From 01a04f14c5061ca394c7b0f7aae24812a292a415 Mon Sep 17 00:00:00 2001 From: cf-ci-bot-v2 Date: Mon, 12 Jan 2026 12:22:29 +0000 Subject: [PATCH 1/8] Update Chart.yaml and changelog for 0.26.6 release --- charts/gitops-runtime/Chart.yaml | 2 +- charts/gitops-runtime/README.md | 10 +++++----- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/charts/gitops-runtime/Chart.yaml b/charts/gitops-runtime/Chart.yaml index 942df336..d64d7e78 100644 --- a/charts/gitops-runtime/Chart.yaml +++ b/charts/gitops-runtime/Chart.yaml @@ -16,7 +16,7 @@ annotations: artifacthub.io/alternativeName: "codefresh-gitops-runtime" artifacthub.io/changes: |- - kind: changed - description: 'fix(codefresh-gitops-operator): security vulnerability CVE-2025-66626 (#1026)' + description: 'fix(cf-argocd-extras): security vulnerability CVE-2025-58181, CVE-2025-13281, CVE-2025-61727, CVE-2025-61729 (#1033)' dependencies: - name: argo-cd repository: https://argoproj.github.io/argo-helm diff --git a/charts/gitops-runtime/README.md b/charts/gitops-runtime/README.md index a0b06d62..ce0e0370 100644 --- a/charts/gitops-runtime/README.md +++ b/charts/gitops-runtime/README.md @@ -1,5 +1,5 @@ ## Codefresh gitops runtime -![Version: 0.26.5](https://img.shields.io/badge/Version-0.26.5-informational?style=flat-square) ![AppVersion: 0.2.0](https://img.shields.io/badge/AppVersion-0.2.0-informational?style=flat-square) +![Version: 0.26.6](https://img.shields.io/badge/Version-0.26.6-informational?style=flat-square) ![AppVersion: 0.2.0](https://img.shields.io/badge/AppVersion-0.2.0-informational?style=flat-square) ## Table of Content @@ -222,7 +222,7 @@ We have created a helper utility to resolve this issue: The utility is packaged in a container image. Below are instructions on executing the utility using Docker: ``` -docker run -v :/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.26.5 +docker run -v :/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.26.6 ``` `output_dir` - is a local directory where the utility will output files.
`local_registry` - is your local registry where you want to mirror the images to @@ -235,7 +235,7 @@ The utility will output 4 files into the folder: For usage with external ArgoCD run the utility with `EXTERNAL_ARGOCD` environment variable set to `true`. ``` -docker run -e EXTERNAL_ARGOCD=true -v :/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.26.5 +docker run -e EXTERNAL_ARGOCD=true -v :/output quay.io/codefresh/gitops-runtime-private-registry-utils:0.26.6 ``` ## Openshift @@ -634,7 +634,7 @@ global: | argo-events.crds.install | bool | `false` | | | argo-events.enabled | bool | `true` | | | argo-events.fullnameOverride | string | `"argo-events"` | | -| argo-gateway | object | `{"affinity":{},"hpa":{"enabled":true,"maxReplicas":10,"minReplicas":1,"targetCPUUtilizationPercentage":70},"image":{"registry":"quay.io","repository":"codefresh/cf-argocd-extras","tag":"5ad6886"},"livenessProbe":{"failureThreshold":3,"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":10},"nodeSelector":{},"pdb":{"enabled":true,"maxUnavailable":"","minAvailable":"50%"},"readinessProbe":{"failureThreshold":3,"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":10},"resources":{"requests":{"cpu":"100m","memory":"128Mi"}},"service":{"type":"ClusterIP"},"serviceAccount":{"create":true},"serviceMonitor":{"enabled":false,"interval":"30s","labels":{},"scrapeTimeout":"10s"},"tolerations":[]}` | Argo Gateway Argo Gateway is used to perform operations on ArgoCD from Codefresh platform | +| argo-gateway | object | `{"affinity":{},"hpa":{"enabled":true,"maxReplicas":10,"minReplicas":1,"targetCPUUtilizationPercentage":70},"image":{"registry":"quay.io","repository":"codefresh/cf-argocd-extras","tag":"0.26-023fa0f"},"livenessProbe":{"failureThreshold":3,"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":10},"nodeSelector":{},"pdb":{"enabled":true,"maxUnavailable":"","minAvailable":"50%"},"readinessProbe":{"failureThreshold":3,"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":10},"resources":{"requests":{"cpu":"100m","memory":"128Mi"}},"service":{"type":"ClusterIP"},"serviceAccount":{"create":true},"serviceMonitor":{"enabled":false,"interval":"30s","labels":{},"scrapeTimeout":"10s"},"tolerations":[]}` | Argo Gateway Argo Gateway is used to perform operations on ArgoCD from Codefresh platform | | argo-rollouts.controller.replicas | int | `1` | | | argo-rollouts.enabled | bool | `false` | | | argo-rollouts.fullnameOverride | string | `"argo-rollouts"` | | @@ -730,7 +730,7 @@ global: | global.codefresh.userToken | object | `{"secretKeyRef":{},"token":""}` | User token. Used for runtime registration against the patform. One of token (for plain text value) or secretKeyRef must be provided. | | global.codefresh.userToken.secretKeyRef | object | `{}` | User token that references an existing secret containing the token. | | global.codefresh.userToken.token | string | `""` | User token in plain text. The chart creates and manages the secret for this token. | -| global.event-reporters | object | `{"affinity":{},"config":{},"image":{"registry":"quay.io","repository":"codefresh/cf-argocd-extras","tag":"aca2645"},"livenessProbe":{"failureThreshold":3,"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":10},"nodeSelector":{},"pdb":{"enabled":true,"maxUnavailable":"","minAvailable":"50%"},"readinessProbe":{"failureThreshold":3,"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":10},"replicaCount":2,"resources":{"requests":{"cpu":"100m","memory":"128Mi"}},"service":{"ports":{"http":{"port":8088,"targetPort":8088},"metrics":{"port":8087,"targetPort":8087}},"type":"ClusterIP"},"serviceAccount":{"create":true},"serviceMonitor":{"enabled":false,"interval":"30s","labels":{},"scrapeTimeout":"10s"},"tolerations":[]}` | Global settings for event reporters Event reporters are used for reporting runtime and cluster resources to Codefresh platform | +| global.event-reporters | object | `{"affinity":{},"config":{},"image":{"registry":"quay.io","repository":"codefresh/cf-argocd-extras","tag":"0.26-023fa0f"},"livenessProbe":{"failureThreshold":3,"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":10},"nodeSelector":{},"pdb":{"enabled":true,"maxUnavailable":"","minAvailable":"50%"},"readinessProbe":{"failureThreshold":3,"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":10},"replicaCount":2,"resources":{"requests":{"cpu":"100m","memory":"128Mi"}},"service":{"ports":{"http":{"port":8088,"targetPort":8088},"metrics":{"port":8087,"targetPort":8087}},"type":"ClusterIP"},"serviceAccount":{"create":true},"serviceMonitor":{"enabled":false,"interval":"30s","labels":{},"scrapeTimeout":"10s"},"tolerations":[]}` | Global settings for event reporters Event reporters are used for reporting runtime and cluster resources to Codefresh platform | | global.external-argo-rollouts | object | `{"rollout-reporter":{"enabled":false}}` | Configuration for external Argo Rollouts | | global.external-argo-rollouts.rollout-reporter | object | `{"enabled":false}` | Rollout reporter settings | | global.external-argo-rollouts.rollout-reporter.enabled | bool | `false` | Enable or disable rollout reporter Configuration is defined at .Values.event-reporters.rollout | From d80e03e0b63a7b682998fb6d1e552f8301277702 Mon Sep 17 00:00:00 2001 From: cf-ci-bot-v2 Date: Tue, 13 Jan 2026 09:17:21 +0000 Subject: [PATCH 2/8] Update Chart.yaml and changelog for 0.26.6 release --- charts/gitops-runtime/Chart.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/charts/gitops-runtime/Chart.yaml b/charts/gitops-runtime/Chart.yaml index d64d7e78..8e9abbb1 100644 --- a/charts/gitops-runtime/Chart.yaml +++ b/charts/gitops-runtime/Chart.yaml @@ -15,6 +15,8 @@ annotations: artifacthub.io/containsSecurityUpdates: "true" artifacthub.io/alternativeName: "codefresh-gitops-runtime" artifacthub.io/changes: |- + - kind: changed + description: 'fix(sealed-secrets-controller): security vulnerabilities CVE-2025-47912, CVE-2025-58181, CVE-2025-58186, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61727, CVE-2025-61729 (#1038)' - kind: changed description: 'fix(cf-argocd-extras): security vulnerability CVE-2025-58181, CVE-2025-13281, CVE-2025-61727, CVE-2025-61729 (#1033)' dependencies: From 22368585ba44c82c4651408e2ffb5d4a33ac39d3 Mon Sep 17 00:00:00 2001 From: vitaliichyrka Date: Tue, 13 Jan 2026 20:36:38 +0200 Subject: [PATCH 3/8] updated docs --- charts/gitops-runtime/Chart.yaml | 2 ++ charts/gitops-runtime/README.md | 2 +- tests/component-tests/setup/fixture/simple-app/README.md | 2 +- 3 files changed, 4 insertions(+), 2 deletions(-) diff --git a/charts/gitops-runtime/Chart.yaml b/charts/gitops-runtime/Chart.yaml index b9ce9e9e..f2e2f898 100644 --- a/charts/gitops-runtime/Chart.yaml +++ b/charts/gitops-runtime/Chart.yaml @@ -19,6 +19,8 @@ annotations: description: 'fix(sealed-secrets-controller): security vulnerabilities CVE-2025-47912, CVE-2025-58181, CVE-2025-58186, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61727, CVE-2025-61729 (#1038)' - kind: changed description: 'fix(cf-argocd-extras): security vulnerability CVE-2025-58181, CVE-2025-13281, CVE-2025-61727, CVE-2025-61729 (#1033)' + - kind: changed + description: 'updated "argocd" to v3.2.3' dependencies: - name: argo-cd repository: https://argoproj.github.io/argo-helm diff --git a/charts/gitops-runtime/README.md b/charts/gitops-runtime/README.md index ce0e0370..2d90b9dd 100644 --- a/charts/gitops-runtime/README.md +++ b/charts/gitops-runtime/README.md @@ -847,7 +847,7 @@ global: | sealed-secrets.fullnameOverride | string | `"sealed-secrets-controller"` | | | sealed-secrets.image.registry | string | `"quay.io"` | | | sealed-secrets.image.repository | string | `"codefresh/sealed-secrets-controller"` | | -| sealed-secrets.image.tag | string | `"0.32.0"` | | +| sealed-secrets.image.tag | string | `"0.34.0"` | | | sealed-secrets.keyrenewperiod | string | `"720h"` | | | sealed-secrets.resources.limits.cpu | string | `"500m"` | | | sealed-secrets.resources.limits.memory | string | `"1Gi"` | | diff --git a/tests/component-tests/setup/fixture/simple-app/README.md b/tests/component-tests/setup/fixture/simple-app/README.md index 1ab4be19..dfe0feb1 100644 --- a/tests/component-tests/setup/fixture/simple-app/README.md +++ b/tests/component-tests/setup/fixture/simple-app/README.md @@ -52,4 +52,4 @@ A Helm chart for Kubernetes | volumes | list | `[]` | | ---------------------------------------------- -Autogenerated from chart metadata using [helm-docs v1.9.1](https://github.com/norwoodj/helm-docs/releases/v1.9.1) +Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2) From 875230719481d4e067d12fd7a817f7d0baa70ed7 Mon Sep 17 00:00:00 2001 From: cf-ci-bot-v2 Date: Wed, 14 Jan 2026 14:58:10 +0000 Subject: [PATCH 4/8] Update Chart.yaml and changelog for 0.26.6 release --- charts/gitops-runtime/Chart.yaml | 6 ++++-- charts/gitops-runtime/values.yaml | 4 ++-- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/charts/gitops-runtime/Chart.yaml b/charts/gitops-runtime/Chart.yaml index f2e2f898..d14f4207 100644 --- a/charts/gitops-runtime/Chart.yaml +++ b/charts/gitops-runtime/Chart.yaml @@ -15,12 +15,14 @@ annotations: artifacthub.io/containsSecurityUpdates: "true" artifacthub.io/alternativeName: "codefresh-gitops-runtime" artifacthub.io/changes: |- + - kind: changed + description: 'chore(CR-33123): updated kubectl for redis-secret-init job (#1040)' + - kind: changed + description: updated argo-cd to 3.2.3 (#1036) - kind: changed description: 'fix(sealed-secrets-controller): security vulnerabilities CVE-2025-47912, CVE-2025-58181, CVE-2025-58186, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61727, CVE-2025-61729 (#1038)' - kind: changed description: 'fix(cf-argocd-extras): security vulnerability CVE-2025-58181, CVE-2025-13281, CVE-2025-61727, CVE-2025-61729 (#1033)' - - kind: changed - description: 'updated "argocd" to v3.2.3' dependencies: - name: argo-cd repository: https://argoproj.github.io/argo-helm diff --git a/charts/gitops-runtime/values.yaml b/charts/gitops-runtime/values.yaml index 7848be5d..7ba33270 100644 --- a/charts/gitops-runtime/values.yaml +++ b/charts/gitops-runtime/values.yaml @@ -243,7 +243,7 @@ installer: tolerations: [] affinity: {} # ********************************************************************************************************************* -# DOCS: https://artifacthub.io/packages/helm/bitnami-labs/sealed-secrets/2.17.2?modal=values +# DOCS: https://artifacthub.io/packages/helm/bitnami-labs/sealed-secrets/2.18.0?modal=values # ********************************************************************************************************************* sealed-secrets: fullnameOverride: sealed-secrets-controller @@ -260,7 +260,7 @@ sealed-secrets: cpu: 200m memory: 512Mi # ********************************************************************************************************************* -# DOCS: https://artifacthub.io/packages/helm/argo/argo-cd/9.1.9?modal=values +# DOCS: https://artifacthub.io/packages/helm/argo/argo-cd/9.3.0?modal=values # ********************************************************************************************************************* argo-cd: enabled: true From 5e2957c2d2518ab3e4042f55849196fe544a9867 Mon Sep 17 00:00:00 2001 From: cf-ci-bot-v2 Date: Thu, 15 Jan 2026 08:59:32 +0000 Subject: [PATCH 5/8] Update Chart.yaml and changelog for 0.26.6 release --- charts/gitops-runtime/Chart.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/charts/gitops-runtime/Chart.yaml b/charts/gitops-runtime/Chart.yaml index d14f4207..fadf574c 100644 --- a/charts/gitops-runtime/Chart.yaml +++ b/charts/gitops-runtime/Chart.yaml @@ -15,6 +15,8 @@ annotations: artifacthub.io/containsSecurityUpdates: "true" artifacthub.io/alternativeName: "codefresh-gitops-runtime" artifacthub.io/changes: |- + - kind: changed + description: 'fix: security vulnerabilities in cap-app-proxy-init: CVE-2016-2781 and CVE-2024-10041; cap-app-proxy: CVE-2025-61729 and CVE-2025-61727 (#1043)' - kind: changed description: 'chore(CR-33123): updated kubectl for redis-secret-init job (#1040)' - kind: changed From b046e800d13677cda2bd5d2bb831099762e042ef Mon Sep 17 00:00:00 2001 From: cf-ci-bot-v2 Date: Thu, 15 Jan 2026 13:17:41 +0000 Subject: [PATCH 6/8] Update Chart.yaml and changelog for 0.26.6 release --- charts/gitops-runtime/Chart.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/charts/gitops-runtime/Chart.yaml b/charts/gitops-runtime/Chart.yaml index fadf574c..2cf8767f 100644 --- a/charts/gitops-runtime/Chart.yaml +++ b/charts/gitops-runtime/Chart.yaml @@ -15,6 +15,8 @@ annotations: artifacthub.io/containsSecurityUpdates: "true" artifacthub.io/alternativeName: "codefresh-gitops-runtime" artifacthub.io/changes: |- + - kind: changed + description: '[app-proxy]fix: security vulnerabilities for app-proxy (CVE-2025-61729 and CVE-2025-61727) and app-proxy-init (CVE-2016-2781 and CVE-2024-10041) (#1048)' - kind: changed description: 'fix: security vulnerabilities in cap-app-proxy-init: CVE-2016-2781 and CVE-2024-10041; cap-app-proxy: CVE-2025-61729 and CVE-2025-61727 (#1043)' - kind: changed From 16c1063b14e4aaac6ad0c4b0a03aaf979b5c7f55 Mon Sep 17 00:00:00 2001 From: Vasil Sudakou Date: Thu, 15 Jan 2026 16:38:42 +0300 Subject: [PATCH 7/8] fix: updated release notes --- charts/gitops-runtime/Chart.yaml | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/charts/gitops-runtime/Chart.yaml b/charts/gitops-runtime/Chart.yaml index 2cf8767f..77a77e78 100644 --- a/charts/gitops-runtime/Chart.yaml +++ b/charts/gitops-runtime/Chart.yaml @@ -16,17 +16,17 @@ annotations: artifacthub.io/alternativeName: "codefresh-gitops-runtime" artifacthub.io/changes: |- - kind: changed - description: '[app-proxy]fix: security vulnerabilities for app-proxy (CVE-2025-61729 and CVE-2025-61727) and app-proxy-init (CVE-2016-2781 and CVE-2024-10041) (#1048)' - - kind: changed - description: 'fix: security vulnerabilities in cap-app-proxy-init: CVE-2016-2781 and CVE-2024-10041; cap-app-proxy: CVE-2025-61729 and CVE-2025-61727 (#1043)' - - kind: changed - description: 'chore(CR-33123): updated kubectl for redis-secret-init job (#1040)' - - kind: changed - description: updated argo-cd to 3.2.3 (#1036) - - kind: changed - description: 'fix(sealed-secrets-controller): security vulnerabilities CVE-2025-47912, CVE-2025-58181, CVE-2025-58186, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61727, CVE-2025-61729 (#1038)' - - kind: changed - description: 'fix(cf-argocd-extras): security vulnerability CVE-2025-58181, CVE-2025-13281, CVE-2025-61727, CVE-2025-61729 (#1033)' + description: 'updated argo-cd to 3.2.3' + - kind: security + description: 'app-proxy: fixed security vulnerabilities CVE-2025-61729 and CVE-2025-61727' + - kind: security + description: 'app-proxy-init: fixed security vulnerabilities CVE-2016-2781 and CVE-2024-10041' + - kind: security + description: 'cf-argocd-extras: fixed security vulnerabilities CVE-2025-58181, CVE-2025-13281, CVE-2025-61727 and CVE-2025-61729' + - kind: security + description: 'kubectl: fixed security vulnerabilities CVE-2025-47912, CVE-2025-61724, CVE-2025-58187, CVE-2025-47912, CVE-2025-58183, CVE-2025-58186, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189 and CVE-2025-61723 for redis-secret-init job' + - kind: security + description: 'sealed-secrets-controller: fixed security vulnerabilities CVE-2025-47912, CVE-2025-58181, CVE-2025-58186, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61727 and CVE-2025-61729' dependencies: - name: argo-cd repository: https://argoproj.github.io/argo-helm From 550939c4ae28d8edb9aaf0f313c2da702432ccf3 Mon Sep 17 00:00:00 2001 From: Vasil Sudakou Date: Thu, 15 Jan 2026 17:39:57 +0300 Subject: [PATCH 8/8] chore: ran ./scripts/helm-docs.sh --- charts/gitops-runtime/README.md | 6 +++--- tests/component-tests/setup/fixture/simple-app/README.md | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/charts/gitops-runtime/README.md b/charts/gitops-runtime/README.md index 2d90b9dd..dd71fbc2 100644 --- a/charts/gitops-runtime/README.md +++ b/charts/gitops-runtime/README.md @@ -546,14 +546,14 @@ global: | app-proxy.image-enrichment.serviceAccount.name | string | `"codefresh-image-enrichment-sa"` | Name of the service account to create or the name of the existing one to use | | app-proxy.image.pullPolicy | string | `"IfNotPresent"` | | | app-proxy.image.repository | string | `"quay.io/codefresh/cap-app-proxy"` | | -| app-proxy.image.tag | string | `"5f0a3d5"` | | +| app-proxy.image.tag | string | `"8765bbd"` | | | app-proxy.imagePullSecrets | list | `[]` | | | app-proxy.initContainer.command[0] | string | `"./init.sh"` | | | app-proxy.initContainer.env | object | `{}` | | | app-proxy.initContainer.extraVolumeMounts | list | `[]` | Extra volume mounts for init container | | app-proxy.initContainer.image.pullPolicy | string | `"IfNotPresent"` | | | app-proxy.initContainer.image.repository | string | `"quay.io/codefresh/cap-app-proxy-init"` | | -| app-proxy.initContainer.image.tag | string | `"5f0a3d5"` | | +| app-proxy.initContainer.image.tag | string | `"8765bbd"` | | | app-proxy.initContainer.resources.limits | object | `{}` | | | app-proxy.initContainer.resources.requests.cpu | string | `"0.2"` | | | app-proxy.initContainer.resources.requests.memory | string | `"256Mi"` | | @@ -836,7 +836,7 @@ global: | redis-ha.topologySpreadConstraints.maxSkew | string | `""` (defaults to `1`) | Max skew of pods tolerated | | redis-ha.topologySpreadConstraints.topologyKey | string | `""` (defaults to `topology.kubernetes.io/zone`) | Topology key for spread | | redis-ha.topologySpreadConstraints.whenUnsatisfiable | string | `""` (defaults to `ScheduleAnyway`) | Enforcement policy, hard or soft | -| redis-secret-init | object | `{"affinity":{},"image":{"registry":"docker.io","repository":"alpine/kubectl","tag":"1.34.1"},"nodeSelector":{},"tolerations":[]}` | Enable hook job to create redis secret | +| redis-secret-init | object | `{"affinity":{},"image":{"registry":"docker.io","repository":"alpine/kubectl","tag":"1.35.0"},"nodeSelector":{},"tolerations":[]}` | Enable hook job to create redis secret | | redis.image | object | `{"registry":"public.ecr.aws","repository":"docker/library/redis","tag":"8.2.1-alpine"}` | Redis image | | redis.metrics | object | `{"enabled":true,"env":{},"envFrom":[],"image":{"registry":"ghcr.io","repository":"oliver006/redis_exporter","tag":"v1.72.1"},"livenessProbe":{"enabled":true,"failureThreshold":5,"initialDelaySeconds":30,"periodSeconds":15,"successThreshold":1,"timeoutSeconds":15},"readinessProbe":{"enabled":true,"failureThreshold":5,"initialDelaySeconds":30,"periodSeconds":15,"successThreshold":1,"timeoutSeconds":15},"resources":{},"serviceMonitor":{"enabled":false}}` | Enable metrics sidecar | | redis.metrics.serviceMonitor | object | `{"enabled":false}` | Enable a prometheus ServiceMonitor | diff --git a/tests/component-tests/setup/fixture/simple-app/README.md b/tests/component-tests/setup/fixture/simple-app/README.md index dfe0feb1..1ab4be19 100644 --- a/tests/component-tests/setup/fixture/simple-app/README.md +++ b/tests/component-tests/setup/fixture/simple-app/README.md @@ -52,4 +52,4 @@ A Helm chart for Kubernetes | volumes | list | `[]` | | ---------------------------------------------- -Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2) +Autogenerated from chart metadata using [helm-docs v1.9.1](https://github.com/norwoodj/helm-docs/releases/v1.9.1)