Fix ingress (#109)
This commit is contained in:
parent
aff8a78040
commit
f8dc826d58
2 changed files with 6 additions and 16 deletions
|
|
@ -56,10 +56,9 @@ $ helm install --name my-release argo/argo-cd
|
|||
| dexServer.servicePortHttp | int | `5556` | Service port for Dex Server GRPC |
|
||||
| dexServer.volumeMounts | list | `[]` | Additional volume mounts |
|
||||
| dexServer.volumes | list | `[]` | Additional volumes |
|
||||
| ingress.additionalHosts | list | `[]` | Ingress additional hosts |
|
||||
| ingress.annotations | object | `{}` | Annotations for ingress object, set `nginx.ingress.kubernetes.io/force-ssl-redirect: "true"` and `nginx.ingress.kubernetes.io/ssl-passthrough: "true"` if serving GRPC and HTTPS on the same ingress |
|
||||
| ingress.enabled | bool | `false` | Enable ingress |
|
||||
| ingress.hosts[0] | string | `"argocd.example.com"` | Ingress host |
|
||||
| ingress.path | string | `"/"` | Ingress path |
|
||||
| rbac.policyCsv | string | `nil` | RBAC policy in CSV, see [values.yaml](./values.yaml) for format |
|
||||
| rbac.policyDefault | string | `nil` | The default role Argo CD will fall back to, when authorizing API requests, ie: `role:readonly` |
|
||||
| rbac.scopes | string | `nil` | Scopes controls which OIDC scopes to examine during rbac enforcement (in addition to `sub` scope). ie: `[groups]` |
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue