This adds new parameters to each Deployment in the argo-cd chart, allowing users to specify custom volumes to mount. This makes it possible to use a Git repository self-signed certificates by manually adding a "known_hosts" file, as recommended in the documentation: https://argoproj.github.io/argo-cd/user-guide/private-repositories/ "volumes" and "volumeMounts" parameters are added to each Deployment, with defaults set to empty. This change was tested by templating the chart with default parameters, and by templating it with volume mounts specified for each service.
150 lines
4.5 KiB
YAML
150 lines
4.5 KiB
YAML
applicationController:
|
|
containerPort: 8082
|
|
servicePort: 8082
|
|
image:
|
|
repository: argoproj/argocd
|
|
tag: v0.12.1
|
|
pullPolicy: Always
|
|
volumeMounts: []
|
|
volumes: []
|
|
|
|
server:
|
|
containerPort: 8080
|
|
servicePortHttp: 80
|
|
servicePortHttps: 443
|
|
serviceAnnotations: {}
|
|
image:
|
|
repository: argoproj/argocd
|
|
tag: v0.12.1
|
|
pullPolicy: Always
|
|
uiInitImage:
|
|
repository: argoproj/argocd-ui
|
|
tag: v0.12.1
|
|
pullPolicy: Always
|
|
extraArgs: []
|
|
volumeMounts: []
|
|
volumes: []
|
|
|
|
repoServer:
|
|
containerPort: 8081
|
|
servicePort: 8081
|
|
image:
|
|
repository: argoproj/argocd
|
|
tag: v0.12.1
|
|
pullPolicy: Always
|
|
volumeMounts: []
|
|
volumes: []
|
|
|
|
dexServer:
|
|
containerPortHttp: 5556
|
|
containerPortGrpc: 5557
|
|
servicePortHttp: 5556
|
|
servicePortGrpc: 5557
|
|
image:
|
|
repository: quay.io/dexidp/dex
|
|
tag: v2.12.0
|
|
pullPolicy: Always
|
|
initImage:
|
|
repository: argoproj/argocd
|
|
tag: v0.12.1
|
|
pullPolicy: Always
|
|
volumeMounts: []
|
|
volumes: []
|
|
|
|
# terminate tls at ArgoCD level
|
|
ingress:
|
|
enabled: false
|
|
annotations: {}
|
|
# kubernetes.io/ingress.class: nginx
|
|
# nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
|
# nginx.ingress.kubernetes.io/ssl-passthrough: "true"
|
|
path: /
|
|
hosts:
|
|
- argocd.example.com
|
|
|
|
# Standard Argo CD installation with cluster-admin access.
|
|
# Set this true if you plan to use Argo CD to deploy applications in the same cluster that
|
|
# Argo CD runs in (i.e. kubernetes.svc.default).
|
|
# Will still be able to deploy to external clusters with inputted credentials.
|
|
|
|
clusterAdminAccess:
|
|
enabled: true
|
|
|
|
config:
|
|
helmRepositories:
|
|
# - name: privateRepo
|
|
# url: http://chartmuseum.privatecloud.com
|
|
# usernameSecret:
|
|
# name: private-chartmuseum
|
|
# key: username
|
|
# passwordSecret:
|
|
# name: private-chartmuseum
|
|
# key: password
|
|
# - name: incubator
|
|
# url: https://kubernetes-charts-incubator.storage.googleapis.com/
|
|
repositories:
|
|
# - url: git@gitlab.com:usersprivategroup/users-gitops-config.git
|
|
# sshPrivateKeySecret:
|
|
# key: privateKey
|
|
# name: argocd-dev-key
|
|
# - url: git@gitlab.com:accountingprivategroup/accounting-gitops-config.git
|
|
# sshPrivateKeySecret:
|
|
# key: privateKey
|
|
# name: argocd-dev-key
|
|
dexConfig:
|
|
# # Argo CD's externally facing base URL. Required for configuring SSO
|
|
# # url: https://argo-cd-demo.argoproj.io
|
|
#
|
|
# # A dex connector configuration. See documentation on how to configure SSO:
|
|
# # https://github.com/argoproj/argo-cd/blob/master/docs/sso.md#2-configure-argocd-for-sso
|
|
# connectors:
|
|
# # GitHub example
|
|
# - type: github
|
|
# id: github
|
|
# name: GitHub
|
|
# config:
|
|
# clientID: aabbccddeeff00112233
|
|
# clientSecret: $dex.github.clientSecret
|
|
# orgs:
|
|
# - name: your-github-org
|
|
# teams:
|
|
url: # https://argocd.example.com/
|
|
oidcConfig:
|
|
# name: Okta
|
|
# issuer: https://dev-123456.oktapreview.com
|
|
# clientID: aaaabbbbccccddddeee
|
|
# clientSecret: $oidc.okta.clientSecret
|
|
# The following keys hold the shared secret for authenticating GitHub/GitLab/BitBucket webhook
|
|
# events. To enable webhooks, configure one or more of the following keys with the shared git
|
|
# provider webhook secret. The payload URL configured in the git provider should use the
|
|
# /api/webhook endpoint of your Argo CD instance (e.g. https://argocd.example.com/api/webhook)
|
|
webhook:
|
|
githubSecret:
|
|
gitlabSecret:
|
|
bitbucketSecret:
|
|
rbac:
|
|
# # An RBAC policy .csv file containing additional policy and role definitions.
|
|
# # See https://github.com/argoproj/argo-cd/blob/master/docs/rbac.md on how to write RBAC policies.
|
|
# policy.csv: |
|
|
# # Give all members of "my-org:team-alpha" the ability to sync apps in "my-project"
|
|
# p, my-org:team-alpha, applications, sync, my-project/*, allow
|
|
# # Make all members of "my-org:team-beta" admins
|
|
# g, my-org:team-beta, role:admin
|
|
policyCsv: #|
|
|
# p, role:org-admin, applications, *, */*, allow
|
|
# p, role:org-admin, clusters, get, *, allow
|
|
# p, role:org-admin, repositories, get, *, allow
|
|
# p, role:org-admin, repositories, create, *, allow
|
|
# p, role:org-admin, repositories, update, *, allow
|
|
# p, role:org-admin, repositories, delete, *, allow
|
|
# g, your-github-org:your-team, role:org-admin
|
|
# The default role Argo CD will fall back to, when authorizing API requests
|
|
policyDefault: #role:readonly
|
|
|
|
redis:
|
|
image:
|
|
repository: redis
|
|
tag: 5.0.3
|
|
pullPolicy: Always
|
|
containerPort: 6379
|
|
servicePort: 6379
|