://epam.github.io/edp-install/user-guide/manage-container-registries/). Possible values: own/eso/none. - own: Copies the secret once from the parent namespace, without subsequent reconciliation. If updated in the parent namespace, manual updating in all created namespaces is required. - eso: The secret will be managed by the External Secrets Operator (requires installation and configuration in the cluster: https://epam.github.io/edp-install/operator-guide/install-external-secrets-operator/). - none: Disables secrets management logic. |
| secretManager | string | `"own"` | Flag indicating whether the operator should manage secrets for stages. This parameter controls the provisioning of the 'regcred' secret within deployed environments, facilitating access to private container registries. Set the parameter to "none" under the following conditions: - If 'global.dockerRegistry.type=ecr' and IRSA is enabled, or - If 'global.dockerRegistry.type=openshift'. For private registries, choose the most appropriate method to provide credentials to deployed environments. Refer to the guide for managing container registries (https://epam.github.io/edp-install/user-guide/manage-container-registries/). Possible values: own/eso/none. - own: Copies the secret once from the parent namespace, without subsequent reconciliation. If updated in the parent namespace, manual updating in all created namespaces is required. - eso: The secret will be managed by the External Secrets Operator (requires installation and configuration in the cluster: https://epam.github.io/edp-install/operator-guide/install-external-secrets-operator/). - none: Disables secrets management logic. |
| tenancyEngine | string | `"none"` | defines the type of the tenant engine that can be "none", "kiosk" or "capsule"; for Stages with external cluster tenancyEngine will be ignored |
| tolerations | list | `[]` | |

2 changes: 1 addition & 1 deletion deploy-templates/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -105,4 +105,4 @@ manageNamespace: true
# - own: Copies the secret once from the parent namespace, without subsequent reconciliation. If updated in the parent namespace, manual updating in all created namespaces is required.
# - eso: The secret will be managed by the External Secrets Operator (requires installation and configuration in the cluster: https://epam.github.io/edp-install/operator-guide/install-external-secrets-operator/).
# - none: Disables secrets management logic.
secretManager: none
secretManager: own

0 comments on commit 18536d0

Please sign in to comment.