Add argocd-cmd-params-cm (#1267)
Signed-off-by: Petr Drastil <petr.drastil@gmail.com>
This commit is contained in:
parent
6099bbb256
commit
edf29d2e15
13 changed files with 1018 additions and 486 deletions
|
|
@ -8,6 +8,24 @@ nameOverride: argocd
|
|||
fullnameOverride: ""
|
||||
# -- Override the Kubernetes version, which is used to evaluate certain manifests
|
||||
kubeVersionOverride: ""
|
||||
# Override APIVersions
|
||||
# If you want to template helm charts but cannot access k8s API server
|
||||
# you can set api versions here
|
||||
apiVersionOverrides:
|
||||
# -- String to override apiVersion of certmanager resources rendered by this helm chart
|
||||
certmanager: "" # cert-manager.io/v1
|
||||
# -- String to override apiVersion of ingresses rendered by this helm chart
|
||||
ingress: "" # networking.k8s.io/v1beta1
|
||||
# -- String to override apiVersion of autoscaling rendered by this helm chart
|
||||
autoscaling: "" # autoscaling/v2
|
||||
|
||||
# -- Create clusterroles that extend existing clusterroles to interact with argo-cd crds
|
||||
## Ref: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
|
||||
createAggregateRoles: false
|
||||
|
||||
openshift:
|
||||
# -- enables using arbitrary uid for argo repo server
|
||||
enabled: false
|
||||
|
||||
## Custom resource configuration
|
||||
crds:
|
||||
|
|
@ -59,20 +77,262 @@ global:
|
|||
# -- Default deny all ingress traffic
|
||||
defaultDenyIngress: false
|
||||
|
||||
# Override APIVersions
|
||||
# If you want to template helm charts but cannot access k8s API server
|
||||
# you can set api versions here
|
||||
apiVersionOverrides:
|
||||
# -- String to override apiVersion of certmanager resources rendered by this helm chart
|
||||
certmanager: "" # cert-manager.io/v1
|
||||
# -- String to override apiVersion of ingresses rendered by this helm chart
|
||||
ingress: "" # networking.k8s.io/v1beta1
|
||||
# -- String to override apiVersion of autoscaling rendered by this helm chart
|
||||
autoscaling: "" # autoscaling/v2
|
||||
## Argo Configs
|
||||
configs:
|
||||
# -- Provide one or multiple [external cluster credentials]
|
||||
# @default -- `[]` (See [values.yaml])
|
||||
## Ref:
|
||||
## - https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#clusters
|
||||
## - https://argo-cd.readthedocs.io/en/stable/operator-manual/security/#external-cluster-credentials
|
||||
clusterCredentials: []
|
||||
# - name: mycluster
|
||||
# server: https://mycluster.com
|
||||
# labels: {}
|
||||
# annotations: {}
|
||||
# config:
|
||||
# bearerToken: "<authentication token>"
|
||||
# tlsClientConfig:
|
||||
# insecure: false
|
||||
# caData: "<base64 encoded certificate>"
|
||||
# - name: mycluster2
|
||||
# server: https://mycluster2.com
|
||||
# labels: {}
|
||||
# annotations: {}
|
||||
# namespaces: namespace1,namespace2
|
||||
# clusterResources: true
|
||||
# config:
|
||||
# bearerToken: "<authentication token>"
|
||||
# tlsClientConfig:
|
||||
# insecure: false
|
||||
# caData: "<base64 encoded certificate>"
|
||||
|
||||
# -- Create clusterroles that extend existing clusterroles to interact with argo-cd crds
|
||||
## Ref: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
|
||||
createAggregateRoles: false
|
||||
# -- GnuPG key ring annotations
|
||||
gpgKeysAnnotations: {}
|
||||
# -- [GnuPG](https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/) keys to add to the key ring
|
||||
# @default -- `{}` (See [values.yaml])
|
||||
gpgKeys: {}
|
||||
# 4AEE18F83AFDEB23: |
|
||||
# -----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
#
|
||||
# mQENBFmUaEEBCACzXTDt6ZnyaVtueZASBzgnAmK13q9Urgch+sKYeIhdymjuMQta
|
||||
# x15OklctmrZtqre5kwPUosG3/B2/ikuPYElcHgGPL4uL5Em6S5C/oozfkYzhwRrT
|
||||
# SQzvYjsE4I34To4UdE9KA97wrQjGoz2Bx72WDLyWwctD3DKQtYeHXswXXtXwKfjQ
|
||||
# 7Fy4+Bf5IPh76dA8NJ6UtjjLIDlKqdxLW4atHe6xWFaJ+XdLUtsAroZcXBeWDCPa
|
||||
# buXCDscJcLJRKZVc62gOZXXtPfoHqvUPp3nuLA4YjH9bphbrMWMf810Wxz9JTd3v
|
||||
# yWgGqNY0zbBqeZoGv+TuExlRHT8ASGFS9SVDABEBAAG0NUdpdEh1YiAod2ViLWZs
|
||||
# b3cgY29tbWl0IHNpZ25pbmcpIDxub3JlcGx5QGdpdGh1Yi5jb20+iQEiBBMBCAAW
|
||||
# BQJZlGhBCRBK7hj4Ov3rIwIbAwIZAQAAmQEH/iATWFmi2oxlBh3wAsySNCNV4IPf
|
||||
# DDMeh6j80WT7cgoX7V7xqJOxrfrqPEthQ3hgHIm7b5MPQlUr2q+UPL22t/I+ESF6
|
||||
# 9b0QWLFSMJbMSk+BXkvSjH9q8jAO0986/pShPV5DU2sMxnx4LfLfHNhTzjXKokws
|
||||
# +8ptJ8uhMNIDXfXuzkZHIxoXk3rNcjDN5c5X+sK8UBRH092BIJWCOfaQt7v7wig5
|
||||
# 4Ra28pM9GbHKXVNxmdLpCFyzvyMuCmINYYADsC848QQFFwnd4EQnupo6QvhEVx1O
|
||||
# j7wDwvuH5dCrLuLwtwXaQh0onG4583p0LGms2Mf5F+Ick6o/4peOlBoZz48=
|
||||
# =Bvzs
|
||||
# -----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
# -- Known Hosts configmap annotations
|
||||
knownHostsAnnotations: {}
|
||||
knownHosts:
|
||||
data:
|
||||
# -- Known Hosts
|
||||
# @default -- See [values.yaml]
|
||||
ssh_known_hosts: |
|
||||
bitbucket.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAubiN81eDcafrgMeLzaFPsw2kNvEcqTKl/VqLat/MaB33pZy0y3rJZtnqwR2qOOvbwKZYKiEO1O6VqNEBxKvJJelCq0dTXWT5pbO2gDXC6h6QDXCaHo6pOHGPUy+YBaGQRGuSusMEASYiWunYN0vCAI8QaXnWMXNMdFP3jHAJH0eDsoiGnLPBlBp4TNm6rYI74nMzgz3B9IikW4WVK+dc8KZJZWYjAuORU3jc1c/NPskD2ASinf8v3xnfXeukU0sJ5N6m5E8VLjObPEO+mN2t/FZTMZLiFqPWc/ALSqnMnnhwrNi2rbfg/rd/IpL8Le3pSBne8+seeFVBoGqzHM9yXw==
|
||||
github.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEmKSENjQEezOmxkZMy7opKgwFB9nkt5YRrYMjNuG5N87uRgg6CLrbo5wAdT/y6v0mKV0U2w0WZ2YB/++Tpockg=
|
||||
github.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl
|
||||
github.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ==
|
||||
gitlab.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFSMqzJeV9rUzU4kWitGjeR4PWSa29SPqJ1fVkhtj3Hw9xjLVXVYrU9QlYWrOLXBpQ6KWjbjTDTdDkoohFzgbEY=
|
||||
gitlab.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAfuCHKVTjquxvt6CM6tdG4SLp1Btn/nOeHHE5UOzRdf
|
||||
gitlab.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsj2bNKTBSpIYDEGk9KxsGh3mySTRgMtXL583qmBpzeQ+jqCMRgBqB98u3z++J1sKlXHWfM9dyhSevkMwSbhoR8XIq/U0tCNyokEi/ueaBMCvbcTHhO7FcwzY92WK4Yt0aGROY5qX2UKSeOvuP4D6TPqKF1onrSzH9bx9XUf2lEdWT/ia1NEKjunUqu1xOB/StKDHMoX4/OKyIzuS0q/T1zOATthvasJFoPrAjkohTyaDUz2LN5JoH839hViyEG82yB+MjcFV5MU3N1l1QL3cVUCh93xSaua1N85qivl+siMkPGbO5xR/En4iEY6K2XPASUEMaieWVNTRCtJ4S8H+9
|
||||
ssh.dev.azure.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Hr1oTWqNqOlzGJOfGJ4NakVyIzf1rXYd4d7wo6jBlkLvCA4odBlL0mDUyZ0/QUfTTqeu+tm22gOsv+VrVTMk6vwRU75gY/y9ut5Mb3bR5BV58dKXyq9A9UeB5Cakehn5Zgm6x1mKoVyf+FFn26iYqXJRgzIZZcZ5V6hrE0Qg39kZm4az48o0AUbf6Sp4SLdvnuMa2sVNwHBboS7EJkm57XQPVU3/QpyNLHbWDdzwtrlS+ez30S3AdYhLKEOxAG8weOnyrtLJAUen9mTkol8oII1edf7mWWbWVf0nBmly21+nZcmCTISQBtdcyPaEno7fFQMDD26/s0lfKob4Kw8H
|
||||
vs-ssh.visualstudio.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Hr1oTWqNqOlzGJOfGJ4NakVyIzf1rXYd4d7wo6jBlkLvCA4odBlL0mDUyZ0/QUfTTqeu+tm22gOsv+VrVTMk6vwRU75gY/y9ut5Mb3bR5BV58dKXyq9A9UeB5Cakehn5Zgm6x1mKoVyf+FFn26iYqXJRgzIZZcZ5V6hrE0Qg39kZm4az48o0AUbf6Sp4SLdvnuMa2sVNwHBboS7EJkm57XQPVU3/QpyNLHbWDdzwtrlS+ez30S3AdYhLKEOxAG8weOnyrtLJAUen9mTkol8oII1edf7mWWbWVf0nBmly21+nZcmCTISQBtdcyPaEno7fFQMDD26/s0lfKob4Kw8H
|
||||
# -- TLS certificate configmap annotations
|
||||
tlsCertsAnnotations: {}
|
||||
# -- TLS certificate
|
||||
# @default -- See [values.yaml]
|
||||
tlsCerts:
|
||||
{}
|
||||
# data:
|
||||
# argocd.example.com: |
|
||||
# -----BEGIN CERTIFICATE-----
|
||||
# MIIF1zCCA7+gAwIBAgIUQdTcSHY2Sxd3Tq/v1eIEZPCNbOowDQYJKoZIhvcNAQEL
|
||||
# BQAwezELMAkGA1UEBhMCREUxFTATBgNVBAgMDExvd2VyIFNheG9ueTEQMA4GA1UE
|
||||
# BwwHSGFub3ZlcjEVMBMGA1UECgwMVGVzdGluZyBDb3JwMRIwEAYDVQQLDAlUZXN0
|
||||
# c3VpdGUxGDAWBgNVBAMMD2Jhci5leGFtcGxlLmNvbTAeFw0xOTA3MDgxMzU2MTda
|
||||
# Fw0yMDA3MDcxMzU2MTdaMHsxCzAJBgNVBAYTAkRFMRUwEwYDVQQIDAxMb3dlciBT
|
||||
# YXhvbnkxEDAOBgNVBAcMB0hhbm92ZXIxFTATBgNVBAoMDFRlc3RpbmcgQ29ycDES
|
||||
# MBAGA1UECwwJVGVzdHN1aXRlMRgwFgYDVQQDDA9iYXIuZXhhbXBsZS5jb20wggIi
|
||||
# MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCv4mHMdVUcafmaSHVpUM0zZWp5
|
||||
# NFXfboxA4inuOkE8kZlbGSe7wiG9WqLirdr39Ts+WSAFA6oANvbzlu3JrEQ2CHPc
|
||||
# CNQm6diPREFwcDPFCe/eMawbwkQAPVSHPts0UoRxnpZox5pn69ghncBR+jtvx+/u
|
||||
# P6HdwW0qqTvfJnfAF1hBJ4oIk2AXiip5kkIznsAh9W6WRy6nTVCeetmIepDOGe0G
|
||||
# ZJIRn/OfSz7NzKylfDCat2z3EAutyeT/5oXZoWOmGg/8T7pn/pR588GoYYKRQnp+
|
||||
# YilqCPFX+az09EqqK/iHXnkdZ/Z2fCuU+9M/Zhrnlwlygl3RuVBI6xhm/ZsXtL2E
|
||||
# Gxa61lNy6pyx5+hSxHEFEJshXLtioRd702VdLKxEOuYSXKeJDs1x9o6cJ75S6hko
|
||||
# Ml1L4zCU+xEsMcvb1iQ2n7PZdacqhkFRUVVVmJ56th8aYyX7KNX6M9CD+kMpNm6J
|
||||
# kKC1li/Iy+RI138bAvaFplajMF551kt44dSvIoJIbTr1LigudzWPqk31QaZXV/4u
|
||||
# kD1n4p/XMc9HYU/was/CmQBFqmIZedTLTtK7clkuFN6wbwzdo1wmUNgnySQuMacO
|
||||
# gxhHxxzRWxd24uLyk9Px+9U3BfVPaRLiOPaPoC58lyVOykjSgfpgbus7JS69fCq7
|
||||
# bEH4Jatp/10zkco+UQIDAQABo1MwUTAdBgNVHQ4EFgQUjXH6PHi92y4C4hQpey86
|
||||
# r6+x1ewwHwYDVR0jBBgwFoAUjXH6PHi92y4C4hQpey86r6+x1ewwDwYDVR0TAQH/
|
||||
# BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAFE4SdKsX9UsLy+Z0xuHSxhTd0jfn
|
||||
# Iih5mtzb8CDNO5oTw4z0aMeAvpsUvjJ/XjgxnkiRACXh7K9hsG2r+ageRWGevyvx
|
||||
# CaRXFbherV1kTnZw4Y9/pgZTYVWs9jlqFOppz5sStkfjsDQ5lmPJGDii/StENAz2
|
||||
# XmtiPOgfG9Upb0GAJBCuKnrU9bIcT4L20gd2F4Y14ccyjlf8UiUi192IX6yM9OjT
|
||||
# +TuXwZgqnTOq6piVgr+FTSa24qSvaXb5z/mJDLlk23npecTouLg83TNSn3R6fYQr
|
||||
# d/Y9eXuUJ8U7/qTh2Ulz071AO9KzPOmleYPTx4Xty4xAtWi1QE5NHW9/Ajlv5OtO
|
||||
# OnMNWIs7ssDJBsB7VFC8hcwf79jz7kC0xmQqDfw51Xhhk04kla+v+HZcFW2AO9so
|
||||
# 6ZdVHHQnIbJa7yQJKZ+hK49IOoBR6JgdB5kymoplLLiuqZSYTcwSBZ72FYTm3iAr
|
||||
# jzvt1hxpxVDmXvRnkhRrIRhK4QgJL0jRmirBjDY+PYYd7bdRIjN7WNZLFsgplnS8
|
||||
# 9w6CwG32pRlm0c8kkiQ7FXA6BYCqOsDI8f1VGQv331OpR2Ck+FTv+L7DAmg6l37W
|
||||
# +LB9LGh4OAp68ImTjqf6ioGKG0RBSznwME+r4nXtT1S/qLR6ASWUS4ViWRhbRlNK
|
||||
# XWyb96wrUlv+E8I=
|
||||
# -----END CERTIFICATE-----
|
||||
|
||||
# -- Repository credentials to be used as Templates for other repos
|
||||
## Creates a secret for each key/value specified below to create repository credentials
|
||||
credentialTemplates: {}
|
||||
# github-enterprise-creds-1:
|
||||
# url: https://github.com/argoproj
|
||||
# githubAppID: 1
|
||||
# githubAppInstallationID: 2
|
||||
# githubAppEnterpriseBaseUrl: https://ghe.example.com/api/v3
|
||||
# githubAppPrivateKey: |
|
||||
# -----BEGIN OPENSSH PRIVATE KEY-----
|
||||
# ...
|
||||
# -----END OPENSSH PRIVATE KEY-----
|
||||
# https-creds:
|
||||
# url: https://github.com/argoproj
|
||||
# password: my-password
|
||||
# username: my-username
|
||||
# ssh-creds:
|
||||
# url: git@github.com:argoproj-labs
|
||||
# sshPrivateKey: |
|
||||
# -----BEGIN OPENSSH PRIVATE KEY-----
|
||||
# ...
|
||||
# -----END OPENSSH PRIVATE KEY-----
|
||||
|
||||
# -- Annotations to be added to `configs.credentialTemplates` Secret
|
||||
credentialTemplatesAnnotations: {}
|
||||
|
||||
# -- Repositories list to be used by applications
|
||||
## Creates a secret for each key/value specified below to create repositories
|
||||
## Note: the last example in the list would use a repository credential template, configured under "configs.repositoryCredentials".
|
||||
repositories: {}
|
||||
# istio-helm-repo:
|
||||
# url: https://storage.googleapis.com/istio-prerelease/daily-build/master-latest-daily/charts
|
||||
# name: istio.io
|
||||
# type: helm
|
||||
# private-helm-repo:
|
||||
# url: https://my-private-chart-repo.internal
|
||||
# name: private-repo
|
||||
# type: helm
|
||||
# password: my-password
|
||||
# username: my-username
|
||||
# private-repo:
|
||||
# url: https://github.com/argoproj/private-repo
|
||||
|
||||
# -- Annotations to be added to `configs.repositories` Secret
|
||||
repositoriesAnnotations: {}
|
||||
|
||||
secret:
|
||||
# -- Create the argocd-secret
|
||||
createSecret: true
|
||||
# -- Annotations to be added to argocd-secret
|
||||
annotations: {}
|
||||
|
||||
# -- Shared secret for authenticating GitHub webhook events
|
||||
githubSecret: ""
|
||||
# -- Shared secret for authenticating GitLab webhook events
|
||||
gitlabSecret: ""
|
||||
# -- Shared secret for authenticating BitbucketServer webhook events
|
||||
bitbucketServerSecret: ""
|
||||
# -- UUID for authenticating Bitbucket webhook events
|
||||
bitbucketUUID: ""
|
||||
# -- Shared secret for authenticating Gogs webhook events
|
||||
gogsSecret: ""
|
||||
|
||||
# -- add additional secrets to be added to argocd-secret
|
||||
## Custom secrets. Useful for injecting SSO secrets into environment variables.
|
||||
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#sensitive-data-and-sso-client-secrets
|
||||
## Note that all values must be non-empty.
|
||||
extra:
|
||||
{}
|
||||
# LDAP_PASSWORD: "mypassword"
|
||||
|
||||
# -- Argo TLS Data
|
||||
argocdServerTlsConfig:
|
||||
{}
|
||||
# key:
|
||||
# crt: |
|
||||
# -----BEGIN CERTIFICATE-----
|
||||
# <cert data>
|
||||
# -----END CERTIFICATE-----
|
||||
# -----BEGIN CERTIFICATE-----
|
||||
# <ca cert data>
|
||||
# -----END CERTIFICATE-----
|
||||
|
||||
# -- Bcrypt hashed admin password
|
||||
## Argo expects the password in the secret to be bcrypt hashed. You can create this hash with
|
||||
## `htpasswd -nbBC 10 "" $ARGO_PWD | tr -d ':\n' | sed 's/$2y/$2a/'`
|
||||
argocdServerAdminPassword: ""
|
||||
# -- Admin password modification time. Eg. `"2006-01-02T15:04:05Z"`
|
||||
# @default -- `""` (defaults to current time)
|
||||
argocdServerAdminPasswordMtime: ""
|
||||
|
||||
# -- Define custom [CSS styles] for your argo instance.
|
||||
# This setting will automatically mount the provided CSS and reference it in the argo configuration.
|
||||
# @default -- `""` (See [values.yaml])
|
||||
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/custom-styles/
|
||||
styles: ""
|
||||
# styles: |
|
||||
# .nav-bar {
|
||||
# background: linear-gradient(to bottom, #999, #777, #333, #222, #111);
|
||||
# }
|
||||
|
||||
# Argo CD configuration parameters
|
||||
## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/argocd-cmd-params-cm.yaml
|
||||
params:
|
||||
# -- Annotations to be added to the argocd-cmd-params-cm ConfigMap
|
||||
annotations: {}
|
||||
|
||||
## Generic parameters
|
||||
# -- Open-Telemetry collector address: (e.g. "otel-collector:4317")
|
||||
otlp.address: ''
|
||||
# -- Time period in seconds for application resync
|
||||
timeout.reconciliation: 180
|
||||
# -- Time period in seconds for application hard resync
|
||||
timeout.hard.reconciliation: 0
|
||||
|
||||
## Controller Properties
|
||||
# -- Number of application status processors
|
||||
controller.status.processors: 20
|
||||
# -- Number of application operation processors
|
||||
controller.operation.processors: 10
|
||||
# -- Specifies timeout between application self heal attempts
|
||||
controller.self.heal.timeout.seconds: 5
|
||||
# -- Repo server RPC call timeout seconds.
|
||||
controller.repo.server.timeout.seconds: 60
|
||||
|
||||
## Server properties
|
||||
# -- Run server without TLS
|
||||
server.insecure: false
|
||||
# -- Value for base href in index.html. Used if Argo CD is running behind reverse proxy under subpath different from /
|
||||
server.basehref: /
|
||||
# -- Used if Argo CD is running behind reverse proxy under subpath different from /
|
||||
server.rootpath: /
|
||||
# -- Directory path that contains additional static assets
|
||||
server.staticassets: /shared/app
|
||||
# -- Disable Argo CD RBAC for user authentication
|
||||
server.disable.auth: false
|
||||
# -- Enable GZIP compression
|
||||
server.enable.gzip: false
|
||||
# -- Set X-Frame-Options header in HTTP responses to value. To disable, set to "".
|
||||
server.x.frame.options: sameorigin
|
||||
|
||||
## Repo-server properties
|
||||
# -- Limit on number of concurrent manifests generate requests. Any value less the 1 means no limit.
|
||||
reposerver.parallelism.limit: 0
|
||||
|
||||
# -- Array of extra K8s manifests to deploy
|
||||
extraObjects: []
|
||||
|
|
@ -122,27 +382,30 @@ controller:
|
|||
# Additional replicas will cause sharding of managed clusters across number of replicas.
|
||||
replicas: 1
|
||||
|
||||
## Application controller commandline flags
|
||||
args:
|
||||
# -- define the application controller `--status-processors`
|
||||
statusProcessors: "20"
|
||||
# -- define the application controller `--operation-processors`
|
||||
operationProcessors: "10"
|
||||
# -- define the application controller `--app-hard-resync`
|
||||
appHardResyncPeriod: "0"
|
||||
# -- define the application controller `--app-resync`
|
||||
appResyncPeriod: "180"
|
||||
# -- define the application controller `--self-heal-timeout-seconds`
|
||||
selfHealTimeout: "5"
|
||||
# -- define the application controller `--repo-server-timeout-seconds`
|
||||
repoServerTimeoutSeconds: "60"
|
||||
# -- DEPRECATED - Application controller commandline flags
|
||||
args: {}
|
||||
# DEPRECATED - Use configs.params to override
|
||||
# # -- define the application controller `--status-processors`
|
||||
# statusProcessors: "20"
|
||||
# # -- define the application controller `--operation-processors`
|
||||
# operationProcessors: "10"
|
||||
# # -- define the application controller `--app-hard-resync`
|
||||
# appHardResyncPeriod: "0"
|
||||
# # -- define the application controller `--app-resync`
|
||||
# appResyncPeriod: "180"
|
||||
# # -- define the application controller `--self-heal-timeout-seconds`
|
||||
# selfHealTimeout: "5"
|
||||
# # -- define the application controller `--repo-server-timeout-seconds`
|
||||
# repoServerTimeoutSeconds: "60"
|
||||
|
||||
|
||||
# DEPRECATED - Use configs.params to override
|
||||
# -- Application controller log format. Either `text` or `json`
|
||||
# @default -- `""` (defaults to global.logging.format)
|
||||
logFormat: ""
|
||||
# logFormat: ""
|
||||
# -- Application controller log level. One of: `debug`, `info`, `warn` or `error`
|
||||
# @default -- `""` (defaults to global.logging.level)
|
||||
logLevel: ""
|
||||
# logLevel: ""
|
||||
|
||||
# -- Additional command line arguments to pass to application controller
|
||||
extraArgs: []
|
||||
|
|
@ -496,20 +759,10 @@ dex:
|
|||
automountServiceAccountToken: true
|
||||
|
||||
# -- Additional volumeMounts to the dex main container
|
||||
volumeMounts:
|
||||
- name: static-files
|
||||
mountPath: /shared
|
||||
volumeMounts: []
|
||||
|
||||
# -- Additional volumes to the dex pod
|
||||
volumes:
|
||||
- name: static-files
|
||||
emptyDir: {}
|
||||
|
||||
# -- Extra volumes to the dex pod
|
||||
extraVolumes: []
|
||||
|
||||
# -- Extra volumeMounts to the dex pod
|
||||
extraVolumeMounts: []
|
||||
volumes: []
|
||||
|
||||
# -- Container port for HTTP access
|
||||
containerPortHttp: 5556
|
||||
|
|
@ -554,7 +807,7 @@ dex:
|
|||
# - all
|
||||
# readOnlyRootFilesystem: true
|
||||
|
||||
# -- Resource limits and requests for dex
|
||||
# -- Resource limits and requests for dex
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 50m
|
||||
|
|
@ -893,12 +1146,6 @@ server:
|
|||
|
||||
# -- Additional command line arguments to pass to Argo CD server
|
||||
extraArgs: []
|
||||
# - --insecure
|
||||
|
||||
# This flag is used to either remove or pass the CLI flag --staticassets /shared/app to the Argo CD server app
|
||||
staticAssets:
|
||||
# -- Disable deprecated flag `--staticassets`
|
||||
enabled: true
|
||||
|
||||
# -- Environment variables to pass to Argo CD server
|
||||
env: []
|
||||
|
|
@ -914,12 +1161,13 @@ server:
|
|||
# -- Specify postStart and preStop lifecycle hooks for your argo-cd-server container
|
||||
lifecycle: {}
|
||||
|
||||
# DEPRECATED - Use configs.params to override
|
||||
# -- Argo CD server log format: Either `text` or `json`
|
||||
# @default -- `""` (defaults to global.logging.format)
|
||||
logFormat: ""
|
||||
# logFormat: ""
|
||||
# -- Argo CD server log level. One of: `debug`, `info`, `warn` or `error`
|
||||
# @default -- `""` (defaults to global.logging.level)
|
||||
logLevel: ""
|
||||
# logLevel: ""
|
||||
|
||||
# -- Annotations to be added to server pods
|
||||
podAnnotations: {}
|
||||
|
|
@ -1503,12 +1751,13 @@ repoServer:
|
|||
# - secretRef:
|
||||
# name: secret-name
|
||||
|
||||
# DEPRECATED - Use configs.params to override
|
||||
# -- Repo server log format: Either `text` or `json`
|
||||
# @default -- `""` (defaults to global.logging.level)
|
||||
logFormat: ""
|
||||
# logFormat: ""
|
||||
# -- Repo server log level. One of: `debug`, `info`, `warn` or `error`
|
||||
# @default -- `""` (defaults to global.logging.format)
|
||||
logLevel: ""
|
||||
# logLevel: ""
|
||||
|
||||
# -- Annotations to be added to repo server pods
|
||||
podAnnotations: {}
|
||||
|
|
@ -1718,223 +1967,6 @@ repoServer:
|
|||
# -- Secrets with credentials to pull images from a private registry
|
||||
imagePullSecrets: []
|
||||
|
||||
## Argo Configs
|
||||
configs:
|
||||
# -- Provide one or multiple [external cluster credentials]
|
||||
# @default -- `[]` (See [values.yaml])
|
||||
## Ref:
|
||||
## - https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#clusters
|
||||
## - https://argo-cd.readthedocs.io/en/stable/operator-manual/security/#external-cluster-credentials
|
||||
clusterCredentials: []
|
||||
# - name: mycluster
|
||||
# server: https://mycluster.com
|
||||
# labels: {}
|
||||
# annotations: {}
|
||||
# config:
|
||||
# bearerToken: "<authentication token>"
|
||||
# tlsClientConfig:
|
||||
# insecure: false
|
||||
# caData: "<base64 encoded certificate>"
|
||||
# - name: mycluster2
|
||||
# server: https://mycluster2.com
|
||||
# labels: {}
|
||||
# annotations: {}
|
||||
# namespaces: namespace1,namespace2
|
||||
# clusterResources: true
|
||||
# config:
|
||||
# bearerToken: "<authentication token>"
|
||||
# tlsClientConfig:
|
||||
# insecure: false
|
||||
# caData: "<base64 encoded certificate>"
|
||||
|
||||
# -- GnuPG key ring annotations
|
||||
gpgKeysAnnotations: {}
|
||||
# -- [GnuPG](https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/) keys to add to the key ring
|
||||
# @default -- `{}` (See [values.yaml])
|
||||
gpgKeys: {}
|
||||
# 4AEE18F83AFDEB23: |
|
||||
# -----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
#
|
||||
# mQENBFmUaEEBCACzXTDt6ZnyaVtueZASBzgnAmK13q9Urgch+sKYeIhdymjuMQta
|
||||
# x15OklctmrZtqre5kwPUosG3/B2/ikuPYElcHgGPL4uL5Em6S5C/oozfkYzhwRrT
|
||||
# SQzvYjsE4I34To4UdE9KA97wrQjGoz2Bx72WDLyWwctD3DKQtYeHXswXXtXwKfjQ
|
||||
# 7Fy4+Bf5IPh76dA8NJ6UtjjLIDlKqdxLW4atHe6xWFaJ+XdLUtsAroZcXBeWDCPa
|
||||
# buXCDscJcLJRKZVc62gOZXXtPfoHqvUPp3nuLA4YjH9bphbrMWMf810Wxz9JTd3v
|
||||
# yWgGqNY0zbBqeZoGv+TuExlRHT8ASGFS9SVDABEBAAG0NUdpdEh1YiAod2ViLWZs
|
||||
# b3cgY29tbWl0IHNpZ25pbmcpIDxub3JlcGx5QGdpdGh1Yi5jb20+iQEiBBMBCAAW
|
||||
# BQJZlGhBCRBK7hj4Ov3rIwIbAwIZAQAAmQEH/iATWFmi2oxlBh3wAsySNCNV4IPf
|
||||
# DDMeh6j80WT7cgoX7V7xqJOxrfrqPEthQ3hgHIm7b5MPQlUr2q+UPL22t/I+ESF6
|
||||
# 9b0QWLFSMJbMSk+BXkvSjH9q8jAO0986/pShPV5DU2sMxnx4LfLfHNhTzjXKokws
|
||||
# +8ptJ8uhMNIDXfXuzkZHIxoXk3rNcjDN5c5X+sK8UBRH092BIJWCOfaQt7v7wig5
|
||||
# 4Ra28pM9GbHKXVNxmdLpCFyzvyMuCmINYYADsC848QQFFwnd4EQnupo6QvhEVx1O
|
||||
# j7wDwvuH5dCrLuLwtwXaQh0onG4583p0LGms2Mf5F+Ick6o/4peOlBoZz48=
|
||||
# =Bvzs
|
||||
# -----END PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
# -- Known Hosts configmap annotations
|
||||
knownHostsAnnotations: {}
|
||||
knownHosts:
|
||||
data:
|
||||
# -- Known Hosts
|
||||
# @default -- See [values.yaml]
|
||||
ssh_known_hosts: |
|
||||
bitbucket.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAubiN81eDcafrgMeLzaFPsw2kNvEcqTKl/VqLat/MaB33pZy0y3rJZtnqwR2qOOvbwKZYKiEO1O6VqNEBxKvJJelCq0dTXWT5pbO2gDXC6h6QDXCaHo6pOHGPUy+YBaGQRGuSusMEASYiWunYN0vCAI8QaXnWMXNMdFP3jHAJH0eDsoiGnLPBlBp4TNm6rYI74nMzgz3B9IikW4WVK+dc8KZJZWYjAuORU3jc1c/NPskD2ASinf8v3xnfXeukU0sJ5N6m5E8VLjObPEO+mN2t/FZTMZLiFqPWc/ALSqnMnnhwrNi2rbfg/rd/IpL8Le3pSBne8+seeFVBoGqzHM9yXw==
|
||||
github.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEmKSENjQEezOmxkZMy7opKgwFB9nkt5YRrYMjNuG5N87uRgg6CLrbo5wAdT/y6v0mKV0U2w0WZ2YB/++Tpockg=
|
||||
github.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl
|
||||
github.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ==
|
||||
gitlab.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFSMqzJeV9rUzU4kWitGjeR4PWSa29SPqJ1fVkhtj3Hw9xjLVXVYrU9QlYWrOLXBpQ6KWjbjTDTdDkoohFzgbEY=
|
||||
gitlab.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAfuCHKVTjquxvt6CM6tdG4SLp1Btn/nOeHHE5UOzRdf
|
||||
gitlab.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsj2bNKTBSpIYDEGk9KxsGh3mySTRgMtXL583qmBpzeQ+jqCMRgBqB98u3z++J1sKlXHWfM9dyhSevkMwSbhoR8XIq/U0tCNyokEi/ueaBMCvbcTHhO7FcwzY92WK4Yt0aGROY5qX2UKSeOvuP4D6TPqKF1onrSzH9bx9XUf2lEdWT/ia1NEKjunUqu1xOB/StKDHMoX4/OKyIzuS0q/T1zOATthvasJFoPrAjkohTyaDUz2LN5JoH839hViyEG82yB+MjcFV5MU3N1l1QL3cVUCh93xSaua1N85qivl+siMkPGbO5xR/En4iEY6K2XPASUEMaieWVNTRCtJ4S8H+9
|
||||
ssh.dev.azure.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Hr1oTWqNqOlzGJOfGJ4NakVyIzf1rXYd4d7wo6jBlkLvCA4odBlL0mDUyZ0/QUfTTqeu+tm22gOsv+VrVTMk6vwRU75gY/y9ut5Mb3bR5BV58dKXyq9A9UeB5Cakehn5Zgm6x1mKoVyf+FFn26iYqXJRgzIZZcZ5V6hrE0Qg39kZm4az48o0AUbf6Sp4SLdvnuMa2sVNwHBboS7EJkm57XQPVU3/QpyNLHbWDdzwtrlS+ez30S3AdYhLKEOxAG8weOnyrtLJAUen9mTkol8oII1edf7mWWbWVf0nBmly21+nZcmCTISQBtdcyPaEno7fFQMDD26/s0lfKob4Kw8H
|
||||
vs-ssh.visualstudio.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Hr1oTWqNqOlzGJOfGJ4NakVyIzf1rXYd4d7wo6jBlkLvCA4odBlL0mDUyZ0/QUfTTqeu+tm22gOsv+VrVTMk6vwRU75gY/y9ut5Mb3bR5BV58dKXyq9A9UeB5Cakehn5Zgm6x1mKoVyf+FFn26iYqXJRgzIZZcZ5V6hrE0Qg39kZm4az48o0AUbf6Sp4SLdvnuMa2sVNwHBboS7EJkm57XQPVU3/QpyNLHbWDdzwtrlS+ez30S3AdYhLKEOxAG8weOnyrtLJAUen9mTkol8oII1edf7mWWbWVf0nBmly21+nZcmCTISQBtdcyPaEno7fFQMDD26/s0lfKob4Kw8H
|
||||
# -- TLS certificate configmap annotations
|
||||
tlsCertsAnnotations: {}
|
||||
# -- TLS certificate
|
||||
# @default -- See [values.yaml]
|
||||
tlsCerts:
|
||||
{}
|
||||
# data:
|
||||
# argocd.example.com: |
|
||||
# -----BEGIN CERTIFICATE-----
|
||||
# MIIF1zCCA7+gAwIBAgIUQdTcSHY2Sxd3Tq/v1eIEZPCNbOowDQYJKoZIhvcNAQEL
|
||||
# BQAwezELMAkGA1UEBhMCREUxFTATBgNVBAgMDExvd2VyIFNheG9ueTEQMA4GA1UE
|
||||
# BwwHSGFub3ZlcjEVMBMGA1UECgwMVGVzdGluZyBDb3JwMRIwEAYDVQQLDAlUZXN0
|
||||
# c3VpdGUxGDAWBgNVBAMMD2Jhci5leGFtcGxlLmNvbTAeFw0xOTA3MDgxMzU2MTda
|
||||
# Fw0yMDA3MDcxMzU2MTdaMHsxCzAJBgNVBAYTAkRFMRUwEwYDVQQIDAxMb3dlciBT
|
||||
# YXhvbnkxEDAOBgNVBAcMB0hhbm92ZXIxFTATBgNVBAoMDFRlc3RpbmcgQ29ycDES
|
||||
# MBAGA1UECwwJVGVzdHN1aXRlMRgwFgYDVQQDDA9iYXIuZXhhbXBsZS5jb20wggIi
|
||||
# MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCv4mHMdVUcafmaSHVpUM0zZWp5
|
||||
# NFXfboxA4inuOkE8kZlbGSe7wiG9WqLirdr39Ts+WSAFA6oANvbzlu3JrEQ2CHPc
|
||||
# CNQm6diPREFwcDPFCe/eMawbwkQAPVSHPts0UoRxnpZox5pn69ghncBR+jtvx+/u
|
||||
# P6HdwW0qqTvfJnfAF1hBJ4oIk2AXiip5kkIznsAh9W6WRy6nTVCeetmIepDOGe0G
|
||||
# ZJIRn/OfSz7NzKylfDCat2z3EAutyeT/5oXZoWOmGg/8T7pn/pR588GoYYKRQnp+
|
||||
# YilqCPFX+az09EqqK/iHXnkdZ/Z2fCuU+9M/Zhrnlwlygl3RuVBI6xhm/ZsXtL2E
|
||||
# Gxa61lNy6pyx5+hSxHEFEJshXLtioRd702VdLKxEOuYSXKeJDs1x9o6cJ75S6hko
|
||||
# Ml1L4zCU+xEsMcvb1iQ2n7PZdacqhkFRUVVVmJ56th8aYyX7KNX6M9CD+kMpNm6J
|
||||
# kKC1li/Iy+RI138bAvaFplajMF551kt44dSvIoJIbTr1LigudzWPqk31QaZXV/4u
|
||||
# kD1n4p/XMc9HYU/was/CmQBFqmIZedTLTtK7clkuFN6wbwzdo1wmUNgnySQuMacO
|
||||
# gxhHxxzRWxd24uLyk9Px+9U3BfVPaRLiOPaPoC58lyVOykjSgfpgbus7JS69fCq7
|
||||
# bEH4Jatp/10zkco+UQIDAQABo1MwUTAdBgNVHQ4EFgQUjXH6PHi92y4C4hQpey86
|
||||
# r6+x1ewwHwYDVR0jBBgwFoAUjXH6PHi92y4C4hQpey86r6+x1ewwDwYDVR0TAQH/
|
||||
# BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAFE4SdKsX9UsLy+Z0xuHSxhTd0jfn
|
||||
# Iih5mtzb8CDNO5oTw4z0aMeAvpsUvjJ/XjgxnkiRACXh7K9hsG2r+ageRWGevyvx
|
||||
# CaRXFbherV1kTnZw4Y9/pgZTYVWs9jlqFOppz5sStkfjsDQ5lmPJGDii/StENAz2
|
||||
# XmtiPOgfG9Upb0GAJBCuKnrU9bIcT4L20gd2F4Y14ccyjlf8UiUi192IX6yM9OjT
|
||||
# +TuXwZgqnTOq6piVgr+FTSa24qSvaXb5z/mJDLlk23npecTouLg83TNSn3R6fYQr
|
||||
# d/Y9eXuUJ8U7/qTh2Ulz071AO9KzPOmleYPTx4Xty4xAtWi1QE5NHW9/Ajlv5OtO
|
||||
# OnMNWIs7ssDJBsB7VFC8hcwf79jz7kC0xmQqDfw51Xhhk04kla+v+HZcFW2AO9so
|
||||
# 6ZdVHHQnIbJa7yQJKZ+hK49IOoBR6JgdB5kymoplLLiuqZSYTcwSBZ72FYTm3iAr
|
||||
# jzvt1hxpxVDmXvRnkhRrIRhK4QgJL0jRmirBjDY+PYYd7bdRIjN7WNZLFsgplnS8
|
||||
# 9w6CwG32pRlm0c8kkiQ7FXA6BYCqOsDI8f1VGQv331OpR2Ck+FTv+L7DAmg6l37W
|
||||
# +LB9LGh4OAp68ImTjqf6ioGKG0RBSznwME+r4nXtT1S/qLR6ASWUS4ViWRhbRlNK
|
||||
# XWyb96wrUlv+E8I=
|
||||
# -----END CERTIFICATE-----
|
||||
|
||||
# -- Repository credentials to be used as Templates for other repos
|
||||
## Creates a secret for each key/value specified below to create repository credentials
|
||||
credentialTemplates: {}
|
||||
# github-enterprise-creds-1:
|
||||
# url: https://github.com/argoproj
|
||||
# githubAppID: 1
|
||||
# githubAppInstallationID: 2
|
||||
# githubAppEnterpriseBaseUrl: https://ghe.example.com/api/v3
|
||||
# githubAppPrivateKey: |
|
||||
# -----BEGIN OPENSSH PRIVATE KEY-----
|
||||
# ...
|
||||
# -----END OPENSSH PRIVATE KEY-----
|
||||
# https-creds:
|
||||
# url: https://github.com/argoproj
|
||||
# password: my-password
|
||||
# username: my-username
|
||||
# ssh-creds:
|
||||
# url: git@github.com:argoproj-labs
|
||||
# sshPrivateKey: |
|
||||
# -----BEGIN OPENSSH PRIVATE KEY-----
|
||||
# ...
|
||||
# -----END OPENSSH PRIVATE KEY-----
|
||||
|
||||
# -- Annotations to be added to `configs.credentialTemplates` Secret
|
||||
credentialTemplatesAnnotations: {}
|
||||
|
||||
# -- Repositories list to be used by applications
|
||||
## Creates a secret for each key/value specified below to create repositories
|
||||
## Note: the last example in the list would use a repository credential template, configured under "configs.repositoryCredentials".
|
||||
repositories: {}
|
||||
# istio-helm-repo:
|
||||
# url: https://storage.googleapis.com/istio-prerelease/daily-build/master-latest-daily/charts
|
||||
# name: istio.io
|
||||
# type: helm
|
||||
# private-helm-repo:
|
||||
# url: https://my-private-chart-repo.internal
|
||||
# name: private-repo
|
||||
# type: helm
|
||||
# password: my-password
|
||||
# username: my-username
|
||||
# private-repo:
|
||||
# url: https://github.com/argoproj/private-repo
|
||||
|
||||
# -- Annotations to be added to `configs.repositories` Secret
|
||||
repositoriesAnnotations: {}
|
||||
|
||||
secret:
|
||||
# -- Create the argocd-secret
|
||||
createSecret: true
|
||||
# -- Annotations to be added to argocd-secret
|
||||
annotations: {}
|
||||
|
||||
# -- Shared secret for authenticating GitHub webhook events
|
||||
githubSecret: ""
|
||||
# -- Shared secret for authenticating GitLab webhook events
|
||||
gitlabSecret: ""
|
||||
# -- Shared secret for authenticating BitbucketServer webhook events
|
||||
bitbucketServerSecret: ""
|
||||
# -- UUID for authenticating Bitbucket webhook events
|
||||
bitbucketUUID: ""
|
||||
# -- Shared secret for authenticating Gogs webhook events
|
||||
gogsSecret: ""
|
||||
|
||||
# -- add additional secrets to be added to argocd-secret
|
||||
## Custom secrets. Useful for injecting SSO secrets into environment variables.
|
||||
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#sensitive-data-and-sso-client-secrets
|
||||
## Note that all values must be non-empty.
|
||||
extra:
|
||||
{}
|
||||
# LDAP_PASSWORD: "mypassword"
|
||||
|
||||
# -- Argo TLS Data
|
||||
argocdServerTlsConfig:
|
||||
{}
|
||||
# key:
|
||||
# crt: |
|
||||
# -----BEGIN CERTIFICATE-----
|
||||
# <cert data>
|
||||
# -----END CERTIFICATE-----
|
||||
# -----BEGIN CERTIFICATE-----
|
||||
# <ca cert data>
|
||||
# -----END CERTIFICATE-----
|
||||
|
||||
# -- Bcrypt hashed admin password
|
||||
## Argo expects the password in the secret to be bcrypt hashed. You can create this hash with
|
||||
## `htpasswd -nbBC 10 "" $ARGO_PWD | tr -d ':\n' | sed 's/$2y/$2a/'`
|
||||
argocdServerAdminPassword: ""
|
||||
# -- Admin password modification time. Eg. `"2006-01-02T15:04:05Z"`
|
||||
# @default -- `""` (defaults to current time)
|
||||
argocdServerAdminPasswordMtime: ""
|
||||
|
||||
# -- Define custom [CSS styles] for your argo instance.
|
||||
# This setting will automatically mount the provided CSS and reference it in the argo configuration.
|
||||
# @default -- `""` (See [values.yaml])
|
||||
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/custom-styles/
|
||||
styles: ""
|
||||
# styles: |
|
||||
# .nav-bar {
|
||||
# background: linear-gradient(to bottom, #999, #777, #333, #222, #111);
|
||||
# }
|
||||
|
||||
openshift:
|
||||
# -- enables using arbitrary uid for argo repo server
|
||||
enabled: false
|
||||
|
||||
applicationSet:
|
||||
# -- Enable Application Set controller
|
||||
enabled: true
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue